Earlier this week, a Petya-based ransomware virus targeted the Ukraine in the largest cyberattack the nation has ever experienced, taking down the central bank, postal services, and commercial enterprises such as the Antonov aircraft manufacturer. Whil…
A little less than a year ago, we started providing free decryption tools for victims of ransomware attacks. Today we’re pleased to announce that we’ve just released our 20th free ransomware decryption tool: a free decryption tool for the En…
I rediscovered gaming a few years ago and am now totally immersed in the worlds of Witcher 3, GTA V, and, among the latest PC games, Resident Evil 7. These games are gripping, but they also have a few things in common:
XData ransomware was discovered mid-May and now, two weeks later, we have released a free decryption tool for victims hit by XData ransomware that they can use to decrypt their data.
Special thanks to Ladislav Zezula for working on this blog post and the decryptor tool!
Everyone loves a new computer. Why? Because when you turn it on and launch apps and programs, it responds quickly. However, as you start to download more apps and install games and create documents, you’ll probably find it taking longer and longer to start Windows.
We’ve been talking for a few weeks now – ever since the FCC’s internet privacy protections were overturned – about what a VPN is and how you can be sure you’re picking a reputable VPN connection. But what might not be as clear is the methods hackers use and how they’re evolving.
With the FCC chair’s recent push to dismantle net neutrality, on top of last month’s rollback of FCC regulations that would have protected online privacy, interest in virtual private networks (VPNs) is probably at an all-time high. Targeted marketing, based on your online searching, viewing, shopping – everything – habits, is already prevalent. These new changes will most certainly result in companies’ scrutinizing and selling your data even more aggressively. And the death of net neutrality means these same companies can use that data to determine which streaming services you use, for instance, then charge you a premium to access them.
I confess, I am drawn to any device that promises to make my life easier. My first experience with what we now call the Internet of Things (IoT) was a few years ago, when I bought a number of internet-connected lightbulbs. The feeling I had turni…
The deep web is often confused with the darknet and while the two have similarities, they are not synonymous. There is a very fine line between the deep and dark web.