{"id":23052,"date":"2016-06-02T18:49:54","date_gmt":"2016-06-02T18:49:54","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3836533"},"modified":"2016-06-02T18:49:54","modified_gmt":"2016-06-02T18:49:54","slug":"ransomware-and-the-cloud-cloudexpo-infosec-datacenter-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/ransomware-and-the-cloud-cloudexpo-infosec-datacenter-security\/","title":{"rendered":"Ransomware and the Cloud | @CloudExpo #InfoSec #DataCenter #Security"},"content":{"rendered":"<p>Ransom Trojans have evolved over time. The newer variants target files on a computer\u2019s local drives, network shares and cloud paths alike.<br \/>\nIt&#8217;s been years since it became obvious that crypto isn&#8217;t necessarily usable for benign purposes only. Back in the day, a variety of data encryption techniques were contrived to protect sensitive communication against MITM (man-in-the-middle) attacks and similar interception attempts. The creators of file-encrypting ransomware, however, have ventured to add a malicious component to the mix, using both symmetric and asymmetric algorithms to lock their victims&#8217; data and hold it for ransom.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3836533\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransom Trojans have evolved over time. The newer variants target files on a computer&rsquo;s local drives, network shares and cloud paths alike.<br \/>\nIt&#8217;s been years since it became obvious that crypto isn&#8217;t necessarily usable for benign purposes only. Back in the day, a variety of data encryption techniques were contrived to protect sensitive communication against MITM (man-in-the-middle) attacks and similar interception attempts. The creators of file-encrypting ransomware, however, have ventured to add a malicious component to the mix, using both symmetric and asymmetric algorithms to lock their victims&#8217; data and hold it for ransom.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3836533\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-23052","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/23052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=23052"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/23052\/revisions"}],"predecessor-version":[{"id":23053,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/23052\/revisions\/23053"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=23052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=23052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=23052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}