Ransomware uses

via IFTTT Someone asked me if there are any unusual or legitimate uses for ransomware. If you break down what ransomware is, it’s just encryption. But it’s more like “surprise” encryption where someone else does the encryption, and keeps the key. So, I present five unorthodox ways to use ransomware in this video. However, if […]

*** This is a Security Bloggers Network syndicated blog from J4vv4D authored by Javvad Malik. Read the original post at: http://feedproxy.google.com/~r/J4vv4d/~3/DkAGSsdRmjU/