Ransomware Decryption Tool

decrypt-ransomware-files

Berikut ini beberapa informasi berkaitan dengan Decryption Tool untuk WannaCrypt/WannaCry maupun Ransomware lainnya:

  • bleepingcomputer.com | With the Success of WannaCry, Imitations are Quickly In Development
  • thehackernews.com | WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom
  • nomoreransom.org |DECRYPTION TOOLS
  • bankinfosecurity.com | WannaCry Ransomware: Tools Decrypt for Free
  • #avast.com | Free Ransomware Decryption Tools

Baca lebih lanjut

Ransomware: WannaCrypt 2.0

042231400_1494726009-wannacry_3

Masih tentang ransomware WannaCrypt. Berikut ini beberapa artikel terkait ransomware WannaCrypt 2.0 yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:

  • thehackernews.com | WannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives
  • nomoreransom.org | PREVENTION ADVICE WannaCry

Baca lebih lanjut

Ransomware: WannaCrypt

ransomware-600x441

Saat ini dan beberapa minggu ke depan akan marak diperbincangkan berkaitan dengan ransomware WannaCrypt. Berikut ini beberapa artikel terkait ransomware WannaCrypt yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:

  • Monitoring Dashboard WannaCrypt
  • blogs.technet.microsoft.com | WannaCrypt ransomware worm targets out-of-date systems
  • kominfo.go.id | Himbauan Agar Segera Melakukan Tindakan Pencegahan Terhadap Ancaman Malware Khususnya Ransomware Jenis WannaCRY
  • medium.com | Can files locked by WannaCry be decrypted: A technical analysis
  • id.wikipedia.org | Serangan perangkat pemeras WannaCry
  • Malware Protection Center – microsoft.com | Ransom: Win32/WannaCrypt
  • idsirtii.or.id | Press Release Pencegahan Ransomware Wannacry ID-SIRTII/CC | Apa itu WannaCry?
  • symantec.com | What you need to know about the WannaCry Ransomware | WannaCry Ransomware: Top 10 Ways Symantec Incident Response Can Help | WannaCry Ransomware: 6 Implications for the Insurance Industry | Data Center Security Server Advanced Stops WannaCry | WannaCry: Ransomware attacks show strong links to Lazarus group | WannaCry Ransomware: Information from Symantec
  • julismail.staff.telkomuniversity.ac.id | Ransomware wannacry

Baca lebih lanjut

Ghost Push possesses Android devices; only version 6.0 is safe

scmagazine.com | Bradley Barth | October 17, 2016

“I ain’t afraid of no Ghost Push?” Better think again if you’re an Android user with a device operating on anything lower than version 6.

Baca lebih lanjut

Ransomware: Cerber

20161005-cerber-1-125x100Berikut ini beberapa artikel terkait Cerber Ransomware yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:

 

  • vaksin.com | Cerber 3: Ransomware yang sadar marketing
  • bleepingcomputer.com | Cerber Ransomware switches to a Random Extension and Ends Database Processes
  • pcrisk.com | Cerber ransomware removal instructions
  • bleepingcomputer.com | Cerber Ransomware switches to .CERBER3 Extension for Encrypted Files
  • bugsfighter.com | How to remove Cerber3 ransomware and decrypt .cerber3 files
  • keonesoftware | Cerber3 ransomware removal: how to decrypt .cerber3 virus files
  • malwarefixes.com |  Remove Cerber3 Ransomware and Decrypt Files
  • bleepingcomputer.com | Check Point releases working Decryptor for the Cerber Ransomware

Baca lebih lanjut

Android malware spreading through Google’s AdSense network

android-malware-02_story

Neowin.net | Justin Luna | Aug 16, 2016

A group of security researchers have recently discovered a new strain of malware targeting the Android operating system by Google, which also uses its advertising network AdSense to spread itself.

Baca lebih lanjut

Is Zepto ransomware the new Locky?

zeptoPaul Ducklin | 05 JUL 2016 | nakedsecurity.sophos.com | Graham Chantry, Fraser Howard and Benjamin Humphrey of SophosLabs 

Beware the latest arrival on the ransomware scene: Zepto. It’s very similar to the well-known Locky malware, and the consequences of an attack are the same: your files end up scrambled, at which point the crooks offer to sell you the decryption key.

Baca lebih lanjut