Thursday, June 30th, 2016
Ransomware has been infamously known to be nasty pieces of malware that takes a computer's files hostage, and then demands a ransom, which can vary in cost. Countless variants have been discovered, which differ in how they are programmed, but all demand money in the end.
However, a new variant recently ...
Posted in Internet, Privacy, Security, Windows | No Comments
Monday, June 20th, 2016
SophosLabs just alerted us to an intriguing new ransomware sample dubbed RAA.
This one is blocked by Sophos as JS/Ransom-DDL, and even though it’s not widespread, it’s an interesting development in the ransomware scene.
Here’s why.
Ransomware, like any sort of malware, can get into your organisation in many different ways: buried inside ...
Posted in Internet, Security | No Comments
Saturday, April 16th, 2016
ID Ransomware is a new online service that allows you to upload ransom notes or encrypted file samples to identify the ransomware used to attack you.
So-called ransomware is an ever growing and evolving threat that is attacking computer systems to either hold files hostage by encrypting them, or locks access ...
Posted in Internet, Security, Windows | No Comments
Monday, April 11th, 2016
A nasty piece of ransomware that took crypto-extortion to new heights contains a fatal weakness that allows victims to decrypt their data without paying the hefty ransom.
When it came to light two weeks ago, Petya was notable because it targeted a victim's entire startup drive by rendering its master boot ...
Posted in Internet, Security, Software | No Comments
Friday, March 25th, 2016
As if encrypting files and holding them hostage is not enough, cybercriminals who create and spread crypto-ransomware are now resorting to causing blue screen of death (BSoD) and putting their ransom notes at system startup—as in, even before the operating system loads. Imagine turning on your computer and instead of ...
Posted in Internet, Security, Software, Windows | No Comments
Page 3 of 10«12345...10...»Last »