Ransomware and other Cyber Extortion: Preventing and mitigating increasingly targeted attacks


Download Extortion is the practice of obtaining something, especially money, through force or threats.

There are three main tactics behind cyber extortion: the threat of distributed denial of service (DDoS), the threat of data compromise and ransomware. Especially for organizations whose websites are revenue generating, these actors can cause enormous problems and their attacks can be very costly.

In this paper we will:

- Identify some of the most active extortion actors.
- Understand the motivations, tools and processes used by these actors.
- Compare and contrast different variants of ransomware.
- Learn how to prevent and mitigate these threats.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Apple File System Features Deeper Encryption, SSD Support

    If you provide applications or portals for B2B partners, chances are you're facing some nasty acce Next year, all of Apple's devices will use the new Apple File System, which promises flash/SSD optimization and improved encryption.In 2007, Apple had similar plans for ZFS, a file system designed by Sun Microsystems.
  • 5300c769af79e

    Android O is Coming Android 21, Minutes After the Solar Eclipse

    It’s official: Android O will be released on (or at least named) on August 21, the same day as the big total solar eclipse!To get us hyped, Google has opened up a special landing page over at the Android site with a countdown to the unveiling, which will go down at 2:40PM Eastern (11:40AM Pacific).
  • 5300c769af79e

    Apple and Google's hottest superphones square off

    By contrast, the Pixel 2 XL has Qualcomm’s octa-core Snapdragon 835 processor paired with an Adreno 540 GPU.The design of the iPhone X is a real leap for Apple, while the Pixel 2 XL feels like an evolutionary step for Google.
  • 5300c769af79e

    Samsung DeX Turns Your Galaxy S8 and S8+ Into a Desktop Computer

    Called Samsung DeX, owners of the Galaxy S8 or Galaxy S8+ can plug into a DeX dock wired to a desktop monitor, then have a full desktop experience powered by a smartphone.To sum up what’s happening, you will place your Galaxy S8 into DeX, which is then connected to a desktop monitor, wireless keyboard, and wireless mouse.