23.05.2018
Tips From Semalt: How To Safeguard Yourself From Blackmail Trojan Locky
For the past one week, the hostile blackmail trojan Locky has been affecting computers globally. Media reports suggest that in most cases, the virus uses macros present in Microsoft Of ce document as a channel to nds its way onto the network. The virus works by encrypting all the data on the infected computer. For instance, when a recipient opens a le, for instance, having a counterfeit invoice, Locky encodes all the data stored in the computer. The user is then asked to pay a certain amount of money as a ransom to enable the data to be decrypted. The request appears as a blackmail letter on the screen. The Customer Success Manager of Semalt, Ivan Konovalov, explains how to protect yourself from blackmail trojan Locky.
Free Retarus E-Mail Security upgrade guarantees optimum safety
https://rankexperience.com/articles/article1074.html
1/3