Archive for KnowledgeBase
Posted by admin on December 6, 2018 Popular social networks are an extremely lucrative environment for scams and malware distribution. The reason is prosaic – these services are used by millions, which automatically increases the odds of cybercriminals achieving their nasty goals even if the infection success rate is generally low. The OMG Facebook virus, for example, attempts to retrieve confidential information […]
Read more → Posted by admin on November 23, 2018 The present-day cybercriminals might mix up the malicious with the legitimate to achieve their goals. Browser hijacking, for instance, often involves unauthorized activity that makes victims recurrently visit one of the major search engines. This is the case with the Bing redirect virus, a strain that drives traffic to bing.com. Read this tutorial to learn […]
Read more → Posted by admin on November 9, 2018 The darkest side of the cryptographic science is all about ransomware. This is a category of aggressive computer code that makes users’ data inaccessible by encrypting it, and then demands money for recovery. By the way, these ransoms are typically payable in cryptocurrencies only, which is another abuse case somewhat related to cryptography. GandCrab 5.0.4, […]
Read more → Posted by admin on November 7, 2018 The ransomware phenomenon still instills fear like it used to. Falling victim to one of these nasty programs is the worst-case scenario imaginable for the average computer user, because they run the risk of losing the critical attributes of their digital life, that is, personal data. The lineage of blackmail viruses called Rapid ransomware is […]
Read more → Posted by admin on October 22, 2018 Treating ransomware as an obsolete phenomenon is clearly a misconception, although there has actually been some lengthy steep plummeting in this segment of cybercrime. Yet, there are several species that keep thriving, GandCrab being one of them. Although it emerged less than a year ago, its adverse potential is huge due to competently created code […]
Read more → Posted by admin on October 17, 2018 There are computer infections like fake system utilities or ransomware that manifest themselves in an outright way. The users hit by the above baddies are shelled by deceptive problem detection reports or simply end up being unable to open their files. The Cryptonight malware is different. It surreptitiously siphons off the host computer’s processing power […]
Read more → Posted by admin on October 11, 2018 The present-day flourishing of crypto ransomware isn’t necessarily a security software problem. It’s also a human problem, because most of these attacks get through after the user opens a toxic spam attachment or as a result of poor authentication practices. This holds true for the .combo files version of the Dharma ransomware, which spreads via […]
Read more → Posted by admin on October 3, 2018 The ruse of social engineering is one of the oldest, most common and most effective techniques cybercriminals leverage to deceive people online. Sometimes the felons’ goal is to wheedle sensitive information out of victims, but in some scenarios the black hats seek to rip people off. The recent wave of the porn blackmail email scam […]
Read more → Posted by admin on September 20, 2018 Some of you may find the information below obvious and prosaic, but while talking to colleagues in the smoking room one day I realized that many people, including those who are proficient in IT, never took it seriously, not to mention the ones who aren’t tech-savvy. When the question comes up about the downsides of […]
Read more → Posted by admin on September 14, 2018 Search engines really revolutionize the way the Internet works. The authors of pseudo search providers, on the other hand, try to ride the wave of these services’ popularity in order to make money while delivering no genuine value to users. One of these imitators is the www-mysearch.com resource, which looks authentic but pursues the web […]
Read more → Page 5 of 35 «...34567...»