Emsisoft News [Jan, 16, 2018]

Emsisoft awarded VB100 certification in latest Virus Bulletin test

Emsisoft Anti-Malware achieved yet another VB100 certification in the latest test from Virus Bulletin. Find out what it’s all about in our latest blog post.

Security Knowledge [Jan, 10, 2018]

What is a rootkit?

Rootkits enable criminals to manipulate your computer and access your system’s resources without your knowledge. Find out what makes rootkits a dangerous threat.

Security Knowledge [Dec, 28, 2017]

Top 10 New Year’s tech security resolutions

Looking for ways to improve your IT security in 2018? Here are 10 of the best New Year’s security resolutions and what you can do to keep them.

Security Knowledge [Dec, 14, 2017]

Top 10 tech gift ideas for the holidays

Not sure what gift to get for the security tech geek in your life? We’ve got you covered with our Top 10 tech gift ideas for the holidays.

Security Knowledge [Dec, 7, 2017]

Ransomware-as-a-Service: Commoditizing ransomware

The subscription economy ushered in a new era of convenience, flexibility – and ransomware. Find out how Ransomware as a Service works and what’s driving its popularity.

Security Knowledge [Nov, 17, 2017]

Fileless malware: Invisible threat or scaremongering hype?

Sneaky fileless malware attacks are growing in popularity. Find out how they work and what you can do to protect yourself.

Security Knowledge [Nov, 8, 2017]

Is the new Windows 10 ransomware protection enough to keep you safe?

Windows 10’s Fall Update includes a new ransomware protection tool called Controlled Folder Access, but is it enough to keep your computer safe from cybercrime?

Security Knowledge [Oct, 18, 2017]

The 10 most ridiculous ransomware we’ve ever seen

Every now and then we come across a piece of ransomware that is so bizarre we can’t help but smile. Check out the 10 weirdest ransomware we’ve ever seen.

Security Knowledge [Oct, 11, 2017]

Is cryptocurrency mining malware the new adware?

Is your CPU power being used to mine for cryptocurrency without your consent? In this article, we explore the legal grey areas of in-browser cryptomining.

Security Knowledge [Sep, 29, 2017]

Trojan horse removal: Protecting Troy

Trojan horse malware are the masters of disguise, but with a bit of preparation it’s possible to see through their camouflage and prevent them infecting your computer.

Enterprise, Security Knowledge [Sep, 22, 2017]

RDP brute force attacks: 5 tips to keep your business safe

RDP brute force attacks are becoming commonplace. Is your company at risk? Find out what SMEs can do to stop this destructive form of cyberattack.

Security Knowledge [Sep, 5, 2017]

Top 10 anti-ransomware tools

Looking for the best ransomware protection? We’ve rounded up 10 of the best anti-ransomware tools available on the market today to prevent an encryption attack.

Security Knowledge [Jul, 21, 2017]

What is a computer worm and how does it spread?

Find out what computer worms are, how computer worms spread and what you can do to prevent this malware from infecting your system.

Security Knowledge [Jul, 11, 2017]

Petya ransomware analysis: How the attack unfolded

As the dust settles, we revisit Petya ransomware to assess the impact it has had, what the motivation was behind it, and why so many high profile companies were still caught by surprise.