Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism by Michael Miller

Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism by Michael Miller

Author:Michael Miller
Language: eng
Format: epub
Tags: Nonfiction, Young Adult Nonfiction, Young Adults, cyberspy, cyberwar, cyberterror, cyber, hack, cryptocurrency, Bitcoin, cryptography, cybersecurity, computer virus, code, coding, malware, firewall, fake news, information technology, IT, propaganda, ransomware
ISBN: 9781728427461
Publisher: Lerner Publishing Group
Published: 2020-10-21T17:43:15+00:00


The FBI Says, Don’t Deal with Criminals

While many companies and institutions are willing to pay the ransom to get their systems back up and running quickly after a ransomware attack, the FBI and other law enforcement officials discourage giving in to attackers’ demands. They say that giving the attackers what they want only encourages further criminal activity.

As with human kidnapping cases, there’s no guarantee that if a victim pays the ransom, the attackers will release the data being held hostage. And even if the affected files are decrypted, they may have gotten corrupted during the ransomware attack and become useless.

The FBI also warns that ransomware might not be the only threat to a victim’s computer system. Hackers might insert other kinds of malware along with the ransomware, and even if the victim pays the ransom, that malware can remain and do damage. So the FBI recommends that instead of paying a hacker’s ransom, victims perform a full fix of any infected systems, including wiping (deleting all data from) their computers and restoring data from off-line backups.

Victims also face the nightmare scenario of a second cyberextortion attack. The same attackers might attack again, or other criminals might view the victim as an easy target and launch their own attacks. So cybersecurity experts encourage companies and organizations that are ransomware attack victims to strengthen security systems to guard against future attacks.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.