Alison's New App is now available on iOS and Android! Download Now

  • Home >>
  • News >>
  • What you need to know about the “WannaCry” Virus, Trojan Horses and Ransomware

What you need to know about the “WannaCry” Virus, Trojan Horses and Ransomware

The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus

What you need to know about the “WannaCry” Virus, Trojan Horses and Ransomware

What you need to know about the “WannaCry” Virus, Trojan Horses and Ransomware

The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus

Free Online Courses, Classes and TutorialsPublisher: Alison Editor

New Free Certificate Course on Global Virus Threat Published on MOOC platform


Galway, Ireland – May 16th 2017:

The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus, it maliciously gains access to computer systems, locking down and making inaccessible to you and others your private information and data, then requesting a financial payment for the release of same. This type of computer software attack is known as “Ransomware”.

This free online course teaches you how to avoid the virus, but more importantly explains the concepts behind these attacks. It is believed by industry experts that these types of computer virus attacks are going to become more frequent. Whether you are an individual learner or an employer or manager with an organisation of team of staff to protect, this free course will be of help to you in spreading awareness on how to protect against this malicious threat. As of 15th of May, around $50,000 worth of bitcoin has been paid to unknown ransomers.

This free online course will be of great interest to those who would like to gain a better understanding of the latest WannaCry ransomware attack, and to those wishing to protect against it as it outlines what steps to avoid the virus and steps that can be taken if your computer has become infected.