Don’t get hooked by today’s phishing scams: What we can learn from the Gmail hack
“Dear user, yourfriendjanedoe@janedoe.com just sent you an email inviting you to edit the following document that she shared with you.”
“Dear user, yourfriendjanedoe@janedoe.com just sent you an email inviting you to edit the following document that she shared with you.”
It’s a nightmare situation, no doubt about it: a virus has taken over your computer and locked up your most valuable files. A ransom note filling your screen says you have a certain amount of time to pay the hacker, or the amount doubles. After it doubles, you again have a certain amount of time to pay before the criminal behind the ransomware attack destroys your files forever.
Earlier this week, a Petya-based ransomware virus targeted the Ukraine in the largest cyberattack the nation has ever experienced, taking down the central bank, postal services, and commercial enterprises such as the Antonov aircraft manufacturer. Whil…
A little less than a year ago, we started providing free decryption tools for victims of ransomware attacks. Today we’re pleased to announce that we’ve just released our 20th free ransomware decryption tool: a free decryption tool for the En…
I rediscovered gaming a few years ago and am now totally immersed in the worlds of Witcher 3, GTA V, and, among the latest PC games, Resident Evil 7. These games are gripping, but they also have a few things in common:
XData ransomware was discovered mid-May and now, two weeks later, we have released a free decryption tool for victims hit by XData ransomware that they can use to decrypt their data.
Special thanks to Ladislav Zezula for working on this blog post and the decryptor tool!
Everyone loves a new computer. Why? Because when you turn it on and launch apps and programs, it responds quickly. However, as you start to download more apps and install games and create documents, you’ll probably find it taking longer and longer to start Windows.
We’ve been talking for a few weeks now – ever since the FCC’s internet privacy protections were overturned – about what a VPN is and how you can be sure you’re picking a reputable VPN connection. But what might not be as clear is the methods hackers use and how they’re evolving.
With the FCC chair’s recent push to dismantle net neutrality, on top of last month’s rollback of FCC regulations that would have protected online privacy, interest in virtual private networks (VPNs) is probably at an all-time high. Targeted marketing, based on your online searching, viewing, shopping – everything – habits, is already prevalent. These new changes will most certainly result in companies’ scrutinizing and selling your data even more aggressively. And the death of net neutrality means these same companies can use that data to determine which streaming services you use, for instance, then charge you a premium to access them.