Menu

Blog

Home/Blog
9 03, 2017

Concerned about the Wikileaks Vault 7 revelations? Here is everything we know.

By |March 9th, 2017|Blog|Comments Off on Concerned about the Wikileaks Vault 7 revelations? Here is everything we know.

By now you may have read that whistleblowers WikiLeaks have released a cache of documents code-named ‘Vault 7’, which contain details of hacking tools claimed to be used by the CIA. One of the highlighted documents details bypass techniques for 21 security software products and ways in which they could be exploited to invade the privacy of their [...]

28 02, 2017

New in 2017.2: Faster software startup and more

By |February 28th, 2017|Blog|Comments Off on New in 2017.2: Faster software startup and more

Providing you with first class anti-malware without slowing down your system is a key promise for us at Emsisoft. So for our February product update (2017.2), our developers have been busy to further optimize several areas of our anti-malware software solutions to get you an even smoother experience. Below are the key highlights: Emsisoft Anti-Malware & Emsisoft Internet [...]

10 01, 2017

From Darknet with Love: Meet Spora Ransomware

By |January 10th, 2017|Blog|Comments Off on From Darknet with Love: Meet Spora Ransomware

Ransomware has been a growing threat, with new families cropping up every week. Emsisoft researchers are often involved in the discovery and analysis of new threats, and this ransomware is no different. Originally spotted on ID-Ransomware earlier today, it caught our attention due to a few unique features and the high level of professionalism in both implementation [...]

2 12, 2016

Gooligan Android malware breaches 1 million Google Play accounts

By |December 2nd, 2016|Blog|Comments Off on Gooligan Android malware breaches 1 million Google Play accounts

13,000 devices are infected with Gooligan every day A new malware attack is hitting Android devices at an alarming rate. This attack is the largest ever breach of Google accounts, according to Check Point, a security research firm that is working with Google to monitor and document the outbreak. The malware attack hijacks phones using [...]

17 11, 2016

Microsoft calling? Mind the tech support scammer!

By |November 17th, 2016|Blog|Comments Off on Microsoft calling? Mind the tech support scammer!

After a long day, there is nothing like sitting down at your computer with a cup of tea to catch up on the news online. But what would you do if you were faced with a pop-up telling you that your computer has a virus and that ‘tech support’ is conveniently letting you know? The [...]

16 10, 2016

30 seconds and 50 dollars is all it takes to steal your PC login

By |October 16th, 2016|Blog|Comments Off on 30 seconds and 50 dollars is all it takes to steal your PC login

Imagine you’ve been at work for a few hours. It’s time to get up, grab a coffee and some morning tea. You’ll only be away from your desk for ten minutes so you know it will be easier to just hit the lock screen on your workstation than to completely log out and then log [...]

12 10, 2016

Malware in sex toys: How private is your playtime?

By |October 12th, 2016|Blog|Comments Off on Malware in sex toys: How private is your playtime?

In a time where fridges self-monitor their own food levels and cars can drive themselves, it was inevitable that the Internet of Things would catch up with the sex toy industry. Our playthings can now be controlled by an app and that can be paired to another person’s phone from wherever in the world they happen [...]

2 10, 2016

No honour among thieves: hackers who hack each other

By |October 2nd, 2016|Blog|Comments Off on No honour among thieves: hackers who hack each other

In ransomware, as in any profitable business, there is a constant struggle to compete in the marketplace. Ransomware, the strain of malware which crypto locks a victim’s hard drive until the developer of the malware is paid, is a highly lucrative – and illegal- income earner for its authors. The strategy is so successful that [...]

23 09, 2016

Yahoo hack hits half a billion users

By |September 23rd, 2016|Blog|Comments Off on Yahoo hack hits half a billion users

Yahoo announces that data from as many as 500 million user accounts were stolen in a breach during 2014. The data breach poses many problems for Yahoo CEO Marissa Mayer as she tries to close a $4.8bn sale to Verizon Communication who were only made aware of the leak two days ago. With the deal not set to close [...]

22 09, 2016

Are all hackers criminals?

By |September 22nd, 2016|Blog|Comments Off on Are all hackers criminals?

Not all hackers are created equal. The terms ‘hacker’ and ‘cyber criminal’ seem to be used interchangeably in online media which is both misleading and reductive. A cybercriminal uses online means to profit from illegal activity regardless of the cost to its many victims. Hacker is a blanket term that doesn’t allow for much differentiation [...]