Remote working and ransomware
The mass shift to working from home has made ransomware an even greater threat.
199 articles
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Syrk ransomware is out, disguised as a Fortnite cheat pack. Learn what it is and how to recover your files.
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
Do not expect data encrypted by ransomware to be restored easily. It is better to protect the data in the first place.
Industrial Norwegian giant Hydro hit by ransomware — security incident analysis.
GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.