The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?
Ghosts, monsters and the living dead can all send a chill down one’s spine. Ransomware, for some people, is just as spooky. This Halloween, we look at why.
The Internet of Things (IoT) is the latest buzzword taking hold of the technology industry, but what does it mean exactly and how does it impact citizens and businesses? We take a closer look.
Avira has filed a lawsuit against the German Freemium.com download site for unfair business practices and misleading consumers into installing unwanted programs (PUA). We’re the first security vendor to stick up for customer rights and go directly after a software publisher.
Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to help answer this question.
Since Android already became the most used operating system among devices worldwide, it indirectly caught the attention of malware creators as well – around 97% of malicious mobile software is now targeting Android.
There are as many hackers as there is sand on a beach – so to get noticed you need to do something a bit out of the ordinary. If you’re not into hacking a big name like … say Sony, that probably means doing what a hacker called “Amped Attacks” has been up to lately: Taking down racist and homophobic sites (for a short time). One by one.
Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.
There’s a big difference between “mostly dead” and “all dead” with film characters … and with malware distributing botnets. The Dridex/Bugat botnet is still slightly alive …