{"id":43348,"date":"2020-09-29T01:46:00","date_gmt":"2020-09-29T05:46:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=43348"},"modified":"2020-09-29T01:46:00","modified_gmt":"2020-09-29T05:46:00","slug":"the-roots-and-future-of-ransomware","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/09\/29\/the-roots-and-future-of-ransomware\/","title":{"rendered":"The Roots and Future of Ransomware"},"content":{"rendered":"\n<p>Imagine a thief walks into your home and rummages through your personal belongings. But instead of stealing them, he locks all your valuables into a safe and forces you to pay a ransom for the key to unlock the safe. What choice do you have?<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2017\/10\/06\/20\/22\/fantasy-2824500__340.jpg\" alt=\"\" width=\"765\" height=\"330\"\/><\/figure><\/div>\n\n\n\n<p>Substitute your digital space for your home and encryption for the safe, and you have what\u2019s known as ransomware. <strong>Ransomware<\/strong> is a type of virus or malware. After the initial infection, your files are encrypted and a note appears demanding payment\u2013usually in the form of cryptocurrency such as bitcoin because transactions can\u2019t be stopped or reversed. Once your files are encrypted, you can\u2019t access them until you pay the ransom.<\/p>\n\n\n\n<p>The roots of <strong>ransomware <\/strong>can be traced back to 1989. The virus, known as PS Cyborg, was spread through diskettes given to attendees of a World Health Organization International AIDS conference. Victims of PS Cyborg were to mail $189 to a P.O. box in Panama to restore access to their data.<\/p>\n\n\n\n<p>Historically, ransomware targeted individual personal computer users. Today, the big money is in attacking businesses. Most of these infections go unreported because companies don\u2019t want to expose themselves to further attacks or reputational damage.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.channelfutures.com\/from-the-industry\/the-roots-and-future-of-ransomware&amp;ct=ga&amp;cd=CAEYCyoUMTQyMzkyMDI4MDE5MjkzNDE1NjkyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNFDwEB7ylwLB_s2BBPsUJKJC5Sybg\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine a thief walks into your home and rummages through your personal belongings. But instead of stealing them, he locks all your valuables into a safe and forces you to pay a ransom for the key to unlock the safe. <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/09\/29\/the-roots-and-future-of-ransomware\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-43348","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/43348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=43348"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/43348\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=43348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=43348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=43348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}