Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

On the Rise: Malware That Holds Your Computer Hostage

by Elmer Montejo on April 05, 2016

Ransomware on the rise

Ransomware, malware that locks you out of your own machine —  is on the rise, according to an alert issued by the United States Computer Emergency Readiness Team (US-CERT). The agency, which is part of the U.S. Department of Homeland Security, has noted a surge in dangerous ransomware infecting private and business computers and even in hospitals.

When ransomware infiltrates your computer, it takes over and locks you out of your own machine unless you pay a ransom. The lockout can take the form of access restriction or file encryption. The malware then informs you what to do via intimidating, panic-inducing onscreen messages such as these:

  • Your computer has been infected with a virus. Click here to resolve the issue.
  • Your computer was used to visit websites with illegal content. To unlock your computer, you must pay a $100 fine.
  • All files on your computer have been encrypted. You must pay this ransom within 72 hours to regain access to your data.

Once you've been infected, you'll be unable to use your computer. The malware holds your machine hostage until you give in to demands for money, usually in the range of $200 to $400 payable via virtual currency such as bitcoin.

Ransomware commonly spreads through attachment-laden phishing emails, instant messaging applications on social media and drive-by downloads that trick you into visiting a website that loads malware onto your computer, according to US-CERT. If you suspect a message or file you've received may be malicious or fraudulent, report it right away to the Federal Bureau of Investigation’s Internet Crime Complaint Center.

If you've been struck by ransomware, your options are limited. The best option is to restore your computer to its factory settings and then recover your files from your latest back up (you are backing up your files, right?). If you don't have a back up copy of your files, we don't recommend paying the ransom. Even if you cough up the money demanded by the hackers, there’s no guarantee they will unlock your computer or decrypt your files. And even if they did, there’s no guarantee they would also remove the malware.

So an ounce of prevention is worth a pound of cure. US-CERT recommends these preventive measures to avert ransomware infection:

Seagate Backup Plus Slim 2TB Portable External Hard Drive

Seagate Backup Plus Slim 2TB Portable External Hard Drive

  • Back up your data regularly and keep copies in offline storage. We recommend using cloud backup that syncs you files, so they're always up to date, like Dropbox. For local, offline backups, we recommend the 2TB Western Digital Elements for $80.99 on Amazon or the sleeker  2TB Seagate Backup Plus Slim for $88.90 on Amazon.
  • Apply security updates and patches for your operating system. These updates often close up the security holes and vulnerabilities that malware exploits.
  • Install a reliable antivirus program and keep it up to date. Always check downloaded executable files with your antivirus program before running them.
  • Restrict others from installing and running unknown or unwanted programs on your computer.
  • Disable macros in email attachments (this is disabled by default). Viruses and malware often unleash their malicious payloads through macros embedded in attachments. The macros run when you open the attachments, so don’t open email attachments from suspicious sources. See US-CERT’s guide on recognizing and avoiding email scams for more tips.
  • Avoid falling prey to social engineering and phishing. For instance, don't click on URLs in unsolicited email.

[Image credit: Ransom ware - Keyboard locked in a chain via Shutterstock, Seagate]


Privacy, News, Computers and Software, Internet & Networking, Computer Safety & Support, Blog

Discussion loading


From ToluMar16 on April 06, 2016 :: 12:34 pm

Thanks for the Information. Its worthy reading and really helpful.



From Buster Chappell on April 06, 2016 :: 3:56 pm

The Western Digital is $99 on Amazon.



From Josh Kirschner on April 06, 2016 :: 4:41 pm

Amazon prices fluctuate quite a bit. The 2 TB WD drive is available for $82.99, but that price is now only being offered for Amazon Prime members.



From David Mayes on April 06, 2016 :: 5:10 pm

What would prevent ransomware from infecting cloud storage as well as local hard drives?



From Suzanne Kantra on April 06, 2016 :: 5:30 pm

If your computer is infected, it can’t infect your cloud storage, though the encrypted files will sync encrypted.

However, services like Dropbox support versioning. So you can restore a file at a point before the ransomware took effect. If you have a large number of files to restore, you can send a request to Dropbox to roll back your account to a point before you were infected. Here’s the link to Dropbox’s explanation of how they help with ransomware.



From Frank Boecherer on April 06, 2016 :: 11:31 pm

By default, Dropbox saves all deleted and previous versions of your files for 30 days. If you purchase Extended Version History, you can revert to a previous file version or recover a deleted file at any time within a year of an edit or deletion made after your purchase.

Extended Version History is available to all Dropbox Pro users as a subscription add-on.

Note: If you purchase Dropbox Pro in the App Store or Google Play marketplace you will not see an option to add Extended Version History. If you would like to include Extended Version History in your Pro subscription, please purchase on the Dropbox website.

If you’d like further protection, you can upgrade to Dropbox Business, which includes unlimited version history.



From Ray Luft on February 22, 2019 :: 10:43 pm

I have a Samsung laptop and I too frequently get held up when surfing for streaming soccer games.  I shut off the computer using the power switch.  I wait 10 seconds and then I restart while holding down the F2 key.  On boot, I do an F9 and select the change to a default setup.  I then do an F10 to complete the setup.  The boot continues and brings my machine back up in Windows 10.


Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.