Kaspersky Lab offers to decrypt files encrypted by CryptXXX v.3
In April 2016 a young and ambitious trojan cryptor known by the…
Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…
Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains.…
Cerber ransomware delivers a secondary payload
As if ransomware weren’t bad enough, now it’s metastasizing: not just spreading…
Hospital learns the hard way why you don’t pay ransomware crooks
When you are sick, you head to the doctor. However, when your…
Satana: Ransomware from hell
This year, news of ransomware attacks have been coming in like dispatches…
Naked online: cyberthreats facing users of adult websites and applications
Pornography has always been part of human culture, and this continues in…
How educated are we on ransomware?
Unlike previous malware trends that have varying purposes, ransomware’s is quite simple:…
Catching the cybercriminals who created Lurk
Perhaps the biggest problem with cybercriminals is that they are extremely difficult…
Cryakl/Fantomas victims rescued by new decryptor
The No More Ransom project for assisting victims of ransomware has good…