Media coverage

Ransomware explained: How digital extortion turns data into a silent hostage

Sorry, this post has not been published yet, check again later!

June 20, 2016
Published by:

Computerworld UK

Vectra explains how the correlation of multiple anomalies can be used to spot ransomware. “The detection of the malware doing its stuff was detected through three different machine learning algorithms," Vectra CSO Günter Ollmann tells Computerworld UK. "We have deliberately focused on new machine learning strategies.”

Read publication

Most recent media coverage

Manufacturing Spending Billions on IoT, But Still Can’t Patch Windows or Remember Passwords

May 21, 2019

Channel Daily News

Read more

Chinese-Made Drones Could Transmit Flight Data Back to Makers, Gov’t, DHS CISA Warns

May 21, 2019

SC Magazine

Read more

DHS Issues Alert on Chinese-Made Drones

May 21, 2019

Infosecurity Magazine

Read more