Get a free decryptor for Fonix ransomware
When the creators of Fonix ransomware abandoned their malicious ways and published the master key, we made a decryptor out of it.
112 articles
When the creators of Fonix ransomware abandoned their malicious ways and published the master key, we made a decryptor out of it.
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
Someone tried to use popular Google Chrome Extensions for secretly playing videos in users’ browsers to inflate view counts.
Research seeks to understand key drivers of the future of work.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
Mobile apps can track your location and sell the data to third parties. What can you do about it?
These handy tools make watching shows on Netflix even easier and safer.
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
Cybercriminals are using steganography to hide their code and seek industrial data.
Is your child not yet 13 years old? We explain how to create a Google child account for him or her.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
The DeathStalker group targets relatively small companies and their trade secrets.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.