The technology has indeed resolved so fast, that what it used to be a Sci-Fi movies in yester years, is a conventional reality today. Lot of ordinary accessories’ have turned to be smart, especially now we are at the peak of an era of wearable technology and internet of things (IoT). The ongoing growth of innovation within the information and communication technology (ICT) sector is massive, practically the smart mobiles revolution which has shown a large scale adoption that it became an essential part of the daily human interactions. However, cybercriminals have found new grounds to explore potential abuse and misuse, where they have merged and resurrected legacy threats to be implemented on modern tech. This article is methodically illustrating a specific kind of cyber threat known as a ransomware which not only attacks cooperate computers and networks, but it has set the path to newer technology trends such as IoT and smart mobile devices. This paper will also highlight the evaluation of the malware known as ransomware and how it has become a global threat, Additionally to recommend on how to stay protected against such threat.
Labs, M. (2016 ). Taking Steps to Fight Back against Ransomware, McAfee Labs on. Retrieved from Mcafee Securing Tomorrow:
https://securingtomorrow.mcafee.com/mcafee-labs/taking-steps-to-fight-back-against-ransomware/
Micro, T. (2016). Ransomware: Behind the Scenes . Retrieved from
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-behind-the-scenes
Networks, P. A. (2017). Unit 42 Report Ransomware: unlocking the lucrative criminal business model. Retrieved from paloaltonetworks:
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/research/ransomware-report
Lipovský, P., Štefanko, L., and Braniša, G. (2016). Rise of Android Ransomware. Retrieved from welivesecurity: https://www.welivesecurity.com/wp-
content/uploads/2016/02/Rise_of_Android_Ransomware.pdf
In-Text Citation: (Hajri, Mughairi, Karim, Nasiruzzaman, & Hossain, 2019)
To Cite this Article: Hajri, H. H. Al, Mughairi, B. M. Al, Karim, A. M., Nasiruzzaman, M., & Hossain, M. I. (2019). Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded. International Journal of Academic Research in Business and Social Sciences, 9(7), 915–922.
Copyright: © 2019 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode