Latest Version of Crypto Virus Spreads At An Alarming Rate

Holding Its Victim's Files Hostage While it Demands Payment

What You Need To Know To Protect Your Computer System

Introduction: Crypto virus takes the data on your computer hostage, demands an immediate money ransom, but will not return your data to you until it receives payment. Clever hacker gangs, pranksters, and uber geeks use this age old extortion method to steal millions of dollars from un-suspecting computer users.

The latest version of this virus called Locky was released to the internet in Feb of 2016. Cyber security experts estimate that 400,000 computers were targeted, and within 1 week, the virus was spreading at rate of 60,000 devices a day.

How Does It Spread Crypto virus is typically spread by e-mail. The victim receives an e-mail message from a vendor or supplier with the virus attached. Once the victim clicks a link, or opens an attachment, the virus then installs itself on the the computer. Once the virus has taken over the victim's computer, it is often able to send itself to each of the victims contacts; rinse, and repeat.

How Will You Know If You've Been Infected How do you know if been infected? Easy. You.ll see a ransom note on your screen. It is big, bold, and it takes over your screen. In big bold, reverse image letters you.ll see: "!!! IMPORTANT INFORMATION !!! All of your files have been encrypted with RSA-2048 and AES-128 Ciphers..."i Additionally you.ll find a html copy of this file in every folder on your computer.

If you didn't see the message on your screen for some reason, or you didn't find the .html files in each folder, then you can try opening a microsoft word, or excel file. The virus encrypts the content of the file, so microsoft word and excel will display error messages when the files open - this is a sure sign that your computer is infected.

Can I fix it myself Yes. You don't need professional help to recover from this virus. If you are technically savvy, you.ll be able to get your files back. If you have backed up your data, you can recover quickly and with little fuss. See the section on prevention.

If you don't have a backup of your files, then you.ll need to try a few other methods to get your data back. Methods that have worked are: 1) recover shadow copies; 2) undelete programs; 3) send computer to data recovery; 4) pay the ransom. Here is a frustration saving tip: Don.t try to guess the encryption keys. They are used by government agencies to hide top secret information; they really are secure and impenetrable.

If you are technically challenged, or fear that you may do more harm by fixing this yourself, then call on your favorite computer technicianr.

How to protect yourself A solid, highly rated anti-virus program is the first line of defense against viruses. Check PC Magazines website - - for recommendations.

Use the SPAM filters from your e-mail host. These filters will block the majority of bad mail coming to you. Paid, 3rd party content filtering services do a better job than the free versions, and are a good investment.

Make sure your data is backed up. Data backups used to be thought of as protection against accidentally deleted files, or a crashed hard drive. The newest entry on the list is recovery from crypto virus infections. You can replace the damaged files with good files from your backup. This is by far the best and least complicated post infection fix.

Conclusion Crypto virus is spreading rapidly to computer across the globe. It is typically spread by e-mail, and it holds your data ransom, then demands payment from you in order to get your data back.

Crypto virus does serious harm to the files on your computer, and a solid backup is the best way to recover from the virus. If you don't have a good backup, and don't feel up to the challenge of recovering your data, then give your favorite computer technician a call.

PC Service Center provides professional computer repair and networking services. For more info, or a quote, please contact us at (925) 609-8287 or Contact Us