Windows users - Warning! Please read.
First, what it is and what it does. It's a trojan type of malware that comes into your system primarily thru email as a ZIP file. Many users reporting a fake USPS email but it can be anything to try and get you to open the attachment. If you open the attachment, the executable will encrypt your files on your hard drive making them unusable. There are only 2 ways to recover from that scenario. #1, you pay the ransom following the instructions (have seen prices varying from $100-$400) and then you wait for the files to decrypt. #2. You remove the malware (easy to do that) and restore from a good backup. If you don't have a backup, you're SOL. You will have to pay to get your files back. The "experts" haven't been able to resolve this particular malware yet and while the possibility exists, it will be very difficult. The encryption uses a public and private key, unique to each system that it infects. The public portion of the key resides on your system and the only way to get the private portion is to pay the ransom fee. You cannot decrypt your files without the private part of the key.
Now for the good stuff. #1 - Don't open any attachments in your emails that your aren't expecting. Just good common sense. #2 - Backup your stuff. Again just good common sense. #3 - There is a prevention tool available that will keep this particular malware from infecting your computer. I'd recommend that your d/l and install it. The link is here for the prevention tool: http://www.foolishit.com/download/cryptoprevent/
For information on this particular problem, read about it here: http://www.bleepingcomputer.com/viru...re-information
The prevention tool will also help protect from lots of other malwares that run from the same location as CryptoLocker, that's why I recommend you install this. Be aware, it's possible that it could create some minor problems but better to have those than have your files encrypted. I've had two customers get this infection in the last two days. One was on a network with 25 users and the infected PC also infected the file server, bringing that business down until we could repair. We easily removed the malware, and the file server was restored from backups but a few files that were in use when it occurred were lost. The end users PC was recovered with system restore.
Bottom line is that I wanted to warn my good friends here in CF about this nasty. There is currently no way around it other than pay up or restore from backups. My suspicion is that the Feds will be getting involved on this one and the culprit(s) might be getting a visit from a SEAL team. While the methods appear to be very anonymous, there is still a trail and the power of the gov't can be brought to bear on this.
1. - Don't open email attachments.
2. - Get your stuff backed up if you don't want to lose it.
3. - Install the prevention tool, just to make sure.
Ok, off the soapbox. Sorry about the downer approach of this message.





The Best of Corvette for Corvette Enthusiasts

Former Apple Employee and a Computer Engineer who specializes in alternative OS's
With that said guys common sense and good AV. Make sure you are downloading from a reliable resource, and any time you are putting credit card information in make sure the website you are on is https and not http.
As for the Mac guys, grab a beer, and the mouse, and have at it

With that said Windows 8 and the Surface 2 could be game changers but it just seems like the leadership mentality at Redmond is that of a dinosaur. The same OS everywhere model is something I love.... iOS is something I hate!
With that said Windows 8 and the Surface 2 could be game changers but it just seems like the leadership mentality at Redmond is that of a dinosaur. The same OS everywhere model is something I love.... iOS is something I hate!
Just want people to be safe and secure.





















lol I've been problem free since going to Apple with all of my devices. Best decision of my life!