I research about this problem and here's what comes up. The malware that will hide your computer and ask "ransom" Maghdi of Abo Abia - 11/06/2013 - Cryptolocker encoding files that can only be unlocked by a key Today we talk about Cryptolocker, a malware that is infecting computers around the world, demanding a ransom to unlock files that are encrypted according to a military technology and that can be unlocked by a key that will be deleted in 72 hours. The infection, according to security company Sophos digital, began about six weeks ago. WHAT IS IT - Chester Wisniewski, Senior Security Advisor at Sophos, said "Cryptolocker staff analyzes each file, document, database, spreadsheets, photos, videos and music collections and encrypts a second language of international military and only programmers are able to unlock the computer. "And once infected the computer continues to run even if it becomes impossible for the user to work normally making it impossible to access most personal files. And if you do not have a backup you can give to the lost computer, unless you are willing to pay a ransom. " The decryption key - Michael Kaiser , executive director of the U.S. National Cyber Security Alliance , added: " Cybercrime is evolving . The bad guys get smarter and use new technologies. These people are always looking for new ways to steal your money . " Cryptolocker malware is different from others because unlike other programs does not allow the removal resulting in restoration of files and documents. Files can only be de- encrypted with a key available to the bad guys on their servers. And if you do not pay the ransom within three days , the key will be destroyed. And the contents of the PC will be irretrievably lost . THE RANSOM - Hackers want $ 300 to replace the pieces , or four hundred dollars in the case of payment by bitcoin . And to make you feel the rush in the owners of the infected PC displays a countdown 72 hours before the decryption key is destroyed . Confirmation of a victim who has seen destroyed all the files he cared more, such as family photos and those of the children who grow up with his wife who he blamed for what happened. This software appears as a standard attachment format . Zip or . Pdf . Inside , however, hides an executable file that is activated each time you click on the file alegato an invoice shipping U.S. Postal Service. The banner comes after a few days and the only way to defend yourself is to create back up files, important or not. ( Stock footage)