{"id":33019,"date":"2019-12-03T03:18:00","date_gmt":"2019-12-03T08:18:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33019"},"modified":"2019-12-03T03:18:00","modified_gmt":"2019-12-03T08:18:00","slug":"6-ransomware-attacks-you-need-to-watch-out-for","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/12\/03\/6-ransomware-attacks-you-need-to-watch-out-for\/","title":{"rendered":"6 ransomware attacks you need to watch out for"},"content":{"rendered":"\n<p>By Mark Jones &#8211; It doesn\u2019t matter if you\u2019re working on a home computer with lots of sensitive documents and family photos, or if you\u2019re a small business owner with years of client files and tax records. You\u2019re likely storing more data than you realize.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2015\/09\/09\/20\/17\/work-933061__340.jpg\" alt=\"\" width=\"273\" height=\"175\"\/><\/figure><\/div>\n\n\n\n<p>Cybercriminals know you value your files, so they threaten you with <strong>ransomware.<\/strong> The most common way to fall victim is through phishing attacks from malicious links or corrupt documents. If you don\u2019t pay, there goes all your data. Worse, you can pay and the criminal could delete it anyway.<\/p>\n\n\n\n<p><strong>Ransomware<\/strong> strains can cripple tons of systems all over the globe \u2014 it just depends on how successful the distribution campaign is behind the strain.<\/p>\n\n\n\n<p>Emsisoft recently published a report detailing global<strong> ransomware<\/strong> stats for Q2 and Q3 of 2019. The report is based on data submitted to the company between April 1 and September 30. It includes more than 230,000 submissions.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.komando.com\/safety-security-reviews\/6-ransomware-attacks-you-need-to-watch-out-for\/605708\/&amp;ct=ga&amp;cd=CAEYDioTNDcwNDEyMTY3ODc0NzYxOTYxNDIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNEmxOHrvx2dJ4sOWEBeEwiJZSHvog\">Read On:<\/a><\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"Left\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B07PNFRCZS&#038;asins=B07PNFRCZS&#038;linkId=813ab87f04642c05b055afbea9657d3f&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>By Mark Jones &#8211; It doesn\u2019t matter if you\u2019re working on a home computer with lots of sensitive documents and family photos, or if you\u2019re a small business owner with years of client files and tax records. You\u2019re likely storing <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/12\/03\/6-ransomware-attacks-you-need-to-watch-out-for\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-33019","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33019"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33019\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}