In recent years one of the most frequent hacking attacks are ransomware . In these attacks , the hackers use malicious software, which encrypts them data of victims , so that the latter can not access them. Then seek ransom , to restore the encrypted archives .
As with other malicious software, ransomware penetrate to victims systems in various ways. They can use vulnerabilities , which have identified the systems or yes deceive users and make install ransomware unwittingly.
Most often, the ransomware attacks targeting large companies, hospitals , schools, police stations and other targets “high profile.” However, last seen a rise in attacks targeting home computers.