
Snow White, the Seven Cryptominers, and the targeted attacks
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
4 articles
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
Embedded systems demand special protection from infections similar to WannaCry.
Cryptomalware can infiltrate and encrypt an entire network – including its backups – within minutes.