Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…
Another WordPress plugin under attack, and media blame disgruntled researcher
Рекомендуем почитать: Xakep #280. Джейл-2022 Содержание выпуска Подписка на «Хакер»-60% Волна атак…
How to unlock a .crypt file
The common user experience when it comes to ransomware looks like this:…
Everything you need to know about ransomware
This article might save you some $300. That’s the average ransom extortionists…
Naked online: cyberthreats facing users of adult websites and applications
Pornography has always been part of human culture, and this continues in…
IT Digest: IE10, 9, 8 & Windows 8 support ends, Windows 10 build 11099, Microsoft changes hardware policy
This week on tech, Microsoft ends support for older versions of Internet…
Free security tools from Kaspersky Lab
If your device slows down or hangs up, you are not alone.…
Expert tips to avoid ransomware
Let’s face it, you can’t tune into the news without hearing something…
Mobile ransomware: major threats and best means of protection
Last week, we talked about desktop ransomware, which is certainly nasty stuff.…
Ransomware’s history and evolution in facts and figures
Ransomware has hit the news in a big way lately. Is this…