{"id":62706,"date":"2017-07-24T00:00:00","date_gmt":"2017-07-24T00:00:00","guid":{"rendered":"http:\/\/blog.mozilla.org\/foxtail\/2017\/07\/24\/irl-episode-3\/"},"modified":"2021-02-08T20:16:53","modified_gmt":"2021-02-08T20:16:53","slug":"irl-episode-3","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/","title":{"rendered":"Protect Yourself from Ransomware"},"content":{"rendered":"<p>Have you been hacked, or do you know someone who has? People make the internet vibrant, but we&#8217;re also the weakest link. We\u2019re predictable, and often easily fooled. And, as malicious software threats are indeed present on the Internet, it\u2019s important for us to be able to spot them before we fall victim.<\/p>\n<p>One form of malware that\u2019s received lots of press coverage lately \u2014 due to <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\">WannaCry<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Petya_(malware)\">Petya<\/a> attacks \u2014\u00a0is <b>ransomware<\/b>. Ransomware is software created by actual people who use it to make a profit via extortion. Internet users receive a message (often a pop-up), and the software takes over your keyboard, computer or phone. It then blocks access to your files and data until you pay ransom. Usually, the ransom is asked for in bitcoin so that it\u2019s not trackable, and the ransom monetary ask increases the longer you wait to pay it.<\/p>\n<p>While you may not be able to completely eliminate your risk of falling victim to ransomware, there are certainly things you can do to to protect yourself from attacks. Specifically: update your software and get to know the ransomware industry.<\/p>\n<p><b>Update Your Software<\/b><\/p>\n<p style=\"text-align: left;\">You could drive around with old, burned-out brake lights on your car, but it would make driving more dangerous than it should be. And if we all did that, it would get really dangerous, fast! Updating to the latest security software, browser, and operating system provides an important defense against viruses, malware, and other online threats.<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/WbVZCRYf18c\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>If you\u2019re not sure where to begin, <a href=\"https:\/\/advocacy.mozilla.org\/en-US\/stay-secure\/\">go here for instructions on how to update your Windows, Mac, Linux, iPhone, Android, or Browser software<\/a>.<\/p>\n<p><b>Get to Know the Ransomware Industry<\/b><\/p>\n<p>The ransomware industry is made up of hackers \u2014 and even businesses \u2014 who have tried and true methods of getting people to fall for ransomware. In fact, <a href=\"https:\/\/www.f-secure.com\/en_US\/welcome\">F-Secure<\/a>, a Helsinki-based security company, recently published a report on just how professional and savvy ransomware customer service agents are these days. Their report \u2014 <a href=\"https:\/\/fsecureconsumer.files.wordpress.com\/2016\/07\/customer_journey_of_crypto-ransomware_f-secure.pdf\"><i>Evaluating the Customer Journey of Crypto-Ransomware and the Paradox Behind It<\/i><\/a> \u2014 exposes how ransomware businesses use tech support channels, online forums, and streamlined Websites to trick people into thinking they\u2019re legitimate businesses trying to help.<\/p>\n<p>You\u2019ve heard the saying before, but it rings especially true for protecting yourself against ransomware: <i>knowledge is power<\/i>. If you can learn to spot technical support scammers, their customer service schemes, and get to know the motivations behind ransomware, you\u2019ll be better able to protect yourself.<\/p>\n<p style=\"text-align: left;\">In <a href=\"https:\/\/irlpodcast.org\/episode3\/?utm_source=internetcitizen&#038;utm_medium=blog&#038;utm_campaign=irl&#038;utm_content=safetyfirst\"><i>Hack Jobs<\/i>, our most recent episode of <i>IRL: Online Life is Real Life<\/i><\/a><i>, <\/i>host Veronica Belmont explores all of the above, and also meets some of the unsung heroes fighting to keep us safe.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-430 aligncenter\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/moz_podcast_IRLwVB_cover_1100x6191-300x169.jpg\" alt=\"\" width=\"524\" height=\"295\" \/><\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/simplecast.com\/e\/77156?style=light\" width=\"100%\" height=\"36px\" frameborder=\"0\" scrolling=\"no\" seamless=\"\"><\/iframe><\/p>\n<p style=\"text-align: left;\">Listen to <i>Hack Jobs <\/i>with the player above, on our <a href=\"https:\/\/irlpodcast.org\/episode3\/?utm_source=internetcitizen&#038;utm_medium=blog&#038;utm_campaign=irl&#038;utm_content=safetyfirst\">Website<\/a>, or wherever else you get your podcasts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you been hacked, or do you know someone who has? People make the internet vibrant, but we&#8217;re also the weakest link. We\u2019re predictable, and often easily fooled. And, as malicious software threats are indeed present on the Internet, it\u2019s important for us to be able to spot them before we fall victim. One form [&hellip;]<\/p>\n","protected":false},"author":1198,"featured_media":21653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,5],"tags":[],"coauthors":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protect Yourself from Ransomware<\/title>\n<meta name=\"description\" content=\"Have you been hacked, or been the victim of ransomware? It&#039;s important for us to be able to spot malicious software and protect ourselves from attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/\",\"url\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/\",\"name\":\"Protect Yourself from Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/ransomware-crash.jpg\",\"datePublished\":\"2017-07-24T00:00:00+00:00\",\"dateModified\":\"2021-02-08T20:16:53+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e\"},\"description\":\"Have you been hacked, or been the victim of ransomware? It's important for us to be able to spot malicious software and protect ourselves from attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/ransomware-crash.jpg\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/ransomware-crash.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Yourself from Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/en\/\",\"name\":\"The Mozilla Blog\",\"description\":\"News and Updates about Mozilla\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e\",\"name\":\"Michaela Smiley (Thayer)\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/44e149ca12f5a85f719c1876227f9d8f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g\",\"caption\":\"Michaela Smiley (Thayer)\"},\"url\":\"https:\/\/blog.mozilla.org\/en\/author\/mthayermozilla-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Yourself from Ransomware","description":"Have you been hacked, or been the victim of ransomware? It's important for us to be able to spot malicious software and protect ourselves from attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/","url":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/","name":"Protect Yourself from Ransomware","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/ransomware-crash.jpg","datePublished":"2017-07-24T00:00:00+00:00","dateModified":"2021-02-08T20:16:53+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e"},"description":"Have you been hacked, or been the victim of ransomware? It's important for us to be able to spot malicious software and protect ourselves from attacks.","breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#primaryimage","url":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/ransomware-crash.jpg","contentUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/07\/ransomware-crash.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/en\/mozilla\/irl-episode-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/en\/"},{"@type":"ListItem","position":2,"name":"Protect Yourself from Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/en\/#website","url":"https:\/\/blog.mozilla.org\/en\/","name":"The Mozilla Blog","description":"News and Updates about Mozilla","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e","name":"Michaela Smiley (Thayer)","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/44e149ca12f5a85f719c1876227f9d8f","url":"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g","caption":"Michaela Smiley (Thayer)"},"url":"https:\/\/blog.mozilla.org\/en\/author\/mthayermozilla-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62706"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/users\/1198"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/comments?post=62706"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media\/21653"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media?parent=62706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/categories?post=62706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/tags?post=62706"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/coauthors?post=62706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}