Happy New Quantum Year!
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
228 articles
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
Did our 2016 predictions come true? Let’s see and try to forecast what awaits the security industry in 2017.
Kaspersky Lab experts create a cure for CryptXXX. For the third time.
Ransomware infects 2,000 SFMTA computers, makes Muni rides free for the weekend.
Ransomware: a brief history, current situation, future predictions and how to solve the problem.
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
FAQ about ransomware: types, origins, dangers, and how you can stay safe
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker — but we developed a cure.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
You could’ve asked our GReAT members whatever you wanted. Here are the best 6 questions and GReAT experts’ answers
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
New ransomware called Satana encrypts your files and blocks the operating system from booting.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Database with millions of Twitter accounts is being sold on the Darknet. At least 32 million of them are unique and probably active. What you need to do is change your password ASAP!
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.