Comments on: Spotlight on ransomware: Ransomware encryption methods https://www.emsisoft.com/en/blog/27649/ransomware-encryption-methods/ Straight-talking security advice from the Malware Experts Fri, 18 Nov 2022 12:24:31 +0000 hourly 1 By: How many viruses are created by anti-virus companies? | Emsisoft | Security Blog https://www.emsisoft.com/en/blog/27649/ransomware-encryption-methods/#comment-789849 Mon, 26 Mar 2018 23:28:33 +0000 http://blog.emsisoft.com/?p=27649#comment-789849 […] important personal information and then demanding ransom money for decrypting the data (so-called ransomware). Some malware is directly targeted at specific companies or systems, such as the sabotage attacks […]

]]>
By: LodeHere https://www.emsisoft.com/en/blog/27649/ransomware-encryption-methods/#comment-787610 Sun, 23 Jul 2017 16:19:00 +0000 http://blog.emsisoft.com/?p=27649#comment-787610 My mother showed me how she wrote and read invisible messages during WWII as a member of the resistance. Invisible for who didn’t know or think about it, like the German soldiers for example. At the end of an innocent letter for example the secret message was written in lemon juice. That was completely invisible once dry, until you heated that part of the paper up with a match, lighter, or candle flame below the paper, or let it heat up in an kitchen oven, but with the flame not so close to the paper, or hot in the oven that it would burn. The dried juice “ink” would turn dark brown…

]]>