Programs
Online Masters
  • Programmes endorsed by Nebrija since March 2025
  • Live online classes
  • October 2025
  • 11 months | 2 weekly live class sessions
  • Sin necesidad de conocimientos previos
Official master's degrees

Programas con titulaciones oficiales en Panamá, Colombia, Ecuador y México y convenios con UMECIT, SEP y Fundación Universitaria Los Libertadores.

  • Live online classes
  • October 2025
  • 11 months | 2 weekly live class sessions
  • Sin necesidad de conocimientos previos
Specialisations
  • Live online classes
  • October 2025
  • 3 months
  • Prior knowledge is required
Advanced Masters
  • On-campus / Online classes live
  • October 2025
  • Sin necesidad de conocimientos previos
Bootcamps

Programas intensivos

  • On-campus / Online classes live
  • October 2025
  • Entre 300 y 400h.
  • Sin necesidad de conocimientos previos
Advanced Programs
  • On-campus / Online classes live
  • Octubre / Noviembre 2025
  • Prior knowledge is required
Activities for Young Immuners

Programas extraescolares enfocados a acercar a los más jóvenes el mundo de la tecnología: programación, inteligencia artificial, electrónica, videojuegos, ciberseguridad, etc...

Courses
IMMUNE
About us
Events
What’s new?
Develop your tech career
Companies
Students
¿Cómo matricularte en IMMUNE?
Campus life
Students
Employability
Employability Referral scheme
We help you to get started
Menu

WHAT IS RANSOMWARE AND WHAT IS ITS FUTURE?

Surprisingly enough, the concept of ransomware is not new. In fact, the first ideas about it date back to the late 1980s, although the first full proposal was made by ADAM L. Young and MOTI Yung [1] of Columbia University in 1996 (!). This article has prevented ransomware from becoming the problem it is today. Surely, cybercriminals must not have had access to (or been able to understand) good cryptography manuals.

Cybersecurity_hack.jpg

Predictably, however, at some point these programmers would start to study, and since about 2012 the situation has changed dramatically, becoming probably the biggest threat to information systems. The concept is actually very simple: ransomware - ransom, ransom, and ware, software shortening - is a malicious programme that infects computers and encrypts their files until the user pays a ransom to get them back.

This attack is nowadays, in fact, a very lucrative business. It is estimated that in 2018 the global cost of ransomware attacks in the world was around 8 billion dollars, and could exceed 11.5 billion this 2019 [2]. Probably the best known example was WannaCry in 2017, which affected many large companies and institutions in our country.

How to protect yourself from ransomware?

As we will see below, there are no "shortcuts", no way to recover the encryption keys without paying the corresponding reward. Therefore, I recommend 3 keys to protect our computers from a ransomware attack:

(1) diligently apply OS security patches,

(2) have a good anti-virus and, above all,

(3) have up-to-date backups of our data.

Come on, seriously, is there really no way to retrieve the files without paying? No, there isn't. Only for early versions of ransomware, which contained numerous bugs, can you try your luck at No More Ransom [3], a repository of old decryption keys maintained by Europol, the German police, Kaspersky and McAfee. However, virtually all currently existing ransomware variants are well implemented. So much so that ProPublica [4] has reported that some companies that can supposedly recover data hijacked by ransomware actually pay the bounty to the cybercriminals, without informing the user (and pass it on to the affected user, of course, plus a generous commission).

To pay or not to pay?

Obviously, all cybersecurity institutions and companies recommend against paying the bounty for many reasons, most of them very reasonable. However, sometimes the cure can be worse than the disease. Recently, the city of Atlanta suffered a ransomware attack and its administrators decided that they would not pay the bounty under any circumstances [5]. The result? They eventually spent more than $2.5 million to recover their systems, when the initial bounty was just under $50,000 in bitcoin.

Where is Ransomware evolving to?

However, despite the above scenario, the real problem with ransomware is yet to come, when it makes the leap to the Internet of Things, or IoT. Indeed, every device is becoming a computer, like our microwave, fridge, car or television. And from the moment they connect to the internet, they become vulnerable to ransomware and other threats.

Keyboard_hack.jpg

It is therefore only a matter of time before our car refuses to start and displays a warning on its screen informing us that it will not start until we pay an amount in bitcoins as a reward. Or our phone, fridge, electronic lock or defibrillator (which can be compromised from tens of metres away) [6]. You finish the list.

The real problem in this case is that the mitigating solutions discussed above do not even work in this case. So far, there is no way to back up the software of our refrigerator and, in any case, the process of recovering it is not within the reach of most users. Moreover, these devices are (supposedly) designed to last for many years, like a car, as opposed to the much shorter replacement times of computers and mobile phones.

Finally, to make matters worse, security is often the last priority for manufacturers of these IoT devices, so many do not have dedicated engineering teams, nor are their devices upgradeable. One example is the Mirai botnet, which infected hundreds of thousands of digital cameras and webcams and launched a denial of service (DoS) attack, resulting in many services such as Twitter being knocked out for hours. Most of the attacked devices cannot be fixed in any way, so they remain vulnerable.

The solution, like everything else in the field of cybersecurity, is neither simple nor immediate, but in my opinion it will happen in the long term in the form of much more demanding regulations by the authorities, which will force manufacturers to assume the consequences of manufacturing defective devices that can put people's lives at risk.

Want to learn about cybersecurity? Get trained with Advanced Cybersecurity's Tech Bootcamp and make an exponential leap in your career. All information and registration here.

Educational partners
AWS Partner NetworkDBS Dublin Business ShoolUmecitUmecitLiberatorsAlfaisalAsottechPueLatin America Leadership Program
Prizes and awards
AWS Skills to Jobs Tech AllianceLa Razón Award for Education in Technology and InnovationMember Digital Skills and Jobs CoalitionWhere to Study Excellence Education 2023Educational Excellence AwardsEuropean Excellence EducationGIMInstitute Innovation CatalystSustainable Supplier Training Programme
International allies
SICAMRECEmbassy of Colombia in SpainCITECAEIUEESSenescytMexicana de BecasIPFE
© IMMUNE Technology Institute. All rights reserved.