Find the worst passwords of the year and how to manage them correctly.
Category Archives: Security Knowledge
Emsisoft’s sophisticated Exclusions feature helps power users and admins to customize monitoring and scanning requirements using wildcards and environmental variables.
Emsisoft CTO and Head of our Malware Research Lab, Fabian Wosar, cracks Hermes Ransomware by attacking the encryption generator.
Been infected with ransomware? Don’t panic! Follow our step-by-step guide to identify and remove ransomware.
Stay safe online this Valentine’s Day. These are the top three scams to look out for.
Emsisoft brings you five simple steps to spring clean your Windows computer and keep it free from malware.
It was the year when ransomware went from wide spread to epidemic dimensions, but Emsisoft is here to help. Our version 12 protection software series introduced a number of valuable improvements that help you fight all types of malware.
Abandoned websites have become the breeding ground for malware injection and ransomware infection. Users and admins alike, here’s what you need to know.
The Internet of Things is a growing area that seems to have no boundaries. It was only a matter of time before it would catch up with the sex toy industry. Malware can infect any internet capable device allowing access to the most private details of pleasure seekers.
Meet ‘Harry,’ a 53 year-old working professional who was the victim of a ransomware attack. His story is a perfect example of how with the click of a button 20 years worth of data can simply vanish before your eyes.
Popups on your computer telling you that your computer is infected may not be all that they seem. Many scammers are now using popups to scare users into calling for tech support only to be harassed into purchasing services they don’t need.
Once again the target of malware developers, our security researchers take on twitter trolls and decrypt your files for free.
Many people believe that leaving their computer unattended won’t pose any security risks as long as their device is locked. However, researcher Rob Fuller, of R5 Industries demonstrates that an attacker with physical access to your device can access your login details in seconds.
Ransomware has become a highly lucrative profit earner for cyber criminals. So much so that hackers are now sabotaging the malware of their competitors to secure their share of victims.