Don’t use USB sticks you find
Here is a scenario for you: You are walking around, catching Pokémon,…
How not to become a part of botnet
You’ve probably heard the word botnet more than once recently, and that’s…
Hot CES Tech Needing Security
So the whirlwind that is CES is in full swing. Companies of…
How to unlock a .crypt file
The common user experience when it comes to ransomware looks like this:…
Mischa: a friend for Petya and yet more ransomware for the rest of the world
[Updated on June 28, 2017] Petya and Mischa are friends. They usually…
Ask the expert: Jornt van der Wiel talks ransomware
Jornt van der Wiel is a member of our GReAT — Global…
A patent to catch exploits
Tell me what you think of Adobe Flash and I’ll tell you…
IoT role in Dyn cyberattack
Perhaps the most striking point about last week’s huge DDoS attack, which…
Invisible Skimmers at the ATMs
If you are aware of what ATM skimmers are — and in…
What is sextortion, and how can we protect ourselves and our children?
Blackmail is a crime as old as time, and modern technology has…