Emsisoft has your back this holiday season with a list of the top 12 scams to look out for this Christmas and how to recognise them.
Category Archives: Security Knowledge
The Internet of Things is a growing area that seems to have no boundaries. It was only a matter of time before it would catch up with the sex toy industry. Malware can infect any internet capable device allowing access to the most private details of pleasure seekers.
Meet ‘Harry,’ a 53 year-old working professional who was the victim of a ransomware attack. His story is a perfect example of how with the click of a button 20 years worth of data can simply vanish before your eyes.
Popups on your computer telling you that your computer is infected may not be all that they seem. Many scammers are now using popups to scare users into calling for tech support only to be harassed into purchasing services they don’t need.
Once again the target of malware developers, our security researchers take on twitter trolls and decrypt your files for free.
Many people believe that leaving their computer unattended won’t pose any security risks as long as their device is locked. However, researcher Rob Fuller, of R5 Industries demonstrates that an attacker with physical access to your device can access your login details in seconds.
Ransomware has become a highly lucrative profit earner for cyber criminals. So much so that hackers are now sabotaging the malware of their competitors to secure their share of victims.
Read our interview with Michael Gillespie at Malware Hunter Team, who developed a website to help you find out what type of ransomware your computer has been infected with.
Our lab works to crack new strains of ransomware and as a result are often at the receiving end of abuse from hackers who can no longer profit from their malware. Recently, the abuse has become personal with abuse being coded directly into new variants aimed directly at Fabian, the head of our Malware Lab.
Ransomware is now the most consistently problematic type of malware to effect internet capable devices and businesses. A solid protection suite is vital but there is a second important step to protect your data – Backup.
Life support machines can be the difference between life and death. But did you know they can also be an easy access point for hackers to access hospital networks and steal private patient information?
Pokemon Go has taken over cities worldwide, but has it also given hackers access to take over your phone?
Cybercrime has not been deterred by modern security methods. With data being held for ransom and banking fraud running rampant, individual users are at a greater risk than ever.
New ransomware threats appear almost daily. This week the Emsisoft Team took a look at a new ransomware family which reared it’s ugly head around two months ago and began hurling abuse at our staff. Meet Apocalypse, learn how it works and how you can protect your data.