• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / CryptoMonitor presented as freemium solution to ransomware like CryptoLocker/CryptoWall

CryptoMonitor presented as freemium solution to ransomware like CryptoLocker/CryptoWall

2015-04-06 by Jason

Encrypting ransomware will encrypt your files and then charge money for the key to decrypt them. Some of these malicious ransomware products go by the names: CryptoWall, CryptoLocker, CTB Locker, CryptorBit, KeyHolder, TeslaCrypt, Operation Global, TorrentLocker, CryptoDefense, ZeroLocker, and others.

If your computer or a computer in your organization were hit by this malware, you had a few options:

  1. Recover the files from your backups.
  2. Go without those files or recreate them.
  3. Pay the ransom of a couple hundred dollars and up.

Another approach has been to use a white-listing service like AppLocker so that only approved applications can run and the ransomware would be denied. CryptoMonitor is presenting itself as an anti-ransomware solution to protect against the latest malicious programs. It uses a freemium business model by offering the product in two tiers, a free and a Pro version.

The free version allows for entrapment protection to detect ransomware, the ability to terminate that detected malware process, whitelist legitimate processes, and email alerts.

Entrapment Protection lays numerous different types of traps all around your system that a Ransomware Infection cannot resist to touch. These traps send encrypted pattern signals back and forth between CryptoMonitor and themselves constantly. When a Ransomware Infection falls into one of these traps, the pattern is broken and CryptoMonitor immediately takes action. Once this happens, the machine is locked down and you are alerted about the infection and prompted for your decision on what actions to take. During this time, no file modifications are allowed, so your files are safe while you think about your course of action. With this protection enabled you may notice a few hidden files, registry keys, folders, and services running, but don’t worry, they are there to protect you!

The Pro version builds on this with a LockDown Mode to prevent changes until the threat can be neutralized by a professional if CryptoMonitor is not able to do so automatically, the ability to block malicious code injected into legitimate processes, text alerts, and more protections.

cryptomonitor

More details about the new product and a comparison between the Free and Pro ($20) tiers of CryptoMonitor can be found at www.easysyncsolutions.com/cryptomonitordetails.html

cryptomonitor_title

Filed Under: Security and Privacy

Trending

  • The Illinois Marathon and Active.com – A Source of Spam?
    In Media, Security and Privacy, Talking Points
  • Resolve Internet Explorer Slowly Opening New Tabs
    In Software, Tech Solutions
  • Looking at four free firewalls
    In Security and Privacy, Software

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Configure Outlook to recurring appointments for the last weekday of the month Configure Outlook to recurring appointments for the last weekday of the month
  • 3d rendering circuit cloud for cloud computing technology Build and Deploy a Modern Web 3.0 Blockchain App in 2022
  • Telecom Application Development: When to Outsource Telecom Application Development: When to Outsource
  • Printer printing document wirelessly from mobile phone or smartphone wifi connection vector flat cartoon illustration, file air print on fax or ink jet via cellphone bluetooth modern design Why Your Business Needs Online Fax Services In 2022
  • 6 Best Ways to Protect Your Business Account 6 Best Ways to Protect Your Business Account
  • How to download videos from Instagram How to download videos from Instagram
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • Build and Deploy a Modern Web 3.0 Blockchain App in 2022
  • Telecom Application Development: When to Outsource
  • Why Your Business Needs Online Fax Services In 2022

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2022 · Magazine Pro Theme on Genesis Framework · WordPress · Log in