just brew it! wrote:I'd say it is a very strong argument for having *some* sort of backup (whether Dropbox or something else) that does not reside on the same machine, and is not accessible as a normal folder share. Ideally it should be in an off-site location, to protect against fire/flood/theft/etc.
Kurotetsu wrote:I started taking backups a little more seriously when I lost a USB thumb drive with years worth of documents, source code, images, etc. on it. But even then I was only backing up a local 1TB hard drive in a USB enclosure. It wasn't until I heard about the Cryptolocker ransomware that I decided to start using Crashplan (I actually had gotten a free year with them the year before, but hadn't used it until a few months ago). Between that and Dropbox, which is also backed up by Crashplan, I feel alot safer knowing that most of my important stuff, I think, is backed up remotely. Though I still haven't figured out what to do with my music library, which is like 30+ GB in size.
Hz so good wrote:Or you get lucky, and use the HeartBleed vulnerability to counterattack the CnC server to obtain your key. I can't find the article right now, but one victim got lucky during the counterattack and found that their key had been pre-loaded to the server during the 24hr ransom window.
Aphasia wrote:Yeah, I used that exact story as an example in another thread here not to long ago. I was at the Checkpoint CPX in barcelona where one of the guys involved it solving it was a speaker and of course, used it as a great example of what goes on for security researchers...
Users browsing this forum: Bing [Bot], Yahoo [Bot] and 4 guests