The CryptoLocker ransomware is still raging on-line and on users and companies computers, while new details about the source of this dangerous file-abducting trojan propagation come out and willing developers are trying to hinder the infection spreading. The criminal gang which created the malware even comes up with new ways to take money from users affected by the threat, even though in doing so it is forced to contradict itself.
A new ransomware for Windows PCs is roaming on-line, it’s called CryptoLocker and brings a very dangerous destructive potential. Security enterprise Sophos warns - via Naked Security - users and system admins about the new threat, its features and the fact that the “prevention is better than a cure” rule is true now more than ever. Curing the damages of a CryptoLocker infection, Sophos warns, is impossible for the time being.
July has been a noteworthy month for fans of the not so trivial arts of multiboot and hard disk data encryption, which have been able to profit by the release of updated versions for two of the best utility software out there: NeoSmart Technologies released version 2.0(.1) of the EasyBCD advanced bootloader, while the so called TrueCrypt Developers Association brought to 7 the version number of its powerful, open source encryption software.
A dangerous malware breed skilled in cryptographic techniques is coming back under the spotlight. Trend Micro has spotted in the wild a new Gpcode variant, the trojan that since 2005 has let everybody know the meaning of the world ransomware, that is a type of malware expressly designed to encrypt the user’s data files asking afterward for a money ransom to restore them.
The tense fight between microchip and the pair plate+head has reached a new high in these days, as manufacturers have announced the introduction of technologies able to make on the one hand more desirable and secure the traditional magnetic hard disks, on the other hand more performing the always expensive solid state disks (SSD) based on NAND flash memory chips.