How to properly update Windows to protect your computer from WannaCry
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
134 articles
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
We explain three important concepts underlying antivirus action: signatures, the nature of viruses, and how antivirus solutions remove malware.
Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker — but we developed a cure.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Digital advertising brings money to companies and relevant ads to you and me — and attracts fraud. How does it all work?
Fantom ransomware displays a fake Windows Update screen while encrypting your files.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
The key danger is the method the Hummer uses to achieve its goals. It roots a device and gains administrator’s privileges to install unauthorized software of its own discretion
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
New ransomware called Satana encrypts your files and blocks the operating system from booting.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.