Get the latest curated content with The Beat Asia's newsletters. Sign up now for a weekly dose of the best stories, events, and deals delivered straight to your inbox. Don't miss out! Click here to subscribe.
Following the thread of traditional hostage-takers, cybercriminals gain access to your computer, encrypt your data, and lock you out of your device until a certain amount of money or ransom is paid.