Hobby hackers to billion-dollar industry: the evolution of ransomware

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

In recent months, ransomware has become a mainstream topic across the world, thanks to a string of high-profile attacks. There is a sense that no one is immune to attacks from a persistent and organised community of cyber-criminals who use ransomware as their main modus operandi. Ransomware has become a mainstream topic across the world recently, thanks to a string of high-profile attacks. But this form of malware has been with us for a while. Srinivasan CR of Tata Communications examines the history of ransomware, tracing its evolution from crude beginnings in the 1980s to its global impact today. And although it is proving to be a pernicious threat, he explains how we are also developing effective countermeasures.

Original languageEnglish
Pages (from-to)7-9
Number of pages3
JournalComputer Fraud and Security
Volume2017
Issue number11
DOIs
Publication statusPublished - 01-11-2017

Fingerprint

hacker
recreational activity
dollar
industry
Industry
communications
threat
history
community
Malware
Communication

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Law

Cite this

@article{d0b1bb3812754c27aca08c4bb2daf932,
title = "Hobby hackers to billion-dollar industry: the evolution of ransomware",
abstract = "In recent months, ransomware has become a mainstream topic across the world, thanks to a string of high-profile attacks. There is a sense that no one is immune to attacks from a persistent and organised community of cyber-criminals who use ransomware as their main modus operandi. Ransomware has become a mainstream topic across the world recently, thanks to a string of high-profile attacks. But this form of malware has been with us for a while. Srinivasan CR of Tata Communications examines the history of ransomware, tracing its evolution from crude beginnings in the 1980s to its global impact today. And although it is proving to be a pernicious threat, he explains how we are also developing effective countermeasures.",
author = "Srinivasan, {C. R.}",
year = "2017",
month = "11",
day = "1",
doi = "10.1016/S1361-3723(17)30081-7",
language = "English",
volume = "2017",
pages = "7--9",
journal = "Computer Fraud and Security",
issn = "1361-3723",
publisher = "Elsevier BV",
number = "11",

}

Hobby hackers to billion-dollar industry : the evolution of ransomware. / Srinivasan, C. R.

In: Computer Fraud and Security, Vol. 2017, No. 11, 01.11.2017, p. 7-9.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Hobby hackers to billion-dollar industry

T2 - the evolution of ransomware

AU - Srinivasan, C. R.

PY - 2017/11/1

Y1 - 2017/11/1

N2 - In recent months, ransomware has become a mainstream topic across the world, thanks to a string of high-profile attacks. There is a sense that no one is immune to attacks from a persistent and organised community of cyber-criminals who use ransomware as their main modus operandi. Ransomware has become a mainstream topic across the world recently, thanks to a string of high-profile attacks. But this form of malware has been with us for a while. Srinivasan CR of Tata Communications examines the history of ransomware, tracing its evolution from crude beginnings in the 1980s to its global impact today. And although it is proving to be a pernicious threat, he explains how we are also developing effective countermeasures.

AB - In recent months, ransomware has become a mainstream topic across the world, thanks to a string of high-profile attacks. There is a sense that no one is immune to attacks from a persistent and organised community of cyber-criminals who use ransomware as their main modus operandi. Ransomware has become a mainstream topic across the world recently, thanks to a string of high-profile attacks. But this form of malware has been with us for a while. Srinivasan CR of Tata Communications examines the history of ransomware, tracing its evolution from crude beginnings in the 1980s to its global impact today. And although it is proving to be a pernicious threat, he explains how we are also developing effective countermeasures.

UR - http://www.scopus.com/inward/record.url?scp=85034968171&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85034968171&partnerID=8YFLogxK

U2 - 10.1016/S1361-3723(17)30081-7

DO - 10.1016/S1361-3723(17)30081-7

M3 - Article

AN - SCOPUS:85034968171

VL - 2017

SP - 7

EP - 9

JO - Computer Fraud and Security

JF - Computer Fraud and Security

SN - 1361-3723

IS - 11

ER -