Articles for January 2016

Ransomware: 7 tips for recovery and prevention


Ransomware is a rather insidious form of malware that attempts to render all of your important files unreadable, until you pay the perpetrator a ransom to restore them. Once paid, you may or may not be given the key needed to restore your files. The best approach to ransomware, by far, is prevention. This article will describe the keys to avoiding ransomware, and will provide advice for what to do if the worst happens.

Source: Ransomware: 7 tips for recovery and prevention

Loading

A beginner’s guide to Tor: How to navigate through the underground Internet

Really, really basic… but good info overall.

We live in an era of free-flowing data, where any person with an Internet connection has seemingly all the information in the world at their fingertips. Yet, while the Internet has greatly expanded the ability to share knowledge, it has also made issues of privacy more complicated, with many worrying

Source: A beginner’s guide to Tor: How to navigate through the underground Internet

Loading

The usefulness of a compromised PC… to a hacker.


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.

Read more here

Loading