Just write response to the post with 150 words (your ownwords) -- There are two
ID: 3849895 • Letter: J
Question
Just write response to the post with 150 words (your ownwords)
--
There are two types of ransomware: lock-screen ransomware, crypto-ransomware. Ransomware is a growing problem for users of mobile devices. Therefore, It is necessary to have better security for mobile apps and systems. Actually, App makers can not do a lot of ensure users have secure devices when they are downloading apps, so we need to keep some tips in mind to keep our mobile device safety. First of all, don't use a jailbroken or rooted device. This removes the built-in security measures the device comes with and you’re left more vulnerable as a result. Moreover, Only download apps from trusted sources, like authorized App stores. Also, when you connect with public network connections, it is better to make sure that network connections safety.
There are some steps to avoid being bitten by mobile app ransomware. The most important is to back up your important data daily. There is a type of ransomare make you pay money to see your data again. In addition, be careful the link in your Email.The primary method of infecting victims with ransomware involves every hacker's favorite bait—the "spray-'n'-pray" phishing attack, which involves spamming you with emails that carry a malicious attachment or instruct you to click on a URL where malware surreptitiously crawls into your machine. Also, we can use the testing security software to test your operating system or network environment safety or not. After you find that you get infection,you need to disconnect all your connection, it is notonly should administrators disconnect infected systems from the corporate network, they should also disable Wi-Fi and Bluetooth on machines to prevent the malware from spreading to other machines via those methods.
I think the most successful way to avoid being bitten by mobile app ransomware is people themselves. We need to back up your data to prepare for this attack. Also, we need to download and browse some apps and websites that are from trust resources. If we cut the unsafe way, the hackers can not easily find a loophole.
Explanation / Answer
lock-screen ransomware blocks our mobile home screen. Once the ransomware reaches into the mobile then the mobile goes out from our accessibility.
In that situation, We cannot do anything with our mobile even we cannot access contact details, mails or personal details which we have saved somerwhere in mobile disk space.
This is done by the hackers and we have to pay to the hackers to get the access back or recover the important docs from mobile.
We have to take care of some points while using mobile so that we can make safe ourself from this type of attacks.
1. We always run our mobile with safe mode features. Safe mode features is given by OS like android , IOS so that other then
play store or apple store , no one can download application in our mobile.
2. We have to avoid the situation by clicking on bed links while checking spam mails, pop ups or visiting some site.
Crypto-ransom ware is the similar type of ransomware like lock-screen ransom ware, but the only difference is that in Crypto-ransom ware,
instead of locking mobile screen, all the files in the mobile gets encrypted and we cannot decrypt by our own.
We need some decryption algorithm of software to do the same.Result of both the ransom ware are same and hackers demands money, bitcoins to get the files decrypted.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.