Ransomware: of things within the next 10

Ransomware: The next 10 years is likely to pay significant dividends for hackers Despite efforts from cybersecurity experts to secure data, hackers are using and will continue to use ransomware1 to run billion-dollar scams that typically target small to medium sized businesses. Even though attacks    might not always have the few feasible solutions insight. Potential reasons why this industry is thriving are:1.     Modern technology has not yet innovated successful defenses that completely protects against and prevents ransomware. Since the beginning of its emergence, numerous defenses have been created to protect PC’s and networks from hackers.

2.     he evolution and availability hacking kits has Well established ransomware campaigns can target 90,000 victims a day and can net $34 million annually (Resin, 2016).This type of malware is becoming more successful in extorting money from its victims every year. According to Kaspersky labs, the number of victims attacked by crypto-ransomware rose by 550 percent, from 131,000 in 2014-2015 to 718,000 in 2015 and 2016,”. Based off the recent increases in the number of attacks, the large sums of ransoms paid, and the slow adoption of security defenses, we estimate that ransomware will significantly disrupt the internet of things within the next 10 years.This graph show the evolution of ransomware tools over a three-year period: 1 Ransomware is a category of malicious software which, when run, disables the functionality of a computer in some way. The ransomware program displays a message that demands payment to restore functionality.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

The malware, in effect, holds the computer ransom. In other words, ransomware is an extortion racket.            Refrences Turkel, Dan (2016, April, 7).

Victims Paid More than $24 million to Ransomware Criminals in 2015. Business Insider. Retrieved from http://www.businessinsider.

com/doj-and-dhs-ransomware-attacks-government-2016-4 (2015, November). 2016 Threats Predictions. McAfee. Retrieved from http://www.mcafee.

com/us/resources/misc/infographic-threats-predictions-2016.pdf Sherman, Matt (2015, February, 18). Ransomware Do’s and Don’t’s: Protecting Critical Data. Symantec. Retrieved from http://www.symantec.com/connect/blogs/ransomware-dos-and-donts-protecting-critical-data


I'm Ruth!

Would you like to get a custom essay? How about receiving a customized one?

Check it out