fileless-malware-feature
Security Knowledge [Nov, 17, 2017]

Fileless malware: Invisible threat or scaremongering hype?

Sneaky fileless malware attacks are growing in popularity. Find out how they work and what you can do to protect yourself.

windows-10-ransomware-protection-not-enough-feature
Security Knowledge [Nov, 8, 2017]

Is the new Windows 10 ransomware protection enough to keep you safe?

Windows 10’s Fall Update includes a new ransomware protection tool called Controlled Folder Access, but is it enough to keep your computer safe from cybercrime?

ridiculous-ransomware-feature
Security Knowledge [Oct, 18, 2017]

The 10 most ridiculous ransomware we’ve ever seen

Every now and then we come across a piece of ransomware that is so bizarre we can’t help but smile. Check out the 10 weirdest ransomware we’ve ever seen.

cryptomining-malware-feature
Security Knowledge [Oct, 11, 2017]

Is cryptocurrency mining malware the new adware?

Is your CPU power being used to mine for cryptocurrency without your consent? In this article, we explore the legal grey areas of in-browser cryptomining.

trojan-horse-virus-removal-preview
Security Knowledge [Sep, 29, 2017]

Trojan horse removal: Protecting Troy

Trojan horse malware are the masters of disguise, but with a bit of preparation it’s possible to see through their camouflage and prevent them infecting your computer.

rdp-attacks-feature
Enterprise, Security Knowledge [Sep, 22, 2017]

RDP brute force attacks: 5 tips to keep your business safe

RDP brute force attacks are becoming commonplace. Is your company at risk? Find out what SMEs can do to stop this destructive form of cyberattack.

malware-worms-preview
Security Knowledge [Jul, 21, 2017]

What is a computer worm and how does it spread?

Find out what computer worms are, how computer worms spread and what you can do to prevent this malware from infecting your system.

petya_ransomware_analysis-preview
Security Knowledge [Jul, 11, 2017]

Petya ransomware analysis: How the attack unfolded

As the dust settles, we revisit Petya ransomware to assess the impact it has had, what the motivation was behind it, and why so many high profile companies were still caught by surprise.