{"id":6946,"date":"2014-02-03T08:00:37","date_gmt":"2014-02-03T13:00:37","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=6946"},"modified":"2014-02-03T08:00:37","modified_gmt":"2014-02-03T13:00:37","slug":"how-easy-it-can-be-to-be-fooled-into-installing-a-rogue-aka-ransomware","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/how-easy-it-can-be-to-be-fooled-into-installing-a-rogue-aka-ransomware\/","title":{"rendered":"How easy it can be to be fooled into installing a Rogue aka Ransomware"},"content":{"rendered":"<p>The most pernicious threat most of us face is an attack by a Rogue \/Ransomware (fake anti-virus or security software). Once it tricks you into installing it, your computer will be held hostage until you pay a ransom &#8212; or figure out a way to remove it yourself. Once a Rogue gets control of your computer you won&#8217;t be able to get rid of it easily.<\/p>\n<p>So watch how a Rogue attack happens, how easily it can be to be fooled into believing these Rogues are real security programs. The video below comes from Invincea &#8211; who makes software for the enterprise and small businesses. <span style=\"text-decoration: underline;\"><a href=\"http:\/\/thundercloud.net\/emsisoft\/\" target=\"_blank\"><strong>Emsisoft<\/strong><\/a><\/span> provides similar protection from Rogues and Ransomware for home users.<\/p>\n<p>Watch the video now&#8230;we hope it helps you understand how easily it can be to be fooled into installing a Rogue:<\/p>\n<p>https:\/\/www.youtube.com\/watch?v=7xKmAsSzJv0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most pernicious threat most of us face is an attack by a Rogue \/Ransomware (fake anti-virus or security software). Once it tricks you into installing it, your computer will be held hostage until you pay a ransom &#8212; or figure out a way to remove it yourself. Once a Rogue gets control of your computer you won&#8217;t\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/how-easy-it-can-be-to-be-fooled-into-installing-a-rogue-aka-ransomware\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,1669,1656,1654],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6946"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=6946"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6946\/revisions"}],"predecessor-version":[{"id":6947,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6946\/revisions\/6947"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=6946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=6946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=6946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}