It’s time once again for backpacks, busses, and school bells. Here are a few good lessons to share with your kids so they can get through the school year with an A+ in online safety.
These days, keeping your devices secure, data private, and online world safe from harm seems like a daunting task. While plenty of reliable solutions exist for desktop and mobile, knowing where you’re vulnerable can be difficult … especially if you’re not familiar with the jargon thrown around regarding the latest data breach.
Our Q1 2017 report looks at the top performance-draining apps and the latest app and smartphone trends.
Gentlemen and Gentlewomen, start your search engines.
“Dear user, firstname.lastname@example.org just sent you an email inviting you to edit the following document that she shared with you.”
It’s a nightmare situation, no doubt about it: a virus has taken over your computer and locked up your most valuable files. A ransom note filling your screen says you have a certain amount of time to pay the hacker, or the amount doubles. After it doubles, you again have a certain amount of time to pay before the criminal behind the ransomware attack destroys your files forever.
Earlier this week, a Petya-based ransomware virus targeted the Ukraine in the largest cyberattack the nation has ever experienced, taking down the central bank, postal services, and commercial enterprises such as the Antonov aircraft manufacturer. Whil…
A little less than a year ago, we started providing free decryption tools for victims of ransomware attacks. Today we’re pleased to announce that we’ve just released our 20th free ransomware decryption tool: a free decryption tool for the En…
I rediscovered gaming a few years ago and am now totally immersed in the worlds of Witcher 3, GTA V, and, among the latest PC games, Resident Evil 7. These games are gripping, but they also have a few things in common:
XData ransomware was discovered mid-May and now, two weeks later, we have released a free decryption tool for victims hit by XData ransomware that they can use to decrypt their data.