• Ransomware And Protection

    From Daryl Stout@454:1/33 to All on Sun Apr 1 10:36:57 2018
    Posted: March 11, 2016 by Wendy Zamora
    Last updated: May 19, 2017

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.03-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Tue May 1 00:02:04 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.04-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Fri Jun 1 17:34:32 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.04-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sun Jul 1 00:02:05 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.05-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Aug 1 00:01:46 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.05-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Sep 1 00:06:09 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.06-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Thu Nov 1 00:06:25 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.06-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - wx1der.dyndns.org (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Dec 1 12:18:21 2018
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.06-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Tue Jan 1 00:01:59 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.06-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Fri Feb 1 00:12:59 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.06-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Fri Mar 1 00:29:49 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.06-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Mon Apr 1 00:27:56 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.07-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed May 1 09:52:06 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.07-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Jun 1 00:02:52 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.07-Win32
    * Origin: ILinkNet: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Thu Aug 1 00:01:36 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.07-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sun Sep 1 00:01:31 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.08-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Tue Oct 1 00:01:26 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.10-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Fri Nov 1 00:01:27 2019
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.10-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Jan 1 00:01:43 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.10-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Jan 1 01:01:24 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.10-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Feb 1 00:07:22 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.10-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Feb 1 01:07:20 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.10-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Mon Jun 1 00:01:16 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Jul 1 00:01:42 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Aug 1 00:01:50 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Tue Sep 1 00:02:39 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Thu Oct 1 00:02:05 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sun Nov 1 00:02:04 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Tue Dec 1 00:02:20 2020
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Fri Jan 1 11:13:26 2021
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.11-Win32
    * Origin: The Thunderbolt BBS - tbolt.synchro.net (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Sep 1 00:01:43 2021
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.14-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Jun 1 00:19:30 2022
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.15-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sun Jan 1 00:07:55 2023
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.15-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)
  • From Daryl Stout@454:1/33 to All on Sat Jul 1 00:07:18 2023
    From Wendy Zamora of Malware Bytes

    Picture this: You've spent the last few weeks working on a tribute
    video for a friend's 30th wedding anniversary. You collected photos
    and video clips and edited them together, laying over a soundtrack
    of their favorite songs. It was a real labor of love.

    When you finally finish the project, you go to copy the file onto
    a DVD and-what the?-a strange message pops up.

    "The files on this computer have been encrypted. You have 96 hours
    to submit payment, otherwise your files will be permanently destroyed."

    You've been hit with ransomware.

    You didn't back up the anniversary video. In fact, you haven't backed
    up any of your files in months. What do you do?

    Unfortunately, when it comes to ransomware, once your files are
    encrypted, there's not much you can do - besides cut your losses or
    pay up. And even if you do pay up, there's a chance you won't get your
    files back, so you're out the files and your cash.

    For businesses around the world, the stakes are even higher. The
    recent outbreak of WanaCryt0r was the largest ransomware attack in
    the history of the Internet, freezing hospital workers out of critical
    data and disrupting operations of organizations in 150 countries.

    These types of attacks can have a devastating impact, from losing
    precious personal data to shutting down hospital services in the
    middle of emergency procedures. In some cases, it's a matter of life
    or death.

    That's why it's so important to prevent ransomware attacks from
    happening in the first place.

    Types of ransomware

    The first step in ransomware prevention is to recognize the different
    types of ransomware you can be hit with. Ransomware can range in
    seriousness from mildly off-putting to Cuban Missile Crisis severe.

    Scareware

    Okay, yes, it's called scareware, but in comparison to other types
    of ransomware-not so scary. Scareware includes rogue security software
    and tech support scams. You might receive a pop-up message claiming
    that a bajillion pieces of malware were discovered and the only way
    to get rid of them is to pay up. If you do nothing, you'll likely
    continue to be bombarded with pop-ups, but your files are essentially
    safe. A quick scan from your security software should be able to clear
    out these suckers. For simple instructions on how to clean an infected computer, check out our step-by-step guide.

    Pro tip: A legitimate cybersecurity software program would not solicit customers in this way. If you don't already have this company's
    software on your computer, then they would not be monitoring you for ransomware infection. If you do have this company's software, you
    wouldn't need to pay to have the infection removed - you've already
    paid for the software to do that very job.

    Screen lockers

    Upgrade to terror alert orange for these guys. When lock-screen
    ransomware gets on your computer, it means you're frozen out of
    your PC entirely. Upon starting up your computer, a full-size window
    will appear, often accompanied by an official-looking FBI or U.S.
    Department of Justice seal saying illegal activity has been detected
    on your computer and you must pay a fine.

    In order to reclaim control of your PC, a full system restore might
    be in order. If that doesn't work, you can try running a scan from
    a bootable CD or USB drive.

    Pro tip: The FBI would not freeze you out of your computer or demand
    payment for illegal activity. If they suspected you of piracy, child pornography, or other cybercrimes, they would go through the
    appropriate legal channels.

    Encrypting ransomware

    This is the truly nasty stuff. These are the guys who snatch up your
    files and encrypt them, demanding payment in order to decrypt and
    redeliver. The reason why this type of ransomware is so dangerous is
    because once cybercriminals get ahold of your files, no security
    software or system restore can return them to you. Unless you pay
    the ransom - they're gone. And even if you do pay up, there's no
    guarantee the cybercriminals will give you those files back.

    Pro tip: The FBI has changed its position on whether folks should
    pay the ransom. They now agree with cybersecurity professionals,
    who advise you to avoid this option. Complying with ransomware
    criminals just opens the door up for future attacks. If, however,
    really valuable files are at stake, you can try to negotiate the
    release of the most important for less money. This should only be
    done as a last resort.

    So what should you do to protect your files from this kind of
    ransomware? Get out in front of it.

    "If any attack in the history of malware proves that you need
    protection in place before the attack happens, encrypting
    ransomware is it," says Adam Kujawa, Director of Malwarebytes
    Labs. "It's too late once you get infected. Game over."

    Ransomware prevention

    The first step in ransomware prevention is to invest in awesome
    cybersecurity - a program with real-time protection that's designed
    to thwart advanced malware attacks such as ransomware. You should
    also look out for for features that will both shield vulnerable
    programs from threats (an anti-exploit technology) as well as block
    ransomware from holding files hostage. Customers who were using
    Malwarebytes 3 Premium, for example, were protected from the
    WanaCrypt0r attack.

    Next, as much as it may pain you, you need to create secure backups
    of your data on a regular basis. You can purchase USBs or an external
    hard drive where you can save new or updated files - just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too. Cloud storage
    is another option, but we recommend using a server with high-level
    encryption and multiple-factor authentication.

    Then, be sure your systems and software are updated. The most recent ransomware outbreak took advantage of a vulnerability in Microsoft
    software. While the company had released a patch for the security
    loophole back in March, many folks didn't install the update - which
    left them open to attack. We get that it's hard to stay on top of an ever-growing list of updates from an ever-growing list of software
    and applications used in your daily life. That's why we recommend
    changing your settings to enable automatic updating.

    Finally, stay informed. One of the most common ways that computers
    are infected with ransomware is through social engineering. Educate
    yourself on how to detect phishing campaigns, suspicious websites,
    and other scams. And above all else, exercise common sense. If it
    seems suspect, it probably is.
    --- SBBSecho 3.20-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)