Category Archives: Security Knowledge

fileless-malware-feature
Security Knowledge [Nov, 17, 2017]

Fileless malware: Invisible threat or scaremongering hype?

Sneaky fileless malware attacks are growing in popularity. Find out how they work and what you can do to protect yourself.

windows-10-ransomware-protection-not-enough-feature
Security Knowledge [Nov, 8, 2017]

Is the new Windows 10 ransomware protection enough to keep you safe?

Windows 10’s Fall Update includes a new ransomware protection tool called Controlled Folder Access, but is it enough to keep your computer safe from cybercrime?

job-in-cyber-security-feature
Security Knowledge [Oct, 25, 2017]

How to get a job in cybersecurity

Thinking about starting a career in cybersecurity? Get insider knowledge on how to get started in this exciting and rapidly growing industry.

ridiculous-ransomware-feature
Security Knowledge [Oct, 18, 2017]

The 10 most ridiculous ransomware we’ve ever seen

Every now and then we come across a piece of ransomware that is so bizarre we can’t help but smile. Check out the 10 weirdest ransomware we’ve ever seen.

cryptomining-malware-feature
Security Knowledge [Oct, 11, 2017]

Is cryptocurrency mining malware the new adware?

Is your CPU power being used to mine for cryptocurrency without your consent? In this article, we explore the legal grey areas of in-browser cryptomining.

10-internet-safety-facts-feature
Security Knowledge [Oct, 4, 2017]

Stay safe online: Top 10 internet safety tips

Four malware programs are created per second. Don’t become a victim. Learn how to stay safe online with our top 10 internet safety facts.

trojan-horse-virus-removal-preview
Security Knowledge [Sep, 29, 2017]

Trojan horse removal: Protecting Troy

Trojan horse malware are the masters of disguise, but with a bit of preparation it’s possible to see through their camouflage and prevent them infecting your computer.

rdp-attacks-feature
Enterprise, Security Knowledge [Sep, 22, 2017]

RDP brute force attacks: 5 tips to keep your business safe

RDP brute force attacks are becoming commonplace. Is your company at risk? Find out what SMEs can do to stop this destructive form of cyberattack.

antimalware-service-executable-preview
Security Knowledge [Sep, 14, 2017]

How to fix ‘Antimalware Service Executable’ high CPU usage

Is your Antimalware Service Executable causing unnecessarily high CPU usage? Fix the issue and get your PC running smoothly again with four simple steps.

ddos-attacks-preview
Security Knowledge [Aug, 29, 2017]

How to survive a DDoS attack on your website

Distributed Denial of Service attack can have devastating effects on unsuspecting companies. Find out what a DDoS attack is and how you can combat this potent cyberattack.

ransomware-payment-methods-preview
Emsisoft Lab, Security Knowledge [Aug, 15, 2017]

Spotlight on ransomware: Ransomware payment methods

Are bitcoin and the blockchain to blame for the recent explosion in ransomware? Explore the payment methods that are supporting the new wave of cybercrime.

malware-worms-preview
Security Knowledge [Jul, 21, 2017]

What is a computer worm and how does it spread?

Find out what computer worms are, how computer worms spread and what you can do to prevent this malware from infecting your system.

petya_ransomware_analysis-preview
Security Knowledge [Jul, 11, 2017]

Petya ransomware analysis: How the attack unfolded

As the dust settles, we revisit Petya ransomware to assess the impact it has had, what the motivation was behind it, and why so many high profile companies were still caught by surprise.

feature_ransomware_encryption_methods
Security Knowledge [Jun, 21, 2017]

Spotlight on ransomware: Ransomware encryption methods

Crypto-ransomware locks your files to demand money. What makes this malware threat credible? Modern encryption methods. Find out how it works.

feature_how_to_setup_vpn
Security Knowledge [Jun, 15, 2017]

VPNs: Your personal tunnel to privacy

New FCC changes along with the Vault 7 revelations mean online privacy is under threat. but thanks to VPNs, privacy is easier than you think.

feature_blog_doxware_de
Security Knowledge [Jun, 5, 2017]

Doxware: Ransomware evolution or merely media hype?

Meet doxware: exploitationware that comes with the added threat of sharing your personal information online.

botnet main
Security Knowledge [May, 23, 2017]

Botnets: Dawn of the connected dead

Botnets control PCs and IoT devices to take down major websites and wreak havoc online. Are you among them?

top-windows-defender-alternatives-preview
Security Knowledge [May, 20, 2017]

Top 10 best Windows Defender alternatives

Windows Defender has gotten better, but is it enough to protect your computer from the latest ransomware and malware attacks? Check out our Top 10 antivirus alternatives to Windows Defender.