For a few years now, this cybercrime threat has exploded! During these malicious attacks, cybercriminals can take full control of your computer and create irreversible damage.  brel , a  web agency , can tell you more about this scourge …



Ransomware is a form of malware ( malicious software ) that will steal user data without their knowledge.

During this action, the attacker will encrypt the victim’s data and demand a ransom in exchange for the private key.
In the case of our “ransomware”, it will be distributed through email attachments, infected programs, and compromised websites.
Basically, the ransomware will lock your computer, encrypt your data and only release it after being ransomed.

Everyone is potentially “infectable”: desktops, servers, laptops, tablets, and smartphones … And this regardless of the common operating systems used such as Windows, Mac OS X, Android, iOS, and Linux.

The loss of intangible files such as family photos and videos causes many people to pay this ransom, and companies must fear the loss of their work data.

They are therefore prepared to pay large sums to the blackmailers. What you should definitely not do!



In the first place, we can often find spam. That is, the ransomware will infect computers primarily by tricking users into opening malicious attachments, deceptive messages, or pop-ups.

You should know that for example, electronic mail is in fact fax that contains a .zip archive in its attachment. If the user accesses the executable file in the .zip file, the data will be encrypted on his system and he will be asked, to make a ransom payment to obtain the decryption key. It’s as simple as that…

There are also direct downloads or embezzlement or tools and networks of robots for installing malware. Download attacks are based on so-called manipulated websites or advertisements.

They generally exploit vulnerabilities in browser plug-ins such as Flash Player, Java, Adobe Reader, or Silverlight. We won’t tell you enough, updates and fixes are vital!

Yes … By skipping updates, all the software installed on your computer, from the operating system to office applications and runtime environments will generate potential security vulnerabilities that programmers malware exploit. In order to reduce these security holes, you should ALWAYS keep all programs up to date. It is also better to uninstall unnecessary software, as it may also have loopholes.



Small recap… Always pay attention to sites marked as dangerous, also pay attention to links in e-mails. Links in phishing emails often lead to fraudulent websites that are indistinguishable from the secure original ( except by hovering over the link and looking at the web address ).

Also, consider opening only attachments and emails from known senders. Be aware that some security software against ransomware exists, but the best is to act before the hacking and to exercise vigilance.

As a reminder, also remember to set up a sufficiently complex password so that the security of your accounts (emails, google, Facebook, etc.) is guaranteed.


It is recommended to have an 18-character password that includes – lowercase, uppercase, numbers, and special characters – for optimal protection.

If the measures taken are not enough, do not hesitate to approach a specialized security company.

want to protect your wordpress website against malware? Contact us

Leave a comment

echo "";