Tips From Semalt: How To Safeguard Yourself From Blackmail Trojan Locky

Page 1

23.05.2018

Tips From Semalt: How To Safeguard Yourself From Blackmail Trojan Locky

For the past one week, the hostile blackmail trojan Locky has been affecting computers globally. Media reports suggest that in most cases, the virus uses macros present in Microsoft Of ce document as a channel to nds its way onto the network. The virus works by encrypting all the data on the infected computer. For instance, when a recipient opens a le, for instance, having a counterfeit invoice, Locky encodes all the data stored in the computer. The user is then asked to pay a certain amount of money as a ransom to enable the data to be decrypted. The request appears as a blackmail letter on the screen. The Customer Success Manager of Semalt, Ivan Konovalov, explains how to protect yourself from blackmail trojan Locky.

Free Retarus E-Mail Security upgrade guarantees optimum safety

https://rankexperience.com/articles/article1074.html

1/3


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Tips From Semalt: How To Safeguard Yourself From Blackmail Trojan Locky by semaltcompany - Issuu