The team at Emsisoft is excited that Emsisoft Anti-Malware got certified with the AV-Test Certified award.
Emsisoft Anti-Malware and Emsisoft Internet Security version 10 come with a new behavior blocker panel that has many new settings and features. Learn how to use them to your advantage.
AV-Comparatives has released its 2015 annual security survey revealing several key security findings based on thousands of respondents. The results showcase Emsisoft to rank favorably among many other of the top security products.
Emsisoft received five advanced+ awards at AV-Comparatives last year, which means we are “top rated”. The new Emsisoft v9 user interface also seems to be getting some appreciation.
The spam emails try to lure users with misleading, fake invoices from banks, telephone companies and even PayPal in order to steal bank account credentials.
Ransomware ‘Cryptowall 2.0’ is using the TOR network to mask its tracks. It encrypts users data and asks for ransom in return for the key to unencrypt the data.
Microsoft warns that hackers are using email to phish for users to turn on the macro features in Microsoft Office in order to install malware.
It has been discovered that a Chinese smartphone company by the name of Coolpad has loaded Android phones with malware that steals information, installs apps and can disable system features.
Hackers are using the Steam Chat room to spread dangerous malware by sending hyperlinks that appear to come from a trusted friend.
Hackers lure social media users into clicking on appealing news headlines that lead to sites with malware and malicious files.
Emsisoft Anti-Malware for Server detected all malware and received the highest award that Virus Bulletin offers.
Over the past few days Emsisoft’s malware research team has received numerous reports of a new file encrypting ransomware strain. This new family of ransomware is commonly referred to as CryptoLocker or Trojan:Win32/Crilock.A. Like all file encrypting ransomware (also known as crypto malware) the goal of the attacker is to encrypt important files on the […]
Have you ever received a contact request on Skype from someone you don’t know? This may happen from time to time, particularly if your Skype name is publically searchable. But what is really behind these contact requests and why do people bother? To find that out we played along and the following conversation ensued: At […]
Java is installed on almost all computers. This is an obvious security risk, considering that there are regular announcements on new Java vulnerabilities that enable hackers to infect your PC with malware. However, most users don’t even need Java and can safely uninstall it without losing needed functionality. Keep reading to learn all you need […]
“Your computer is blocked!” – Not something you enjoy seeing when using it. Unfortunately thousands of PC users worldwide find themselves in a situation where, all of a sudden their computer is unusable unless they pay a fee to unlock it. The FBI or a similar national law enforcement organization seems to claim that […]
Last week, a new zero-day Java vulnerability created quite a buzz on the Internet. To illustrate just how effectively this vulnerability is exploited, lets have a look at an email our research lab received, supposedly from LinkedIn. Below you can see the email as we received it. It looks harmless enough and appears to be […]