Ransomware’s history and evolution in facts and figures
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
69 articles
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order
Curios fact: in the United States the transition of merchants to EMV cards (popularly known as chip-and-pin cards), which has the purpose of fighting fraud, is actually driving fraud losses
In the past few years there have been a lot of discussions surrounding big data. These talks generally centered on the amazing opportunities that the technology provides. The byproduct of
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing of
Living in a digital age means that most of the things we use are operated and/or controlled by computers. This ranges from telecom appliances to cars, from factories and energy
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
Yesterday The European Court of Justice ruled that the Safe Harbor agreement, which allows American companies to store and move personal data of European users in the United States if
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
Cyber-physical security researchers Marina Krotofil and Jason Larsen presented their research on hacking chemical plants at Black Hat and DEF CON – this was a very fascinating talk. It’s not
The predictability of human beings can barely be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PIN codes and more. Many of
Security researcher Chris Rock discovered, that it’s very easy to kill a human. We are talking in a legal sense not the one that carries moral and legal consequences. All
Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail,
Cybercriminals are learning from each other. Take TeslaCrypt, for example. It is a relatively new family of ransomware; its samples were first detected in February 2015. The notable feature of
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
In most cases, if you are a victim of ransomware, there’s nothing you can do. Luckily, from time to time police and cybersecurity companies take down command and control servers
Many people still think that malware is a software that completely disrupts the normal functioning of PCs. If your computer is working well, it means it’s not infected, right?