资讯

This spring and summer (2017), SLocker iterations began appearing mimicking WannaCry GUI. "After laying low for a few years, [SLocker] had a sudden resurgence last May." said Ford Qin of Trend Micro.
SLocker is a type of ransomware that works by encrypting images, documents and videos on a mobile device to later ask for ransom to decrypt files. The malware is executed and runs silently without ...
The SLocker Android ransomware is back with a new wave of infections, after previously wreaking havoc in the summer of 2016. This recent wave of infections was spotted by security firm Wandera ...
A ransomware threat called SLocker, which accounted for one-fifth of Android malware attacks in 2015, is back with avengeance, according to security firm Wandera. SLocker encrypts images, docum ...
SLocker runs in the background after it infects a mobile device, encrypting selected files. It can also make the device inaccessible.
The SLocker family is one of the oldest mobile lock screen and file-encrypting ransomware. It used to impersonate law enforcement agencies to convince victims to pay their ransom.
SLocker is characterized as the first Android ransomware that uses file encryption. It is also noted for its use of the TOR anonymizing network to communicate with its controller. The 2016 attacks ...
Like other forms on ransomware, SLocker locks victims out of their personal files like photos and documents until they pay a $500 fine. Then they just have to hope the criminals honor the deal.
Like other forms on ransomware, SLocker locks victims out of their personal files like photos and documents until they pay a $500 fine. Then they just have to hope the criminals honour the deal.