Abstract

Webjacking should be fixed firmly on corporate IT security's watch list by now. With 'ransomware', an extortionist infects a computer with code that encrypts a user's documents, then demands a ransom for a key that can be used to decipher them. Don't assume webjackers only have private individuals in their sights. Webjacking - like bull fighting - is a particularly risky venture for the perpetrator, but the rewards are high. For it to work, a communication dialogue must be established to exchange the encryption keys. Currently, one of the most popular infection methods is via web browser technology, such as Internet Explorer. Ransomware is being viewed primarily as a threat to individuals and home computers at the moment. It is argued that the reason corporations have not experienced this form of attack yet is because they have devices at the perimeter that constantly monitor for malicious activity and take steps when signs of malicious activity occur. As the author puts it ''There is a tremendous problem with this argument''. The rise in webjacking activity has received a lot of press lately, and should be firmly on corporate IT security's watch list by now. With ''ransomware'', an extortionist infects a computer with malicious code that encrypts user-based documents, then demands a ransom for a key that can be used to decipher them. Companies are deluding themselves if they think this is just for home users.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call