Are you waiting for your Windows 10 update? If so, you’re a target for ransomware!
Microsoft releases a major security update fixing multiple critical vulnerabilities. This includes the remote code execution vulnerabilities in Office and IE, the elevation of privilege bug and more.
The spam emails try to lure users with misleading, fake invoices from banks, telephone companies and even PayPal in order to steal bank account credentials.
Ransomware ‘Cryptowall 2.0’ is using the TOR network to mask its tracks. It encrypts users data and asks for ransom in return for the key to unencrypt the data.
Will Microsoft ditch IE and move to Spartan? With Windows 10 getting ready to be released, Microsoft aims to be a more diverse company.
On December 29, Google published the Microsoft Windows 8.1 vulnerability after giving the company 90 days to fix.
Microsoft warns that hackers are using email to phish for users to turn on the macro features in Microsoft Office in order to install malware.
Chthonic trojan is infecting Microsoft products by stealing online banking information using spear-phising and web injection attacks.
Microsoft, BlackBerry, Android and (jailbroken) Apple phones infected with Inception/Cloud Atlas malware that steals sensitive user information.
Linux impregnable to malware? Last week, security researchers discovered a new trojan that infected Linux operating systems around the world, targeting government and pharmaceutical companies.
There have been quite a few security incident related to usb/flash drives and autorun behaviors. Since thee usage and portability of such vectors are advantageous to users, it was just a matter of time to be exploited by malware authors. A new threat, recently discovered, is getting some attention and we at Emsisoft wanted to […]
Internet has come of age, and with it malicious software and related infections. Viruses, Trojans and advertising software and popups have been there and the numbers have increased with time. With the advent of new century, especially in last 5 years, there has been an introduction to newer types of malicious software, namely spywares and […]