Evolving Threat Agents: Ransomware and their Variants

@article{Singh2017EvolvingTA,
  title={Evolving Threat Agents: Ransomware and their Variants},
  author={T. Singh},
  journal={International Journal of Computer Applications},
  year={2017},
  volume={164},
  pages={28-34}
}
  • T. Singh
  • Published 2017
  • Computer Science
  • International Journal of Computer Applications
  • This paper studies different kinds of ransomware attacks right from its point of origin to the latest kind of ransomware attacks. As this malware threat has reported a significant increase in the number of report incidents happenings in countries like USA, UK and India. A study of its evolution provides for its first line of defense. So the paper offers an awareness of different kinds of ransomware variants from 1989 to 2017. It also analyses the effects of this malware on Android and Windows… CONTINUE READING
    3 Citations

    Figures and Topics from this paper

    References

    SHOWING 1-8 OF 8 REFERENCES
    Bluff Ransomware attacks Bamboozle British Businesses accessible at www.citrix
      Bluff Ransomware attacks Bamboozle British Businesses accessible at www.citrix.com 11. 5 Methods for detecting Ransomware activity at www.netfort.com/blog/methods-for-detecting-ransomware-activity 12
      • Ransomware Dos and don'ts: Protecting Critical data accessible at www.symantec.com 10
      Methods for detecting Ransomware activity at www.netfort.com/blog/methods-for-detectingransomware-activity
        Ransomware Dos and don'ts: Protecting Critical data accessible at www.symantec
          Ransomware and recent variants accessible at www.uscert.gov
            Ransomware attackers are going old school with social engineering accessible at www.continuum
              Ransomware attackers are going old school with social engineering accessible at www.continuum.cisco.com 3. Influences on ransomwares evolution and predictions for the future challenges by
              • Ransomware Recap :January 14-29 2017 accessible at www.trendmicro.com 7. Ransomware Recap