{"id":22249,"date":"2017-03-08T15:38:05","date_gmt":"2017-03-08T15:38:05","guid":{"rendered":"http:\/\/pre-production.taftcollege.edu\/echo-online\/?p=22249"},"modified":"2017-03-08T15:38:05","modified_gmt":"2017-03-08T15:38:05","slug":"avoid-negotiating-with-cyber-criminals","status":"publish","type":"post","link":"https:\/\/archive.taftcollege.edu\/echo-online\/blog\/2017\/03\/08\/avoid-negotiating-with-cyber-criminals\/","title":{"rendered":"Avoid Negotiating With Cyber Criminals"},"content":{"rendered":"<p>By Alberto Muro<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-22254 size-large\" src=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/web_browser_w1024-1024x720.jpeg\" width=\"1024\" height=\"720\" srcset=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/web_browser_w1024.jpeg 1024w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/web_browser_w1024-300x211.jpeg 300w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/web_browser_w1024-768x540.jpeg 768w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/web_browser_w1024-700x492.jpeg 700w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The birth of the internet was accompanied by the advancement of technology which allowed house holds to become connected to\u00a0the world wide web. People around the world were\u00a0also introduced to the new concept\u00a0of electionic mail (e-mail) which became a reliable means to transmit messages within moments.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-22252 size-full\" src=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/MailPostMalwareOnWordPress.jpg\" width=\"660\" height=\"400\" srcset=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/MailPostMalwareOnWordPress.jpg 660w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/MailPostMalwareOnWordPress-300x182.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>The development of the internet also introduced online users to the threat of malware attacks. Unlike viruses, which cause system corruption and the destruction of data, malware is rouge hardware that is designed to commandeer computers and inflict damage to online users by gaining access to their personal information.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-22251 size-large\" src=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection-1024x745.jpg\" width=\"1024\" height=\"745\" srcset=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection-1024x745.jpg 1024w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection-300x218.jpg 300w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection-768x559.jpg 768w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection-700x509.jpg 700w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection-1100x800.jpg 1100w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/antivirus-protection.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Online security software soon began appearing\u00a0in household and company computers to combat the threat of online attacks. The most noteable software, Norton Anti-virus, is one of many examples of exclusive hardware designed to rejuvenate your computer to its previous function condition.<\/p>\n<p>As online security increases, the threat of malware attacks shift their focus through other means. Often, people forget that they are vulnerable online despite having up to date software security. Online criminals have shifted their malware attacks through personal e-mails, and the most common victims are people with little knowledge about online security.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-22250 size-large\" src=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen-1024x576.jpg\" width=\"1024\" height=\"576\" srcset=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen-1024x576.jpg 1024w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen-300x169.jpg 300w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen-768x432.jpg 768w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen-700x394.jpg 700w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen-1100x619.jpg 1100w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/computer-lock-screen.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Now imagine opening an e-mail attachment that your bank apparently provided, and after downloading it and opening the file your computer screen locks and goes dark. Moments later a large emblem to\u00a0the Federal Bureau of Investigation appears along with text information\u00a0stating that you have been involved with illegal activity. It is a frightening scenario that causes panic even though the computer user has no prior convictions, at the end of the message there is a demand to pay a fine within 72 hours or you will be arrested.<\/p>\n<p>It sounds like your computer is being held hostage, which is exactly what is occuring thanks to that &#8220;urgent&#8221; e-mail attachment from your bank. This kind of newly developed malware attack is called Ransomware, and what happens is that attackers access your computer and render it useless against any intervention unless you send money to the email provided.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-22253 size-full\" src=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/internetDanger.png\" width=\"975\" height=\"640\" srcset=\"https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/internetDanger.png 975w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/internetDanger-300x197.png 300w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/internetDanger-768x504.png 768w, https:\/\/archive.taftcollege.edu\/echo-online\/wp-content\/uploads\/sites\/46\/2017\/03\/internetDanger-700x459.png 700w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/p>\n<p>In order to\u00a0prevent attacks such as ransomware, do not click on links or websites that are unfamiliar or unsafe. Enable pop-up blockers as they prevent uneccesary windows\u00a0from opening and allowing malware to enter your system. Be sure to back-up your files as ransomware often requires one to reformat their computers. Most importantly, do not install unfamiliar software or extensions as they are created with the intention to cause harm to computers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Alberto Muro        The birth of the internet was accompanied by the advancement of technology which allowed house holds to become connected to\u00a0the world wide web. People around the world were\u00a0also introduced to the new concept\u00a0of electionic mail (e-mail) which became a reliable means to transmit messages within<\/p>\n","protected":false},"author":44,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-22249","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/posts\/22249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/comments?post=22249"}],"version-history":[{"count":3,"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/posts\/22249\/revisions"}],"predecessor-version":[{"id":22257,"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/posts\/22249\/revisions\/22257"}],"wp:attachment":[{"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/media?parent=22249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/categories?post=22249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.taftcollege.edu\/echo-online\/wp-json\/wp\/v2\/tags?post=22249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}