To check if your account has been “Pwned”, check out https://haveibeenpwned.com/ – if so, change your password!
According to one estimate, 60 per cent of the leaked email addresses haven’t appeared in prior data breaches, giving attackers a potential source of new data.
Background information is below, but please take these two steps now!
1) PLEASE install and/or update CryptoPrevent as the best way we have to try to prevent ransomware attacks! Get it at my website, where there is information & a Download link, at
Check for updates every few days, as this ransomware is evolving! Open CryptoPrevent, click on “Updates”, then on Check for Updates”. It will run a check in a little window, then let you know if there are updates available. If so, approve the updates!
2) You should also check for Windows Updates, as this latest ransomware takes advantage of a flaw in even old versions of Windows. Although Microsoft patched the vulnerability in March, the ransomware preys on older systems, like those at National Health Service hospitals in England, which heavily rely on Windows XP.
BACK UP YOUR COMPUTER FIRST!!
To update Windows, click on the Start menu, and then the Search box. Enter “Check for Windows Updates” in the box, and find the link, then check for updates.
And, of course, keep your antivirus and antimalware programs updated, too!
Background info on this newest ransomware attack:
DO NOT CLICK ON GOOGLE DOCS LINK IN EMAILS!
Google / Alphabet Inc. warned its users to beware of emails from known contacts asking them to click on a link to Google Docs after a large number of people turned to social media to complain that their accounts had been hacked.
Alphabet Inc. warned its users to beware of emails from known contacts asking them to click on a link to Google Docs after a large number of people turned to social media to complain that their accounts had been hacked.