Category Archives: Security Knowledge

ridiculous-ransomware-feature
Security Knowledge [Oct, 18, 2017]

The 10 most ridiculous ransomware we’ve ever seen

Every now and then we come across a piece of ransomware that is so bizarre we can’t help but smile. Check out the 10 weirdest ransomware we’ve ever seen.

cryptomining-malware-feature
Security Knowledge [Oct, 11, 2017]

Is cryptocurrency mining malware the new adware?

Is your CPU power being used to mine for cryptocurrency without your consent? In this article, we explore the legal grey areas of in-browser cryptomining.

10-internet-safety-facts-feature
Security Knowledge [Oct, 4, 2017]

Stay safe online: Top 10 internet safety tips

Four malware programs are created per second. Don’t become a victim. Learn how to stay safe online with our top 10 internet safety facts.

trojan-horse-virus-removal-preview
Security Knowledge [Sep, 29, 2017]

Trojan horse removal: Protecting Troy

Trojan horse malware are the masters of disguise, but with a bit of preparation it’s possible to see through their camouflage and prevent them infecting your computer.

rdp-attacks-feature
Enterprise, Security Knowledge [Sep, 22, 2017]

RDP brute force attacks: 5 tips to keep your business safe

RDP brute force attacks are becoming commonplace. Is your company at risk? Find out what SMEs can do to stop this destructive form of cyberattack.

antimalware-service-executable-preview
Security Knowledge [Sep, 14, 2017]

How to fix ‘Antimalware Service Executable’ high CPU usage

Is your Antimalware Service Executable causing unnecessarily high CPU usage? Fix the issue and get your PC running smoothly again with four simple steps.

ddos-attacks-preview
Security Knowledge [Aug, 29, 2017]

How to survive a DDoS attack on your website

Distributed Denial of Service attack can have devastating effects on unsuspecting companies. Find out what a DDoS attack is and how you can combat this potent cyberattack.

ransomware-payment-methods-preview
Emsisoft Lab, Security Knowledge [Aug, 15, 2017]

Spotlight on ransomware: Ransomware payment methods

Are bitcoin and the blockchain to blame for the recent explosion in ransomware? Explore the payment methods that are supporting the new wave of cybercrime.

malware-worms-preview
Security Knowledge [Jul, 21, 2017]

What is a computer worm and how does it spread?

Find out what computer worms are, how computer worms spread and what you can do to prevent this malware from infecting your system.

petya_ransomware_analysis-preview
Security Knowledge [Jul, 11, 2017]

Petya ransomware analysis: How the attack unfolded

As the dust settles, we revisit Petya ransomware to assess the impact it has had, what the motivation was behind it, and why so many high profile companies were still caught by surprise.

feature_ransomware_encryption_methods
Security Knowledge [Jun, 21, 2017]

Spotlight on ransomware: Ransomware encryption methods

Crypto-ransomware locks your files to demand money. What makes this malware threat credible? Modern encryption methods. Find out how it works.

feature_how_to_setup_vpn
Security Knowledge [Jun, 15, 2017]

VPNs: Your personal tunnel to privacy

New FCC changes along with the Vault 7 revelations mean online privacy is under threat. but thanks to VPNs, privacy is easier than you think.

feature_blog_doxware_de
Security Knowledge [Jun, 5, 2017]

Doxware: Ransomware evolution or merely media hype?

Meet doxware: exploitationware that comes with the added threat of sharing your personal information online.

botnet main
Security Knowledge [May, 23, 2017]

Botnets: Dawn of the connected dead

Botnets control PCs and IoT devices to take down major websites and wreak havoc online. Are you among them?

top-windows-defender-alternatives-preview
Security Knowledge [May, 20, 2017]

Top 10 best Windows Defender alternatives

Windows Defender has gotten better, but is it enough to protect your computer from the latest ransomware and malware attacks? Check out our Top 10 antivirus alternatives to Windows Defender.

Jaff_ransomware_preview_image
Security Knowledge [May, 11, 2017]

Jaff ransomware: The new Locky?

The Emsisoft Lab analyses the latest ransomware threat: What is Jaff ransomware, and how to prevent becoming a victim?

how-ransomware-works-preview-image
Security Knowledge [May, 1, 2017]

Spotlight on Ransomware: How ransomware works

Part two of our ‘Spotlight in Ransomware’ series covers the changes ransomware makes to your system once it made its way in. How does ransomware work? Learn more here.

Security Knowledge [Apr, 22, 2017]

Women in science: cyber security and the gender gap

For this Earth Day in support of March for Science, we sit down with Elise and Sarah – two women making their mark in the Emsisoft Malware Lab