{"id":55890,"date":"2017-01-03T22:08:44","date_gmt":"2017-01-03T22:08:44","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=55890"},"modified":"2017-01-03T22:08:44","modified_gmt":"2017-01-03T22:08:44","slug":"ransomware-what-is-it","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/","title":{"rendered":"Ransomware &#8211; What is it?"},"content":{"rendered":"<p>Ransomware, or malicious software that encrypts your files, holding them hostage until you pay the ransom demand, took the IT world by storm in 2016.\u00a0 On many different platforms, I have read about PC users falling victim to ransomware.\u00a0 Many of these cases are certainly true; however some I have found are actually support scams, or other viruses that have overrun PCs.\u00a0 Ransomware, due to its highly publicized nature has become the name of all malware.\u00a0 When it is simply one type, which is being incorrectly categorized at times.<\/p>\n<h4>Ransomware &#8211; What is it?<\/h4>\n<p>The intent of this post is to help users understand what exactly ransomware is.\u00a0 If you have found yourself a victim of ransomware you will have noticed the following:<\/p>\n<ol>\n<li>First your files are encrypted.\u00a0 This means they are completely inaccessible to you.\u00a0 Perhaps not all of your files were encrypted, but what the hacker deems as &#8220;most important&#8221; will be on the top of their encryption list.<\/li>\n<li>Second, you will receive a message from the hacker stating you must pay\u00a0a certain amount of money,\u00a0in order to get your files back.\u00a0 The amount varies upon the ransomware variant (the\u00a0type of ransomware), as well as the victim.\u00a0 For instance a home user will not be demanded to pay as much as say, a medical facility.\u00a0 The demand may look something like these two images.\u00a0<img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-54343 size-full aligncenter\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_cry-ransomware.png\" width=\"500\" height=\"278\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_cry-ransomware.png 500w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_cry-ransomware-300x167.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\u00a0 <img decoding=\"async\" class=\"wp-image-53991 size-full aligncenter\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hitler.png\" width=\"486\" height=\"349\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hitler.png 486w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hitler-300x215.png 300w\" sizes=\"(max-width: 486px) 100vw, 486px\" \/>Now you will notice these examples look nothing alike.\u00a0 That is because, each ransomware variant has their own ransom page that comes up after you&#8217;ve been infected.\u00a0 However a trend found in each is the words &#8220;Your files are encrypted&#8221;.\u00a0 If you receive any kind of message stating your files have been encrypted, with a payment demand, you have been hit with ransomware.<\/li>\n<\/ol>\n<p>As we know, ransomware has gained in popularity in the last year.\u00a0 Thousands, if not millions, of computers have been infected with legitimate ransomware attacks, and the victims have paid millions upon millions of dollars to these cyber criminals.\u00a0 By continuing to pay the hackers, the ransomware epidemic will continue.<\/p>\n<h4>Ransomware &#8211; The Aftermath<\/h4>\n<p>Some may ask, why victims pay the ransom when we know it just reinforces the hackers to continue with these attacks.\u00a0 First, retrieving the files from a ransomware attack is incredibly difficult.\u00a0 For a home user, depending on the files, they could possibly wait to see if a decryption tool, a tool to unlock the files, becomes available in the near future.\u00a0 This could take weeks, months or even years.\u00a0 Most people don&#8217;t have that kind of time.<\/p>\n<p>Many victims find they are able to restore their computers by either accessing a system restore point, or using backup files to restore their locked data.\u00a0 Unfortunately, this again takes time, which some people don&#8217;t have.\u00a0 Thinking of this from a business perspective, the hours it may take to not only retrieve the backup files, but then upload them could be daunting.\u00a0 Also, from a business perspective, they may have to hire a firm to assess the damage, determine the files that were accessed, etc.\u00a0 Again, time and money.\u00a0 So when you look at all of the contributing factors &#8212; is it worth just paying the demand and moving on?<\/p>\n<p>No.\u00a0 Not even a little bit.\u00a0 For a few very clear reasons.<\/p>\n<ol>\n<li>You paid them.\u00a0 Now what is to say they actually send you the tool to unlock your files?<\/li>\n<li>They sent you the tool to decrypt your files&#8211;great!\u00a0 Now you&#8217;re a sitting duck.\u00a0 You paid once, and they will\u00a0assume you will\u00a0pay again.\u00a0 Wait for the next attack patiently&#8230;<\/li>\n<li>You&#8217;ve set a standard.\u00a0 Because you paid the ransom, the cyber criminals are making more money.\u00a0 They now know the more people they infect, the more people that will pay.\u00a0 Example: Company X paid.\u00a0 Home user X paid.\u00a0 Company Y and Z will certainly pay too, so they&#8217;ll get infected.\u00a0 Home user Y and Z will also surely pay, so they&#8217;ll too get infected.\u00a0 See the trend?<\/li>\n<\/ol>\n<h4>Conclusion<\/h4>\n<p>To avoid becoming the next victim to ransomware, there are a few steps PC users must take.\u00a0 First, you need to use a security solution that take a preventative approach.\u00a0 As mentioned earlier, getting your files back after ransomware strikes is incredibly difficult.\u00a0 Therefore, you must be proactive and use an antivirus solution that believes in prevention instead of reaction.\u00a0 You can read the latest Virus Bulletin Reactive and Proactive (RAP)\u00a0Test results <a href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2016\/08\/vb100-comparative-review\">here.<\/a>\u00a0 The RAP scores are based on how\u00a0several different antivirus solutions detected various malicious files in both a reactive and proactive fashion.\u00a0 Spoiler alert: <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\">PC Matic<\/a> was the leader in proactive detection with a 99.9% detection rating.<\/p>\n<p>Also, in addition to a proactive security solution, be fully aware of what you are clicking on.\u00a0 Several times ransomware campaigns are sent through email.\u00a0 Before you open an email or attachment, think about what you are doing.\u00a0 These hackers aren&#8217;t making millions because they&#8217;re bad at what they do.\u00a0 The malicious emails and attachments will look legitimate, which is why you need to think about the following:<\/p>\n<ul>\n<li>Are you expecting this email\/attachment?<\/li>\n<li>Do you know the sender?<\/li>\n<li>Is the web address legitimate?<\/li>\n<li>Are the links sending you to where they say they are?\u00a0 (You can check this by hovering the link WITHOUT clicking it, to see where it will send you.)<\/li>\n<li>Are the links within the email secure?\u00a0 Meaning, does the URL include https:\/\/\u00a0 (You can check this by hovering the link WITHOUT clicking it.)<\/li>\n<\/ul>\n<p>And if any of this is in question, contact the sender.\u00a0 When doing so, be sure to obtain their contact information from somewhere other than the email you are questioning.\u00a0 If it truly is a malicious email, and you reply to it, do you believe the hacker will say &#8220;ya caught me!!&#8221;.\u00a0 No, they won&#8217;t.\u00a0 Again, confirm the contact information from the sender from somewhere other than that email.<\/p>\n<p>Good luck, and stay safe!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware, or malicious software that encrypts your files, holding them hostage until you pay the ransom demand, took the IT world by storm in 2016.\u00a0 On many different platforms, I have read about PC users falling victim to ransomware.\u00a0 Many of these cases are certainly true; however some I have found are actually support scams, [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55140,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,5090,12],"tags":[4363],"class_list":["post-55890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-slider","category-the-pit-blog","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware - What is it?<\/title>\n<meta name=\"description\" content=\"Ransomware, the malicious malware that locks your files until you fulfill the payment demands of the hacker has exploded in the last year...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware - What is it?\" \/>\n<meta property=\"og:description\" content=\"Ransomware, the malicious malware that locks your files until you fulfill the payment demands of the hacker has exploded in the last year...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-03T22:08:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Ransomware &#8211; What is it?\",\"datePublished\":\"2017-01-03T22:08:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/\"},\"wordCount\":998,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"TechTalk Slider\",\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/\",\"name\":\"Ransomware - What is it?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"datePublished\":\"2017-01-03T22:08:44+00:00\",\"description\":\"Ransomware, the malicious malware that locks your files until you fulfill the payment demands of the hacker has exploded in the last year...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-what-is-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware &#8211; What is it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware - What is it?","description":"Ransomware, the malicious malware that locks your files until you fulfill the payment demands of the hacker has exploded in the last year...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware - What is it?","og_description":"Ransomware, the malicious malware that locks your files until you fulfill the payment demands of the hacker has exploded in the last year...","og_url":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-01-03T22:08:44+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Ransomware &#8211; What is it?","datePublished":"2017-01-03T22:08:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/"},"wordCount":998,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","keywords":["ransomware"],"articleSection":["Ransomware","RansomwareWar","TechTalk Slider","The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/","url":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/","name":"Ransomware - What is it?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","datePublished":"2017-01-03T22:08:44+00:00","description":"Ransomware, the malicious malware that locks your files until you fulfill the payment demands of the hacker has exploded in the last year...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-what-is-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware &#8211; What is it?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/55890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=55890"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/55890\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55140"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=55890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=55890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=55890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}