Page 73 - Cyber Warnings
P. 73







These folders are beyond reach for ransomware even if it infects a computer.
Bitdefender Internet Security 2017 also accommodates web page blacklisting and anti-
phishing layers of defense, as well as performance enhancement and privacy protection
features.


3. Malwarebytes Anti-Ransomware

The invaluable expertise of Malwarebytes researchers in ransomware analysis has got a
software embodiment called Malwarebytes Anti-Ransomware. This lightweight tool
ensures real-time protection against known and new file-encrypting threats. Its advanced
proactive technology takes virus signatures out of the detection paradigm.

Instead, it monitors the system for specific markers of ransomware activity and instantly
terminates all processes that try to modify your data. To its credit, the app lets you easily
define certain file exclusions to avoid false positives.


4. EMET

EMET stands for Enhanced Mitigation Experience Toolkit. The efficiency of this solution
by Microsoft revolves around preventing malicious code from exploiting software
vulnerabilities on a computer.

What does this have to do with ransomware? A lot of file-encrypting Trojans proliferate
via exploit kits.

The infection chain starts with a compromised website that redirects visitors to a
malicious landing page. From there, the exploit kit finds security holes in unpatched
third-party applications installed on the PC and uses them to execute the ransomware.
EMET makes it as hard as possible for a threat actor to exploit these software
weaknesses.

Its Certificate Trust feature also prevents man-in-the-middle attacks that rely on abusing
the public key infrastructure.


5. CryptoPrevent

The user-friendly and lightweight CryptoPrevent tool by Foolish IT provides dependable
protection against crypto ransomware and other malware. Its SRP Protection feature
automatically creates rules under Software Restriction Policies that prevent most strains
from being executed.

73 Cyber Warnings E-Magazine December 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   68   69   70   71   72   73   74   75   76   77   78