
Not-a-Virus: What is it?
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
234 articles
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
The trendy Nimses social network has a ways to go in terms of security and privacy.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
Until very recently, news of blockchain was all around. Now that the hype has passed, let’s contemplate blockchain’s future.
Downloaded a program called Netflix Login Generator? Delete it immediately!
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
Did our 2016 predictions come true? Let’s see and try to forecast what awaits the security industry in 2017.
Kaspersky Lab experts create a cure for CryptXXX. For the third time.
Ransomware infects 2,000 SFMTA computers, makes Muni rides free for the weekend.
Ransomware: a brief history, current situation, future predictions and how to solve the problem.
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
FAQ about ransomware: types, origins, dangers, and how you can stay safe
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker — but we developed a cure.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
You could’ve asked our GReAT members whatever you wanted. Here are the best 6 questions and GReAT experts’ answers
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
New ransomware called Satana encrypts your files and blocks the operating system from booting.