Explore Ransomware on Experts Exchange

Expert Solutions for Your Tech Problems

Ransomware

Ransomware is malicious software, designed to block data access in order to extort money. As a form of malware, ransomware is most often used to in...

Read more
  • 626 Content
  • 365 Contributors

Expert Spotlight
Server Administrator

I have over 30 years in the IT industry. During this time I have worked with a variety of products in a variety of industries.

Article

Run ESXi in Secure Boot Mode? – Backup Up Your TPM Recovery Keys

Secure Boot is a mode of running VMware ESXi server that helps prevent malicious files and programs like ransomware from being loaded on to it. This is due to the fact it will only allow signed software packages. However, the recovery keys need to be backed up in the event of a hardware failure.
Article
Pharma under attack

Ransomware Attacks on Pharma and Healthcare Industries

There is an increased attack on Pharmaceutical and healthcare providers that has massive implications on new drug discovery, clinical trials , manufacturing and directly impacts human lives. I had written an article on my blog specific to ransomware attacks on the Indian Pharma and healthcare sector
Article

Selecting a Backup and Recovery Solution

In an organization, selecting a backup and recovery product can be a complicated task. This gives an opinion and a process that I use and hope that others find helpful.
Article
Cyber Infrastructure 3.0

Acronis Cyber Infrastructure 3.0 released!

Meet modern IT demands with a scale-out, cost-efficient and multi-purpose solution for the Edge.
Article

Enterprises Gain Enhanced Cyber Protection with Acronis Backup Support for SAP HANA

Enterprise organizations are now responsible for more data than ever before. In fact, more data is

Article
Defeating Spammers Tricks

Power of Mailwasher Pro - Part 5 - Defeat spammers tricks easily

1
This is Part 5 - [Final] - of my series about using Mailwasher which shows you a way to defeat spammers ever-changing tricks and tactics to get past your spam control, as well as a few tips to improve the performance of Mailwasher as well. Enjoy...
Article

Acronis Active Protection takes the fight to cryptojacking

While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.
Article
Artificial Intelligence

IT Pros Agree: AI and Machine Learning Key for the Future of Security

2
We’d all like to think our company’s data is well protected, but when you ask IT professionals they admit the data probably is not as safe as it could be.
Article
Acronis Backup - The most secure backup!

The Five Tenets of the Most Secure Backup

Data loss can hit a business in any number of ways, from employees accidentally deleting information and hardware failure to natural disasters and cyberattacks wiping out your systems.
Article

The Next-Gen Tech That Would Have Saved Atlanta $17 Million

In April 2018, the "SamSam" ransomware attack crippled the city of Atlanta. The recovery that followed provides a stark reminder of the real costs associated with ransomware – both technologically and financially.
Article

How Acronis Stopped $104 Million in Ransomware Damages

4
Newly released Acronis True Image 2019 includes their battle-tested anti-ransomware defense
Article
Ransomware

What is ransomware and how does it works?

1
Ransomware is a malicious software that encrypts a victim's data and makes it unusable until the victim pays the attacker a ransom fee in Bitcoin. Ransomware uses cryptography technology. Attackers decrypt the files only if the victims pays the bitcoin amount within a certain period of time.
Article
Mailwasher Pro

Learn to use the POWER of Mailwasher Pro Part-4

3
Tutorial: In this part of my series, I'll be explaining how to set up an IMAP connection in Mailwasher and Outlook and also explain the differences of how Mailwasher handles POP and IMAP connections. Enjoy!
Article
Mailwasher Pro

Learn to use the POWER of Mailwasher Pro Part-3

3
An explanation of How the Recycle Bin works and how to configure it so that it works for you just as you want. Enjoy!
Article
Mailwasher Pro

Learn to use the POWER of Mailwasher Pro - Part 2

2
Part 2 of my series about Mailwasher Pro. Learn about what Mailwasher is and how to massage this tool to your own specifications with some powerful configuration options that many users overlook, and by doing so, you can, like me, enjoy a totally spam-free inbox. Enjoy...
Article
Mailwasher Pro

Learn to use the POWER of Mailwasher Pro - Part 1

3
Mailwasher Pro by Firetrust is powerful anti-spam utility, ideal for managing both POP and IMAP connections. Read this series of articles to learn how to setup and take advantage of its great features!
Article
Internet of Ransomware Things

Ransomware: One Year after WannaCry - are we any better off?

6
It has been a full year since one of the worst ransomware attacks we have seen, the Wannacry attack last year. The attacks have changed. The way we are addressing them has also changed, but maybe not enough.
Article

Exchange Server injected with ransomware? What to do now?

This is a very interesting topic. Ransomware has been around for a while but has increased drastically over the last year or so.
Article
Ransomware Defeated

Decrypting Cryakl 1.4.0.0 / 1.4.1.0 FAIRYTAIL Ransomware

118
Feeling responsible for an unfortunate ransomware infection on my parent's network, persistence paid off as I was able to decrypt a strain of ransomware that was not previously (or at least publicly) cracked. I hope this helps others out there affected by the same strain. CL 1.4.0.0 Fairytail
Article

What Threats Will You Face in 2018?

2017 was a scary year for cyber security. Hear what our security experts say that hackers have in store for us in 2018.

Do more with Experts Exchange.


Get Answers

Join a Group Discussion

Collaborate

Monitor your Site

Explore solutions and more