friend of a version of the CryptoLocker that showed up as a voice mail attachment! Most often, the CryptoLocker gets loaded via a fake email from companies, such as PayPal or FedEx. These policies were based on documentation provided by Third Tier, a group of my fellow MVP’ers. Later in the month, I began implementing new security policies on those systems to block the attack and spread of the ransomware. In early October I began a review of the computer systems that I manage on a daily basis to ensure that all systems were clean. And this “cyber nemesis” is still on the move, per a new advisory from US-CERT. Since then workstations and servers worldwide have been attacked and compromised, even with the best levels of software and hardware protection in place. I first blogged about the Cryptolocker ransomware a little over a month ago.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |