Tuesday, January 14, 2014

Beat Ransomware - The Ultimate Netiquette Offender

Email etiquette and Netiquette, by their very definition are diametrically opposed to ransomware. Being hacked, whether in a small or a large way, is an infringement which is both malicious and mean-spirited. The article below outlines a set of procedures which will, hopefully, provide relief for anyone unfortunate enough to be infected by malware. Before any of that happens, remember what Ben Franklin said:
 
"An ounce of Prevention is Worth a Pound of Cure"























How to rescue your PC from ransomware

Jan 13, 2014 09:15 am | PC World

Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

by Eric Geier

With the nasty CryptoLocker malware making the rounds--encrypting its victims' files, and then refusing to provide the unlock key unless a payment of $300 is made via Bitcoin or a prepaid cash voucher--ransomware is back in the spotlight.

You can remove many ransomware viruses without losing your files, but with some variants that isn't the case. In the past I've discussed general steps for removing malware and viruses, but you need to apply some specific tips and tricks for ransomware. The process varies and depends on the type of invader. Some procedures involve a simple virus scan, while others require offline scans and advanced recovery of your files. I categorize ransomware into three varieties: scareware, lock-screen viruses, and the really nasty stuff.

Scareware

The simplest type of ransomware, aka scareware, consists of bogus antivirus or clean-up tools that claim they've detected umpteen issues, and demand that you pay in order to fix them. Some specimens of this variety of ransomware may allow you to use your PC but bombard you with alerts and pop-ups, while others might prevent you from running any programs at all. Typically these invaders are the easiest type of ransomware to remove.

Lock-screen viruses

Next is the ransomware variety I call lock-screen viruses, which don't allow you to use your PC in any way. They display a full-size window after Windows starts up--usually with an FBI or Department of Justice logo--saying that you violated the law and that you must pay a fine.

The really nasty stuff

Encrypting malware--such as CryptoLocker--is the worst variant, because it encrypts and locks your personal files until you pay up. But even if you haven't backed up your files, you may have a chance to recover your data.

Removing ransomware

Before you can free your hostage PC, you have to eliminate the hostage taker.
If you have the simplest kind of ransomware, such as a fake antivirus program or a bogus clean-up tool, you can usually remove it by following the steps in my previous malware removal guide. This procedure includes entering Windows' Safe Mode and running an on-demand virus scanner such as Malwarebytes.

If the ransomware prevents you from entering Windows or running programs, as lock-screen viruses typically do, you can try to use System Restore to roll Windows back in time. Doing so doesn't affect your personal files, but it does return system files and programs to the state they were in at a certain time. The System Restore feature must be enabled beforehand; Windows enables it by default.

+++++++++++++++++++++++++++++++

About Netiquette IQ:
My book, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email" and the Kindle version are now available on Amazon. Please visit my profile at:



My other sites of Netiquette resources include:


www.netiquetteiq.com - website

www.blogtalkradio.com/netiquetteiq - radio show

www.tabularosa.net Internet products and services website.


 Paul Babicki and Frank Kovacs are co-authoring a new book on Netiquette IQ for job seekers, recruiters and employers (no official title as yet!). This book is a follow up to Paul’s current release. This book will be a part of the forthcoming Netiquette IQ compendium featuring a series of books on specific areas of Netiquette; education, sales, social media, etc. We would desire and encourage feedback from anyone who would like to contribute their thought ideas, even a segment to include in the book.

We wish to have the book to cover as many pertinent topics as possible for the job seeker, recruiter and employer. There will be an acknowledgement page in the book listing those whose ideas or suggestions are used. The persons with the five top ideas will be sent a complimentary signed copy of my current book and a copy of the new one. Comments will be closed on 1/31/2014. Kindly submit your suggestion(s) to my blogpost of 12/26/2013 in the comment field.

 Happy emailing and good Netiquette!
 #Netiquette

No comments:

Post a Comment