Beware these free tools – they may be hiding ransomware
June 8, 2022
|
4
min read

Highlights
You know people say, “if something seems too good to be true it probably is”? There’s a reason for that. And it applies to these free online tools that may be hiding malware…
Ever needed to quickly convert a file, say, from a Word doc to a PDF? And found yourself Googling for a free tool to do it?
It seems harmless enough, right?
A quick download, a fast conversion, job done.
But what if I told you that one small click could secretly open the door to ransomware or data theft?
That’s exactly what the FBI is warning about right now. Yes, the FBI.
A file converter does exactly what it says. It takes a file in one format and turns it into another. Maybe you’ve got a PowerPoint that needs to be turned into a PDF for a client. Or you’ve got a bunch of images you want to bundle into a single document.
These tools are often free, and they work. But that’s where the danger lies. Because some of them come with strings attached.
Cyber criminals are using some of these free converters as a cover for more sinister activity. While the tool does what it promises, behind the scenes, it may also be installing something nasty on your system. Such as malware or even ransomware.
What does that mean?
Malware is malicious software. It’s designed to do something harmful without your permission. It might steal your data, spy on your activity, or mess with your files.
Ransomware is one of the worst types of malware. It locks your files so you can’t access them, then demands a payment (usually in cryptocurrency) to unlock them. It’s like someone sneaking into your office overnight, putting all your important documents in a safe, and then charging you to get the key.
Worse still, these tools can also scan the files you upload and scrape them for sensitive information. That could be things like your passwords, banking details, or even personal data. If you’ve ever uploaded something with a customer list, an invoice, or employee details, that’s the kind of gold cyber criminals are after.
The problem is these tools often look perfectly legitimate. And they do what they say on the tin, which makes them hard to spot. That’s why it’s so important to be cautious.
If your business needs quick file conversions, it’s far safer to use trusted, professional tools. The kind that come from known software providers, not random websites you find in a pinch.
Knowing how these scams work is your first line of defence. So, if you or your team ever use online tools like this, it’s worth reviewing where they come from… and whether they’re putting your business at risk.
Need help setting up safe, secure software alternatives for your team? We can do that – get in touch.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

