Ransomware (CryptoLocker)


Examples of extortionate ransomware became prominent in May 2005. By mid-2006, Trojans such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated encryption schemes, with ever-increasing key-sizes. Gpcode.AG, which was detected in June 2006, was encrypted with a 660-bit RSA public key. In June 2008, a variant known as Gpcode.AK was detected. Using a 1024-bit RSA key, it was believed large enough to be computationally infeasible to break without a concerted distributed effort.

Read more →

An Introduction to Lucidity IT

Hello all,

I’d like to give you a brief introduction to Lucidity IT.

Lucidity IT is based on the Sunshine Coast in Queensland, Australia. We offer technical business solutions to the south-east corner, and Australia wide.  We have partnered with key vendors because we believe these vendors offer the ‘big picture’ ideologies that provide actual positive ROI to your organisation.

Read more →