Petya ransomware eats your hard drives
[Updated on June 28, 2017] It looks like 2016 should be declared…
Mobile ransomware: major threats and best means of protection
Last week, we talked about desktop ransomware, which is certainly nasty stuff.…
Kaspersky Lab offers to decrypt files encrypted by CryptXXX v.3
In April 2016 a young and ambitious trojan cryptor known by the…
IT Digest: Windows 10 launch, app Store, new Lumia phones, Windows RT 8.1 Update 3
This week on tech, Microsoft says that Windows 10 won’t have a…
Steam on the firing line: how cybercriminals steal gamers’ Steam accounts
Hackers are attracted by any web-resource where large amounts of money changes…
Locky ransomware: one email can take all data away
Doctors and patients across the world, beware: cyberciminals have a new member…
Don’t trust the reviews and ratings on Google Play
Sometimes Android users have to download murky apps from Google Play. By…
A Pokémon Go Trojan in Google Play
Less than three months after Pokémon Go launched, criminals sneaked malware into…
Phone scams and cutting-edge technology for speech synthesis
Readers of this blog will already be familiar with phone scams —…
Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…