How to Prevent Ransomware Attack?

What is Ransomware?

Ransomware is a type of malware attack which prevents an organization from accessing their own data or system until a ransom (Money) is paid and displays a message requesting payment to unlock it.  This particular program, named WannaCry, asks you about $300, however the price increases over time.F952608A-B480-42EA-96EA-99574C8100C9_cx0_cy5_cw0_w1023_r1_s

Types of Ransomware: There are two types of Ransomware which are mentioned below.

Crypto Ransomware:  It encodes the data of a system and doesn’t target the device itself. The info can’t be accessed until it is unencrypted. It changes the files on your system so you can’t open them.

Locker Ransomware: It locks the system without encrypting data and the system devices are rendered non-operational. It shows a message that prevents you from accessing the system or files. It says you need to pay ransom (money) to get access to your system again.

Ransomware attacks are on the rise and have expanded in 2016. According to CNN, the digital extortion of Ransomware was over $200 million and is likely to grow to $1 billion by the end of 2016.top10countries-2015-2016

Ransomware can do:

  • Stop certain apps from running (like web browser)
  • Prevent you from accessing Windows
  • Encrypt files so you cannot use themsunburst-ransom-2015-2016

How to Prevent a Ransomware Attack?

  • Back up your data in some storage device
  • Use robust antivirus software
  • Keep your software on your system up to date
  • Trust no one, literally
  • Enable ‘Show file extensions’ option in the Windows settings on the system
  • If you discover any unknown process on your system, then disconnect it from the internet or other network connections (prevent the infection from spreading)
  • Use System Restore to get back to a known-clean state
  • Use a reputable security suite
  • Patch or Update your software
  • Don’t visit shady websites
  • Avoid public Wi-Fi and other non-secured networks
  • Disable RDP (Remote Desktop Protocol)
  • Use the Cryptolocker Prevention Kit
  • Disable files running from AppData / LocalAppData folders
  • Filter EXEs in email
  • Show hidden file-extensions
  • Set the BIOS clock back
  • Do not install programs and apps from unknown sources
  • Verify and research before downloading or making use of servicesransomware-damage

What do I do if my system is infected with WannaCry Ransomware?

If your system is infected with WannaCry Ransomware or any type of Ransomware, then follow below-mentioned steps:

1: Disconnect All Network Connections on Your System: Turn off your network connections until everything is cleared as it will ensure that malware doesn’t spread through the system.

2: Change the Password:

Using different device change the account password and log then out as it will control the damage brought on by Ransomware attack.

3: Inform the Authorities: Once you caught in this, then inform to your local authorities. Let them know about the attack from where you got the malware. It will help authorities in their investigation.  Government authorities also have a wider reach to broadcast important info.

4.Inform your Friends and Family: Tell the people who are close to you that you are a victim of a Ransomware attack will keep them alert. Tell them not to open any email attachments from you as the malware could have accessed the mail client and sent a malicious file through email.

5: Contact IT Support and Antivirus Provider: Inform IT or antivirus provider as they may know any ideas on how to help and to recover files from your system. Be as detailed as possible when communicating info to them.

6: Never Negotiate with the Hackers: This is one of the important points you should remember that paying the hackers would only reward them for their acts. Also, it is not necessary that you will get back the files. The main things for these attackers is money. The moment they get that no one is paying them for their hard work then they will voluntarily quit.

Know About How to Run Remix OS on A Mac

A beta version of Remix OS 2.0 is launched by Jide for PC. Remix OS is an Android’s custom version which is to feel and look like a desktop operating system. But for over a past year it was just limited to laptops, tablets and TV boxes. Now let us look at what’s new in Jide that is enabling Remix OS to be downloaded and runs it in Intel or AMD chips featured computers.

You need to prepare a USB flash drive associated with Remix OS for either Windows or Mac computer. When you download Remix OS on Windows PC then USB preparation tool is also downloaded, whereas in Mac it is easy to prepare a flash drive.

To create a bootable Live USB drive, UNetbootin software is needed and on Mac it can be accessed in the Startup Manager.

Following are the tools required to run Remix OS on a Mac:

  • Remix OS version 2.0 for PC
  • UNetbootin software for Mac
  • USB flash drive with minimum storage of 8GB.


  1. If you don’t have UNetbootin software for Mac then you should download it
  2. Remix OS for PC should be downloaded
  3. USB flash drive should be plugged in to the Mac
  4. By opening UNetbootin software you need to format the window as follows:
  • Select the Disk Image
  • From the Dropbox menu select IOS
  • To find the Remix file click on the “…” button.
  • In the Download folder there will be an .ios, you need to select it.
  1. Click “OK”, when it is done completely then click “Exit”.
  2. Now you should restart your system, press and hold the alt/option key as soon as you hear the startup sound. By doing this Startup Manager will get opened.
  3. When the option of Windows appears then you need to select it. By following these steps will boots up the Remix OS on your Mac.

Once your system booting is completed, you can select “Guest” or Resident” in order to use Remix. The difference you will see after booting process, all the apps and data will be saved in Resident mode on USB drive.

Once the MBP is opened Remix OS will start running as we expect from it. But one thing you should consider that is, mouse is needed to use Remix OS, because scrolling up or down is unable by using trackpad of laptop.

How Google Test Feature Helps You to Replace Your Password With a Phone?

Now-a-days remembering passwords for various accounts are quite difficult. An user can have so many accounts like Google, Gmail, yahoo, etc. and remaining all their passwords is little bit complex. If you forgot the password then it is nothing worse than ever. So keeping all these in mind Google developed a new feature, i.e. you can use your phone to login into your Google account without typing the password.
Google test feature to replace password with a phone

How does it works?

The Google test feature works as follows. After completion of the initial setup on your phone, when you try to log into your Google account on your mobile device you have to enter your email address. After entering an email address a notification will be popped on your phone. This notification asks for confirmation whether you are really signing into your account or not. Once you approve the notification, you were logged into your account.

Rohit Paul one of the Reditt users first reported about this feature, and Android Police confirmed that the new feature is being tested by considering small number of users on iOS and Android.. At the time of logging into their account on new computer, Google users are enabled to confirm their identity. The method is quite similar to two-factor authentication. The only difference is that they never have to type the password while logging. This feature would be really benefited for the users who often continuously change their passwords or the users who don’t want to bother remembering them. This might sound less secure than two-factor authentication. As the technology is developing and things were improved. You can protect your phone with your fingerprint, or you can put a password or a PIN lock, which makes difficult for someone who tries to log to your Google account very easily.

In an email to users, Google clearly explains how this feature works. For example, if you have already enabled this Google test feature, you can still login into your account with your password. For this option you have to choose the “Use your password instead” link which is available at the bottom of the page.  At the time of logging if Google notices anything suspicious about your login process, it will ask you one or more additional questions to make sure whether it’s really you that is logging into the account. In case if you lose your phone you can login to your Google account on another device. For this setting go to “My Account” option and remove account access from the phone which you have lost.