Saturday , March 29 2025

How ransomware can infect your computer and how to avoid it

More than four in five organisations (82%) were manipulated using ransomware in 2022 according to Proofpoint’s 2023 Phishing report.

Cybersecurity expert VPN Overview reveals the ways in which ransomware can infect your computer and how to avoid it.

1. Phishing and email impersonations  

FBI investigating cyberattack at Oracle, Bloomberg News reports

The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle (ORCL.N), opens new tab that has led to...
Read More
FBI investigating cyberattack at Oracle, Bloomberg News reports

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

CIRT alert Situational Awareness for Eid Holidays

As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
CIRT alert Situational Awareness for Eid Holidays

Cyberattack on Malaysian airports: PM rejected $10 million ransom

Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
Cyberattack on Malaysian airports: PM rejected $10 million ransom

Micropatches released for Windows zero-day leaking NTLM hashes

Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
Micropatches released for Windows zero-day leaking NTLM hashes

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
VMware Patches Authentication Bypass Flaw in Windows Tool

IngressNightmare
Over 40% of cloud environments are vulnerable to RCE

Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
IngressNightmare  Over 40% of cloud environments are vulnerable to RCE

(CVE-2025-29927)
Urgently Patch Your Next.js for Authorization Bypass

Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
(CVE-2025-29927)  Urgently Patch Your Next.js for Authorization Bypass

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft

Phishing – sending emails with the purpose of obtaining personal information – is the most common form of cybercrime in 2023.

The UK had the highest number of people falling victim to phishing in 2022, averaging at 4783 for every million internet users, a 40% rise from 2020.

These cyber criminals may impersonate legitimate companies, such as the cryptocurrency app Bitcoin, before issuing a security alert in an attempt to lure you to a fraudulent site.

Once you have entered your security and account credentials, they will inject ransomware into your computer or network, gaining illicit access to your personal information.

2. Malicious advertising  

Cybercriminals can also spread ransomware through malicious online advertisements, a process otherwise known as malvertising.

In fact, there were 1251 potential malware advertisements reported between 1 March 2021 to 25 March 2022.

It’s important to note that malvertising does not require the user to take any action. You can unknowingly connect to malicious servers while you’re browsing on a trusted website.

These malicious servers record information about your device and location. Once malware is sent to your computer, for example, your personal information can then be held at ransom.

3. Exploiting vulnerabilities  

Exploit kits – toolkits which use codes to exploit vulnerabilities in a system – are often used by cybercriminals.

These kits work by identifying security gaps and distributing malware. In turn, your personal information can be held at ransom.

There are multiple ways exploit kits can infect your computer, including redirecting you to compromised webpages or prompting you to download malicious content.

4. Social engineering  

Cybercriminals can also obtain personal information through human interactions. This manipulation tactic is known as social engineering.

They are likely to pose as customer services, technical support, new employees and authority figures to gain remote access to devices, passwords or other information.

Once they have access to your personal or business accounts, they can commence with ransomware spreading.

5. Drive-by downloads   

Finally, drive-by downloads are a threat to consumers and businesses. This is when cybercriminals install malware without the users’ knowledge.

This often happens when people unknowingly visit a malicious website using an outdated browser. Malware is then automatically downloaded onto their computer.

How to avoid ransomware scams

1. Invest in cybersecurity 

To get started, download an antivirus programme that will offer effective protection against malware, such as Bitdefender, Norton and Intego. Then, run an antivirus scan to ensure your device isn’t infected with any malicious software.

2. Back up your files  

Antivirus software may offer real-time protection against cyberattacks, but it will not restore any lost files. So it’s always a good idea to back up your files in advance.

3. Update operating systems and software  

Make sure you’re regularly updating your operating systems and software. This ensures your computer runs smooths and reduces the risk of security breaches.

4. Prevent scams by being vigilant  

Last and certainly not least, you can avoid ransomware attacks by being vigilant. Don’t reply to suspicious emails, avoid downloading unknown files, double check links before clicking on them and regularly change your passwords.

A spokesperson from VPN Overview says: “Ransomware poses a real threat for businesses and consumers alike. Cyber criminals are relentless – they will impersonate others and hold your personal information at ransom. By understanding these ransomware scams, you can stay vigilant and protect your devices from malware.”

Check Also

March 2025

Qualcomm’s March 2025 Security Bulletin Highlights Major Vulns

Qualcomm’s March 2025 Security Bulletin addresses vulnerabilities in its products, including automotive systems, mobile chipsets, …

Leave a Reply

Your email address will not be published. Required fields are marked *