Category Archives: Emsisoft Lab
A variant of the Radamant ransomware uses the domain name “emisoftsucked” and strings such as emisoft f**kedbastardsihateyou in the code. You have to see this!
Crypto ransomware turns out to be threat number 1 in 2015 again. It encrypts all your document files and forces you to pay a ransom to get them back.
Many companies make us believe that security and comfort always have to be traded for privacy. There are privacy conscious alternatives, however.
Emsisoft’s public anti-malware database isthisfilesafe.com truly is one of a kind. As of today, it knows over 163 million malware threats so you don’t have to worry about getting infected with any of those bastards.
The ransomware PCLock started out as a rather simplistic Cryptolocker copycat, but has since evolved significantly with many variants and more advanced encryption methods.
Numbers don’t lie: it seems we have literally become an “Anti-PUP” company! Almost 80% of all malware we detect is made up of potentially unwanted programs (PUPs).
Emsisoft Labs successfully decrypted the CryptoDefense ransomware before the story was leaked to the press, helping at least 350 users recover their files.
Emsisoft’s Malware Analysis team has been closely following a new ransomware Trojan variant identified as Trojan-Ransom.Win32.Linkup.
This week, Emsisoft releases an update that optimizes our extensive signature database and identifies over 6000 new PUPs!
Over the past few days Emsisoft’s malware research team has received numerous reports of a new file encrypting ransomware strain. This new family of ransomware is commonly referred to as CryptoLocker or Trojan:Win32/Crilock.A. Like all file encrypting ransomware (also known as crypto malware) the goal of the attacker is to encrypt important files on the […]
Navigating the Internet without web browsers would be like trying to drink your coffee without a mug. It simply doesn’t work. But the browser is also what stands between you and the millions of malware circulating websites out there. Accordingly, all major browsers have their own various forms of protection to protect users from malicious […]
Have you ever received a contact request on Skype from someone you don’t know? This may happen from time to time, particularly if your Skype name is publically searchable. But what is really behind these contact requests and why do people bother? To find that out we played along and the following conversation ensued: At […]
Java is installed on almost all computers. This is an obvious security risk, considering that there are regular announcements on new Java vulnerabilities that enable hackers to infect your PC with malware. However, most users don’t even need Java and can safely uninstall it without losing needed functionality. Keep reading to learn all you need […]
Last week, a new zero-day Java vulnerability created quite a buzz on the Internet. To illustrate just how effectively this vulnerability is exploited, lets have a look at an email our research lab received, supposedly from LinkedIn. Below you can see the email as we received it. It looks harmless enough and appears to be […]