24. Future of Crypto Ransomware
Source: http://thehackernews.com/2015/08/ransomware-android-smartwatch.html
25. Defending your business
• User awareness
• Unsolicited email attachments
• Threat Intelligence feeds to follow blacklist IPs
• Anomalies in network traffic
• File system and registry key changes
• Limit access and periodic backup