How to fight the Cryptolocker virus? - PowerPoint PPT Presentation

About This Presentation
Title:

How to fight the Cryptolocker virus?

Description:

Cryptolocker viruses are the latest and most damaging Windows virus in a series of recent ransomware Trojans. It relatively large of money it demands, combined with the tight deadline, make it far more aggressive than other similar viruses. – PowerPoint PPT presentation

Number of Views:253

less

Transcript and Presenter's Notes

Title: How to fight the Cryptolocker virus?


1
How to fight the Cryptolocker virus?
http//www.combatpcviruses.com
2
How To Fight CryptoLocker Virus
You dont have to pay any money for getting
access to your files. If you are working on your
working on the Windows computer, getting stuff
but if you came to know that your personal files
gets rapidly encrypted then you cannot able to
access them. But suddenly an alert appears on the
screen that you have to pay a amount of money in
96 hours or you will lose all your encrypted
personal files forever. With this a countdown
starts to tick on the screen. Cryptolocker
viruses are the latest and most damaging Windows
virus in a series of recent ransomware Trojans.
It relatively large of money it demands, combined
with the tight deadline, make it far more
aggressive than other similar viruses.  
http//www.combatpcviruses.com
3
What harm can this viruses do to you?
  • Can disrupt the proper functioning and
    performance of your PC.
  • Steal your crucial personal and financial
    information ( such as bank details, passwords,
    credit card and debit card details, etc.)
  • Conduct any operation online using your ID and
    email addresses.
  • Damage your hard drive completely.
  • Encrypts your files and restrict your access.

http//www.combatpcviruses.com
4
Preventing an Infection
CryptoLocker is dangerous because of its
infection rate. It gets spread though the email
that appears to be a tracking notification. It
is more than opening an email that spreads the
viruses. You need to open the email and actually
download the zip file inside it. By hiding inside
the zip file is a double-extension file such as
.pdf.exe. the .exe files makes the CryptoLocker
run on your computer, while the innocuous .pdf
extension hides the files true function. So far
virus has been infecting PCs running Windows 7,
Vista, or XP, but that doesnt mean it wont
eventually infect PCs running Windows 8, or even
Macs.  So what you should do? Run the antivirus
software. Make sure that you keep regular and
recent backups of all your files. It doubles your
business that shares a drive or folder that is
across multiple computers, as CryptoLocker is
known to target shared files for encryption
first.
5
Eradicating an Infection
It is good that you take precaution but what if
you already get infected? You need to figure out
what has been lost? You can assist that locating
the files have been encrypted. Do you have
backups of the files? If you dont have backups,
you need to check the Windows System Restore
files that sometimes automatically back up the
computer for you? If you do not have the backup
then it is the time to wipe your computer of
virus.
http//www.combatpcviruses.com
6
Does Paying Ransom Work?
Most of the victims of this ransomeware have
reported that the paying the ransom does work, so
is there a hope to get back the encrypted files
back. Theres no way to track the criminals
through the decentralized currency they accept
the payment through, and their encryption methods
which are simply too strong to unlock without
decrypting key. With no way it is better to
prevent CryptoLocker in sight. The most important
thing that you must make sure is that you know
about the virus before they get infected.
http//www.combatpcviruses.com
7
Practice simple techniques for safe browsing and
email habits
  • Store backup files of f line.
  • Think before you click.
  • Consider that you be careful whether the email
    messages, links or attached files are from a
    legitimate source. You need to turn on the
    firewall of your operating system that allows you
    to prevent undesirable applications from running
    or installing without your express permission.
  • Activate the security features of your web
    browser. For example, use SmartScreen Filter on
    Internet Explorer, Phishing and Malware
    Protection on Google Chrome and Block Attack
    Sites on Mozilla Firefox.

8
For More Information
Log On To
http//www.combatpcviruses.com
Write a Comment
User Comments (0)
About PowerShow.com