Case Project 2

Use the Internet to research some of the recent different crypto-malware ransomware attacks. What do they do? Why are they so successful? How are they being spread? What can users do to protect themselves? Write a one-page summary of your research.

You can leave a response, or trackback from your own site.
error: Content is protected !!