Cybercriminals often specialize. An extortion effort usually begins with a person or a team selecting targets in one of two ways: either they get a request from an extortionist or they just find their own victim to sell access to. Attackers pick victims who are likely to result in a good payout, and those are unfortunately the same ones buying products aimed at keeping the bad guys out. In this video for Help Net Security, … More
The post Taking the right approach to data extortion appeared first on Help Net Security.