Page 75 - Cyber Warnings
P. 75
Plus, ransomware is becoming more popular on iOS devices, as well. Though they are still quite
rudimentary ― hardly locking the device and easily removed by users ― it is likely that
ransomware developers will follow in footsteps of malware developers, like those who created
the successful YiSpecter and Pegasus viruses. Soon, all Apple devices could suffer a storm of
ransomware ― which is why it is vital to know the strategies to conquer it.
Overcoming Apple Ransomware
First, it is vital that Apple users dispose of
the misconception that their platform is safe
from cyberattack. Though Windows has long
claimed a greater share of malware threats,
Apple’s increasing popularity (and its users’
lax attitude toward security) is making it a
prime target for cyber criminals.
Plus, hackers are becoming more adept at
developing malware that can function across
platforms, maximizing their reach. The
sooner OSX and iOS users admit their vulnerability, the better.
Secondly, Apple users should avoid succumbing to the temptation to pay the ransom. Though it
might seem the simplest, fastest solution, shelling out won’t necessarily return any data. Though
cybercriminals will be happy to take the cash, some won’t respond with promised encryption
keys, and some encryption keys might not unlock any files ― especially if the ransomware was
hastily or poorly developed. Paying the ransom only encourages cybercriminals to continue
attacking users with more ransomware.
Strong defenses should be every user’s first step to avoiding and overcoming ransomware. Not
all antimalware programs are designed to detect ransomware, which tends to operate
differently. Therefore, users should find trustworthy consumer ransomware protection, which will
frequently be updated to combat emerging ransomware threats. There are mobile anti-malware
options, as well. Additionally, users should regularly back up their devices using the iCloud or a
physical drive.
Users who are already suffering due to ransomware should consider contacting Apple Support
using official chat lines or numbers published online. Some ransomware masquerades as
authorized security software, and speaking with a true Apple security expert will help users
determine the severity of their situation. Some versions can be defeated, but others will make
data inaccessible forever ― that’s ransomware.
About the Author
Jackie is a content coordinator and contributor that creates quality articles for topics like
technology, home life, and education. She studied business management and is continually
building positive relationships with other publishers and the internet community.
75 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide