Be the first to like this
Each day millions of Internet requests are made to dynamically changing Cryptolocker domains. And it only takes one successful connection from a malware-infected system to the botnet controller for your files to end up encrypted and held for ransom.
So how does Cryptolocker actually work? What is the best way to block it? And what implications does this have for security methods going forward?
In this webcast, you will learn:
-What steps are involved in a Cryptolocker attack
-How Domain Generation Algorithms enable it to evade most threat detection methods
-Why leveraging our global intelligence has been effective in containing Cryptolocker
-What you can do to avoid becoming a victim