Alerts & Outbreaks, Security Knowledge [May, 27, 2013]

Seriously? USA to legalize rootkits, spyware, ransomware and trojans to combat piracy?

By now most users will already be familiar with ransomware, either because they have been affected by it themselves at some point or because they have seen it on a friend’s PC. Ransomware usually refers to a special category of malware that essentially tries to hold a user’s computer and files hostage and demands payment […]

Emsisoft Lab [May, 23, 2013]

Which browser offers the best malware protection?

Navigating the Internet without web browsers would be like trying to drink your coffee without a mug. It simply doesn’t work. But the browser is also what stands between you and the millions of malware circulating websites out there. Accordingly, all major browsers have their own various forms of protection to protect users from malicious […]

Security Knowledge [May, 18, 2013]

Fake antivirus – What you should know about Rogue Security Software

The Internet has come of age, and unfortunately so too has malicious software and related infections. Viruses, Trojans and other kinds of malware have all played their part and as the Internet has evolved and grown, so have they. The evolution of rogue security software is as interesting as that of human evolution: from simple […]

Reviews & Awards [May, 11, 2013]

VB100 award April 2013 for Emsisoft Anti-Malware

The results of Virus Bulletin‘s April 2013 test are out now. Windows XP was chosen as the test platform, because a lot of people still use this operating system. A total of 45 different security programs had to prove their protection ability against approximately 20,000 threats (per week). The test results for Emsisoft Anti-Malware 7.0 […]

Security Knowledge [May, 1, 2013]

Attack on Bitcoins: The virtual currency that is creating a gold-rush amongst hackers

Have you ever heard of “Bitcoins“? They are a virtual currency that has been in use since the beginning of 2009 through open-source software. Individual Bitcoins are calculated as cryptographic keys in peer-to-peer networks. This is one of their major advantages as these keys cannot be forged due to their unique characteristics. Bitcoins are, however, […]