Gentlemen and Gentlewomen, start your search engines.
“Dear user, firstname.lastname@example.org just sent you an email inviting you to edit the following document that she shared with you.”
It’s a nightmare situation, no doubt about it: a virus has taken over your computer and locked up your most valuable files. A ransom note filling your screen says you have a certain amount of time to pay the hacker, or the amount doubles. After it doubles, you again have a certain amount of time to pay before the criminal behind the ransomware attack destroys your files forever.
Earlier this week, a Petya-based ransomware virus targeted the Ukraine in the largest cyberattack the nation has ever experienced, taking down the central bank, postal services, and commercial enterprises such as the Antonov aircraft manufacturer. Whil…
A little less than a year ago, we started providing free decryption tools for victims of ransomware attacks. Today we’re pleased to announce that we’ve just released our 20th free ransomware decryption tool: a free decryption tool for the En…
I rediscovered gaming a few years ago and am now totally immersed in the worlds of Witcher 3, GTA V, and, among the latest PC games, Resident Evil 7. These games are gripping, but they also have a few things in common:
XData ransomware was discovered mid-May and now, two weeks later, we have released a free decryption tool for victims hit by XData ransomware that they can use to decrypt their data.
Special thanks to Ladislav Zezula for working on this blog post and the decryptor tool!
Everyone loves a new computer. Why? Because when you turn it on and launch apps and programs, it responds quickly. However, as you start to download more apps and install games and create documents, you’ll probably find it taking longer and longer to start Windows.
We’ve been talking for a few weeks now – ever since the FCC’s internet privacy protections were overturned – about what a VPN is and how you can be sure you’re picking a reputable VPN connection. But what might not be as clear is the methods hackers use and how they’re evolving.