November 2019
Beginner
229 pages
5h 10m
English
Ransomware activities are escalating year after year, with more attacks noted all over the world. Seemingly no one is immune to such threats. Malware authors are continually developing new and sophisticated ransomware variants that can evade detection and employ new techniques to infect more systems.
In this chapter, I will discuss the different attack vectors employed by ransomware to invade computer systems, leaving the discussion of preventive measures until Chapter 4. Ransomware uses the same techniques used by other malware types to spread, so understanding ransomware distribution ...
Read now
Unlock full access