To win the fight against a rapidly evolving malware, it has become the responsibility of every device user to protect themselves before ransomware strikes. But where does it come from? How does it spread? And where can it possibly go?
A PROFITABLE ORGANIZED CRIME
Despite its brief spurt of fame, the effects of WannaCry ransomware had certainly left its mark. According to McAfee Labs’s estimates from mid-May 2017, the ransomware struck over 10,000 organizations, and 200,000 individuals across 150 countries, collecting at least US$145,168.96 in just 20 days. It’s not like any organized crime we’ve known, since cartels and black markets take decades to consolidate its influence and profits. In fact, ransomware has a relatively short history compared to regular malware, such as viruses, trojans, and adware.
The earliest instances of ransomware were first spotted in Russia as early as 2005. Their encryption methods were primitive, in comparison to modern strains like CryptoLocker and WannaCry. A 2006 ransomware called TROJ_CRYZIP.A zipped particular file types (.doc, .xls, .jpg, etc.) with password protection, and demanded US$300 in ransom via a simple .txt file.
It was only after 2012 when ransomware started actively targeting other territories, such as Europe and North America. One of the more memorable examples was Reveton, which uses location tracking to display a fake enforcement agency notification that’s relevant to the victims. For example, a US-based user would get a fake FBI notification about their alleged “illegal activities” online. Folks in France would see the same message in French, while it spoofed the Gendarmerie Nationale emblem instead. According to cybersecurity blog Malwarebytes Lab, this variant still persisted in March 2016, and further improvements allow it to target Mac OS X users. It also included a wider panel of impersonated authorities, such as the Royal Canadian Mounted Police and Europol.
Cybersecurity firms in general have a consensus on what ransomware entails. According to Kaspersky Labs, Trend Micro, and Norton by Symantec, it is really just another variant of malware that cripples your system, usually through encryption methods. What sets it apart is the ransom fee it demands, promising victims access back to their own data once it’s paid up.
Continue reading your story on the app
Continue reading your story in the magazine
Google I/O 2021
Google’s annual developer conference around everything the company does. While a lot of the technologies announced just fade into the background of what makes every Google service work, and therefore too boring for the everyman to read about, here are the top three that we’d love to see become reality.
XIAOMI MI 11 - THE AFFORDABLE FLAGSHIP
The Xiaomi Mi 11 has all the core features of what Xiaomi wants to offer in a 2021 flagship, without some of its over-the-top features from the Mi 11 Ultra. For instance, Mi 11 doesn’t have the secondary AMOLED display, multi-point direct ToF laser focusing, or IP-rated water resistance, all of which is available on the Mi 11 Ultra.
NIER REPLICANT VER1.22474487139…
POST APOCALYPSE GONE MILD
From CPU To XPU
WE WANT TO HELP CUSTOMERS CAPITALISE GROWTH OPPORTUNITIES IN THE CLOUD, AI, 5G, AS WELL AS THE INTELLIGENT AND AUTONOMOUS EDGE.
Arlo Essential Video Doorbell Wire-Free
Connecting Door To Phone
Ashwalkers: A Survival Journey
A Surprisingly Complex Apocalypse
Resident Evil Village
A carnival of horrors
Apple 12.9-Inch iPad Pro (2021) - Ridiculously Powerful
M1 was Apple’s first custom processor, and never in my years of writing about notebooks have I seen a processor that’s so powerful and efficient. In my review, I said it rewrote the notebook rulebook. So what did Apple do next? Naturally, it took the M1 chip and put it in the iPad Pro.
No Rest For The Wicked
With not one, not two, but three Diablo games in the pipeline and well on their way to release, I don’t think I can stress this enough: it’s a fantastic time to be a fan of Blizzard’s beloved dungeon-crawler franchise. On our end, we’ve already thrown a few punches at both Immortal and D2R’s Technical Alpha sessions, and so far, we’re quite satisfied with what they’ve got on the menu.
A Relaxing Thrill Ride
Monster Hunter: Rise
Why did Apple's original Hom fail? Let's count the reasons
Apple’s first smart speaker just met a surprising end, but it was one we could see coming
4 great ways to make working from home easier
We’re all about simplifying life, right down to the basic day-to-day tasks–and these products will up your work-from-home game.
GOOGLE SIGNS DEAL WITH WNBA TO HELP CHAMPION WOMEN'S SPORTS
The WNBA signed a multi-year deal with Google this week to be the presenting partner for the league’s playoffs, part of the technology giant’s efforts to help champion women’s sports.
Android loses a huge innovator as LG quits making phones
LG phones pushed the bleeding edge of innovation, but it wasn’t enough.
DUTCH GOVERNMENT PAUSES CORONAVIRUS APP OVER DATA LEAK FEARS
The Dutch government has temporarily disabled its coronavirus warning app amid data privacy concerns for people who have the app installed on phones using the Android operating system.
Google Nest Hub (2nd Gen): Now With Sleep Tracking
The original Nest Hub was a perfectly capable smart display, but as Google’s only model, it felt a bit lacking compared with Amazon’s Alexa-powered lineup.
10 Simple Ways to Make Better To-Do Lists
How effective is your to-do list? Does it help you plan your day and nudge you to prioritize the right tasks? Or is it a never-ending inventory of tasks you feel guilty for not having done yet, and now you’re not going to do any of them? A good to-do list should serve you. You should not be at its mercy.
Marshall Uxbridge Voice
A stylish and powerful compact speaker
6 apps that take you to a VR world
Grab a headset and jump into virtual reality
AI has a Big Tech Problem
A handful of companies dominates not only how artifical intelligence is developed but critiqued. It's time for that to change