Blog

Home/Blog
18 05, 2017

WannaCry Ransomware: Interview with Emsisoft’s ransomware experts

By |May 18th, 2017|Blog|Comments Off on WannaCry Ransomware: Interview with Emsisoft’s ransomware experts

There is so much news surrounding the WannaCry Ransomware outbreak that it is impossible to know where to start reading. As mainstream media outlets are jumping on any new information that may or may not be connected, some articles even raise more questions than they answer. The fact is: WannaCry ransomware has hit hundreds of [...]

12 05, 2017

Global WannaCry ransomware outbreak uses known NSA exploits

By |May 12th, 2017|Blog|Comments Off on Global WannaCry ransomware outbreak uses known NSA exploits

Following the emergence of the Jaff ransomware attack campaign earlier this week, another, even bigger outbreak is making headlines. The culprit? A new ransomware family called WannaCry or WCry. Spotted earlier today, WCry caught the attention of the team due to it being spread via the recently exposed NSA shadow broker exploits. WCry took many [...]

11 05, 2017

Jaff ransomware: The new Locky?

By |May 11th, 2017|Blog|Comments Off on Jaff ransomware: The new Locky?

Ransomware continues to be a growing security threat, with new families cropping up every week. Emsisoft researchers are often involved in the discovery and analysis of new threats, and this ransomware is no different. Originally spotted earlier today, Jaff ransomware caught our attention due to it being spread via the Necurs botnet, which before spread ransomware [...]

1 05, 2017

Spotlight on Ransomware: How ransomware works

By |May 1st, 2017|Blog|Comments Off on Spotlight on Ransomware: How ransomware works

Understanding how ransomware works is no easy task. Outside of cyber security circles, grasping the complexities required to protect and prevent ransomware from harming its victims can seem almost impossible. This only makes the threat all the scarier and effective for the criminals that stand to profit. In Emsisoft’s ‘Spotlight on Ransomware’ series, we aim [...]

21 04, 2017

Women in science: cyber security and the gender gap

By |April 21st, 2017|Blog|Comments Off on Women in science: cyber security and the gender gap

Like many writers, my passion for words built up slowly and then all at once. Science also appealed to me but not in such a way that I ever considered it as a career option. My desire to study writing drove every thought I’d ever had about my future, but much like science, I was [...]

18 04, 2017

Common phishing scams and how to prevent them

By |April 18th, 2017|Blog|Comments Off on Common phishing scams and how to prevent them

I think by now we’ve all been contacted by a Nigerian prince looking for someone to help him move his wealth out of the country in return for a share of his fortune. We all know it’s a scam, but did you know a whopping 30% of you still click on phishing scam links? Phishing [...]

13 04, 2017

AhelioTech is at The Lima Regional Information Technology Alliance Conference

By |April 13th, 2017|Blog|0 Comments

11 04, 2017

Mobile malware targets Android users

By |April 11th, 2017|Blog|Comments Off on Mobile malware targets Android users

Your mobile phone is a journal containing the deepest secrets of your digital life. Who is reading yours? Your mobile device follows you everywhere. It can tell you where you need to go, when and how. It knows who you contact frequently, maybe even who you love the most. Your personal photos are always at [...]

4 04, 2017

Remove Cry9 ransomware with Emsisoft’s free decrypter

By |April 4th, 2017|Blog|Comments Off on Remove Cry9 ransomware with Emsisoft’s free decrypter

Today, Emsisoft CTO and Malware researcher Fabian Wosar released a free decrypter for the most recent strain from CryptON ransomware family, ‘Cry9.’ Victims can now decrypt files.. for free! Variants of the Russian-originated CryptON ransomware, such as X3M and Nemesis, started to appear on the Bleeping Computer forums from December 2016. All of them seem to [...]

4 04, 2017

How-to: Administrator’s guide to remote management of Emsisoft Anti-Malware

By |April 4th, 2017|Blog|Comments Off on How-to: Administrator’s guide to remote management of Emsisoft Anti-Malware

Whether you are an administrator for your organization’s IT infrastructure, a value-added reseller (VAR) or simply an enthusiast who is forced to maintain your parents’ computer, you will enjoy the new convenience features that our development team implemented during the past year. Efficiency is key, and so we aim to optimize your malware protection workflows to [...]