, Companyseceon
Demand for ransom in exchange for something valuable, captured forcefully, is an age old vice that has found its parallel in the digital world several years ago. Cyber criminals have resorted to extortion, preying on individuals and organizations (enterprises, businesses, institutions) by encrypting files on personal computers, workstations, tablets and mobile devices. In order to salvage the situ