Results (
English) 1:
[Copy]Copied!
Credulity of Internet users are always hackers take advantage of the maximum to capture personal information. To perform this form of attack, hackers will send out an email or post to the popular social networks like Facebook, Twitter ... fascinating information, which aims to stimulate the user to follow the instructions of them as open attachments or visit our links ... If the users are not vigilant and follow these instructions, the hacker can install malicious code onto the victim machine to perform the acts to steal your account information, credit card information. Many consequences when not only in the virtual world, but also a direct influence on finance, the victim's honor. Just the beginning in 2015, the malicious code CTB blackmail Locker leads users distracted when not able to open the files of important data on your computer. Malicious code is emailed as a zip file attached, if enabled will encrypt data files and ask the victim to send a ransom equivalent to nearly 700 USD. The file has been encrypted will have no way to recover, unless the user accepts to bear losing money to "Save" the data.
Being translated, please wait..
