{"id":21945,"date":"2016-04-19T01:45:00","date_gmt":"2016-04-19T01:45:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3762340"},"modified":"2016-04-19T01:45:00","modified_gmt":"2016-04-19T01:45:00","slug":"ransomware-evolution-cloudexpo-infosec-datacenter-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/ransomware-evolution-cloudexpo-infosec-datacenter-security\/","title":{"rendered":"Ransomware Evolution | @CloudExpo #InfoSec #DataCenter #Security"},"content":{"rendered":"<p>Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer.<\/p>\n<p>And then it started becoming obsolete because an end-user. People were asking themselves: \u201cThat is my computer, would I pay $100 for it? If I don&#8217;t really have data, I\u2019d better format my PC and start all over again.\u201d So, that strategy \u2013 locking access to computers, started becoming obsolete.  What did the bad guys do?  They realized that the previous strategy was only good when the data that computer was holding was valuable. So they started asking ransom for the data, and that&#8217;s what they&#8217;re doing now.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3762340\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer.<\/p>\n<p>And then it started becoming obsolete because an end-user. People were asking themselves: &ldquo;That is my computer, would I pay $100 for it? If I don&#8217;t really have data, I&rsquo;d better format my PC and start all over again.&rdquo; So, that strategy &ndash; locking access to computers, started becoming obsolete.  What did the bad guys do?  They realized that the previous strategy was only good when the data that computer was holding was valuable. So they started asking ransom for the data, and that&#8217;s what they&#8217;re doing now.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3762340\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-21945","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=21945"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21945\/revisions"}],"predecessor-version":[{"id":22328,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21945\/revisions\/22328"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=21945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=21945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=21945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}