Blackmail

Published by Franziska on

Last Updated on 20. March 2023 by Martin Schuster

Some methods are aimed to blackmail people. Here you can distinguish between a “true” and an “empty” threat. In the first case, so-called ransomware is used, for example. This type of malware partially or completely blocks access to a device or files by encrypting them until a ransom is paid. Experience shows that even after a payment is made, the device is not unlocked, which is why it is not recommended to pay a ransom. However, this can also include when an attacker specifically blackmails a person with stolen data (pictures, e-mails, etc.).

In the second case, it is usually randomly claimed that compromising material will be published or sent to contacts from the private e-mail list if a certain amount of cryptocurrency is not transferred. Such empty threats should be ignored, as they are usually just made up.

Categories:

https://blockchain-academy.hs-mittweida.de/wp-content/uploads/2021/04/logo_bcam_rgb_gross.png

Welcome

Blockchain Academy

Continue with credential

No account yet?

Powered by Hidy

Register with Hidy


Register
Sign in

We need the following credential to register:

please select:

To create a new account, we need the following data from you:

We would appreciate the following additional information from you for the creation of your account:

Welcome

Blockchain Academy

Continue with credential

Already have an account?

Powered by Hidy

Sign in with Hidy


Register
Sign in

We need the following credential to log in:

please select: