As the dust settles, we revisit Petya ransomware to assess the impact it has had, what the motivation was behind it, and why so many high profile companies were still caught by surprise.
Category Archives: Security Knowledge
Crypto-ransomware locks your files to demand money. What makes this malware threat credible? Modern encryption methods. Find out how it works.
Meet doxware: exploitationware that comes with the added threat of sharing your personal information online.
For this Earth Day in support of March for Science, we sit down with Elise and Sarah – two women making their mark in the Emsisoft Malware Lab
Whether you are an administrator for your organization’s IT infrastructure, a value-added reseller (VAR) or an antivirus enthusiast, you will enjoy the new convenience features of Emsisoft Enterprise Console.
Emsisoft’s sophisticated Exclusions feature helps power users and admins to customize monitoring and scanning requirements using wildcards and environmental variables.
Emsisoft CTO and Head of our Malware Research Lab, Fabian Wosar, cracks Hermes Ransomware by attacking the encryption generator.
Been infected with ransomware? Don’t panic! Follow our step-by-step guide to identify and remove ransomware.