{"id":10154,"date":"2017-04-19T15:00:23","date_gmt":"2017-04-19T20:00:23","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=10154"},"modified":"2017-04-20T11:39:32","modified_gmt":"2017-04-20T16:39:32","slug":"ransomware-attacks-increasing-android","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/ransomware-attacks-increasing-android\/","title":{"rendered":"Ransomware Attacks Are Increasing on Android"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It\u2019s no secret that cyberattacks are increasing dramatically in scale and frequency, which is why we need to practice safer online habits such as being aware of the latest scams, creating strong and complex passwords, and avoiding suspicious or odd links or apps. Still, even the safest online practices can\u2019t always protect you from malware or security breaches. To be safer online, you should run regular virus scans on your device to check for the latest malware and security threats. Perform a quick Security Scan on your device whenever you don\u2019t have the time to run a Full Virus Scan:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_full\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/millions-kids-conversations-leaked-due-teddy-bears\/\"><b>Millions of Kids\u2019 Conversations Leaked Due to Teddy Bears<\/b><\/a><\/p>\n<p><b>Ransomware Expected to Further Increase<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In 2016, ransomware attacks increased on both a small and large scale, targeting individuals and corporations alike. Some of the largest ransomware attacks in 2016 included attacks on many news outlets like the BBC and The New York Times, various major hospitals and universities, and the San Francisco subway system, among numerous others. Other major cyberattacks \u2014 that aren\u2019t ransomware-specific \u2014 included the Dyn DDoS attack, reports of various major Yahoo data breaches, and the attacks on AdultFriendFinder.com.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals executed many effective ransomware attacks in 2016, which means they\u2019re not likely to stop in 2017. These types of cyberattacks are expected to increase further this year, especially for businesses. That\u2019s why it\u2019s important to make sure that you backup all important data, and make sure that you and your business employees are aware of various online scams and malware, so that you can avoid becoming a victim of a ransomware attack. One person who\u2019s poorly informed on cybersecurity could be the back door that the criminal needs to access a particular business.<\/span><\/p>\n<p><b>Develop a Cybersecurity Plan<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Criminals seek businesses that have poor cybersecurity, so you should make sure to regularly evaluate the security of your business and your cybersecurity plan, in order to update it to current trends. You should have a plan in place for responding to a ransomware attack, too. You should always strive to gain access to your data or compromised system \u2014 don\u2019t simply pay the ransom. Further, make sure to report any ransomware attacks to the authorities. Depending on the nature of your business, you may also want to consider cybersecurity insurance.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks have increased dramatically over the past year. Learn more about which Android security attacks are on the rise.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[30,942,252,306,195,309,4399,249,161],"class_list":["post-10154","post","type-post","status-publish","format-standard","hentry","category-security","tag-android","tag-app0","tag-app1","tag-app4","tag-app5","tag-app7","tag-attacks","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/10154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=10154"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/10154\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=10154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=10154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=10154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}