Ransomware uses

via IFTTT Someone asked me if there are any unusual or legitimate uses for ransomware. If you break down what ransomware is, it’s just encryption. But it’s more like “surprise” encryption where someone else does the encryption, and keeps the key. So, I present five unorthodox ways to use ransomware in this video. However, if […]

This is a Security Bloggers Network syndicated blog post authored by Javvad Malik. Read the original post at: J4vv4D