Skip to main content

ransomware

See All Stories

Comment: The WannaCry attack should be a wake-up call for consumers, businesses and governments

The WannaCry ransomware attack may have been exploiting a vulnerability in Windows, but the lesson it provides – the importance of keeping both computers and mobile devices updated – is one applicable to all of us, Apple users included.

WannaCry itself targeted a vulnerability that had existed in Windows all the way through from XP to the latest Windows 10. Microsoft issued a patch to fix the issue for Windows Vista onwards back in March, but many organizations failed to update.

The scale of the attack – which caused widespread disruption around the world – should be a wake-up call to consumers, businesses and governments alike …


Expand
Expanding
Close

Happy Hour Podcast 057 | Apple gets social, Macs for ransom, and iOS 10 wishlists

This week Apple joined Twitter. Yep. Along with that, Zac and Benjamin discuss OS X’s first ransomware, and later on we’ll go over our iOS 10 wishlist and talk about what Apple needs to make the next version better than ever. The Happy Hour podcast is available for download on iTunes and through our dedicated RSS feed. Big thanks to Harry’s this episode.

[soundcloud url=”https://api.soundcloud.com/tracks/251054382″ params=”auto_play=false&hide_related=false&show_comments=true&show_user=true&show_reposts=false&visual=true” width=”100%” height=”150″ iframe=”true” /]


Expand
Expanding
Close

First OS X ransomware detected in the wild, will maliciously encrypt hard drives on infected Macs [Update: How to fix]

transmission-mac

 

Update: Version 2.92 of Transmission has now been released. This claims to actively remove the ‘KeyRanger’ malware files from the infected Mac.

OS X users have today been hit with the first known case of Mac ‘ransomware’ malware, found in the Transmission BitTorrent client released last week. Infected versions of the app include ‘KeyRanger’ malware that will maliciously encrypt the user’s hard drive after three days of being installed. The malware then asks for payment to allow the user to decrypt the disk and access their data — the ‘ransom’.


Expand
Expanding
Close