International Journal of Academic Research in Business and Social Sciences

search-icon

Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded

Open access

Haitham Hilal Al Hajri, Badar Mohammed Al Mughairi, Asif Mahbub Karim, Md. Nasiruzzaman, Mohammad Imtiaz Hossain

Pages 915-922 Received: 14 May, 2019 Revised: 18 Jun, 2019 Published Online: 26 Jul, 2019

http://dx.doi.org/10.46886/IJARBSS/v9-i7/6190
The technology has indeed resolved so fast, that what it used to be a Sci-Fi movies in yester years, is a conventional reality today. Lot of ordinary accessories’ have turned to be smart, especially now we are at the peak of an era of wearable technology and internet of things (IoT). The ongoing growth of innovation within the information and communication technology (ICT) sector is massive, practically the smart mobiles revolution which has shown a large scale adoption that it became an essential part of the daily human interactions. However, cybercriminals have found new grounds to explore potential abuse and misuse, where they have merged and resurrected legacy threats to be implemented on modern tech. This article is methodically illustrating a specific kind of cyber threat known as a ransomware which not only attacks cooperate computers and networks, but it has set the path to newer technology trends such as IoT and smart mobile devices. This paper will also highlight the evaluation of the malware known as ransomware and how it has become a global threat, Additionally to recommend on how to stay protected against such threat.
Labs, M. (2016 ). Taking Steps to Fight Back against Ransomware, McAfee Labs on. Retrieved from Mcafee Securing Tomorrow:
https://securingtomorrow.mcafee.com/mcafee-labs/taking-steps-to-fight-back-against-ransomware/
Micro, T. (2016). Ransomware: Behind the Scenes . Retrieved from
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-behind-the-scenes
Networks, P. A. (2017). Unit 42 Report Ransomware: unlocking the lucrative criminal business model. Retrieved from paloaltonetworks:
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/research/ransomware-report
Lipovský, P., Štefanko, L., and Braniša, G. (2016). Rise of Android Ransomware. Retrieved from welivesecurity: https://www.welivesecurity.com/wp-
content/uploads/2016/02/Rise_of_Android_Ransomware.pdf
In-Text Citation: (Hajri, Mughairi, Karim, Nasiruzzaman, & Hossain, 2019)
To Cite this Article: Hajri, H. H. Al, Mughairi, B. M. Al, Karim, A. M., Nasiruzzaman, M., & Hossain, M. I. (2019). Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded. International Journal of Academic Research in Business and Social Sciences, 9(7), 915–922.