Media coverage

Ransomware explained: How digital extortion turns data into a silent hostage

Sorry, this post has not been published yet, check again later!

June 20, 2016
Published by:

Computerworld UK

Vectra explains how the correlation of multiple anomalies can be used to spot ransomware. “The detection of the malware doing its stuff was detected through three different machine learning algorithms," Vectra CSO Günter Ollmann tells Computerworld UK. "We have deliberately focused on new machine learning strategies.”

Read publication

Most recent media coverage

Industry reactions to crypto vulnerability found by NSA: Feedback Friday

January 17, 2020

Security Week

Read more

NSA Windows 10 security disclosure raises questions

January 15, 2020

Computer Weekly

Read more

NSA hands serious flaw to Microsoft rather than use it

January 15, 2020

ITPro

Read more