Protecting your network from ransomware
Are you set up to block ransomware from jumping from one machine to your network?
217 articles
Are you set up to block ransomware from jumping from one machine to your network?
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
New ransomware called Satana encrypts your files and blocks the operating system from booting.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Theoretically, every business should have already learned how to protect itself against ransomware. Actually it’s not the case.
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
Hospital pays ransomware ransom, does not get files back.
A look at recent survey results on awareness of ransomware in North America.
Kaspersky Lab RakhniDecryptor utility updated to help decrypt files encrypted by previously invincible versions of TeslaCrypt.
In a highly surprising move, the notorious Teslacrypt authors have wrapped up their operation and released the ransomware’s master key.
All files encrypted with TeslaCrypt ransomware can now be decrypted … thanks to its creators
The Petya ransomware installer now includes another ransomware called Mischa that complements it.