Blog

Home/Blog
30 03, 2017

Spotlight on Ransomware: Common infection methods

By |March 30th, 2017|Blog|Comments Off on Spotlight on Ransomware: Common infection methods

Ransomware remains a growing threat with new families cropping up every week. For this reason, we have put together a dedicated series that will focus on the stages of a ransomware attack to offer you protection at every possible level. Being the first post in the series, this post will tackle the first point of contact your [...]

28 03, 2017

Emsisoft explores the worst passwords of 2016

By |March 28th, 2017|Blog|Comments Off on Emsisoft explores the worst passwords of 2016

Trying to remember any one of the 500 passwords you need to function in today’s digital society is one of life’s many frustrations. But, opting for convenience over security is basically a written invitation to hackers. Cyber security experts continue to urge users to become better informed about online threats and the importance of using [...]

9 03, 2017

Concerned about the Wikileaks Vault 7 revelations? Here is everything we know.

By |March 9th, 2017|Blog|Comments Off on Concerned about the Wikileaks Vault 7 revelations? Here is everything we know.

By now you may have read that whistleblowers WikiLeaks have released a cache of documents code-named ‘Vault 7’, which contain details of hacking tools claimed to be used by the CIA. One of the highlighted documents details bypass techniques for 21 security software products and ways in which they could be exploited to invade the privacy of their [...]

28 02, 2017

New in 2017.2: Faster software startup and more

By |February 28th, 2017|Blog|Comments Off on New in 2017.2: Faster software startup and more

Providing you with first class anti-malware without slowing down your system is a key promise for us at Emsisoft. So for our February product update (2017.2), our developers have been busy to further optimize several areas of our anti-malware software solutions to get you an even smoother experience. Below are the key highlights: Emsisoft Anti-Malware & Emsisoft Internet [...]

10 01, 2017

From Darknet with Love: Meet Spora Ransomware

By |January 10th, 2017|Blog|Comments Off on From Darknet with Love: Meet Spora Ransomware

Ransomware has been a growing threat, with new families cropping up every week. Emsisoft researchers are often involved in the discovery and analysis of new threats, and this ransomware is no different. Originally spotted on ID-Ransomware earlier today, it caught our attention due to a few unique features and the high level of professionalism in both implementation [...]

2 12, 2016

Gooligan Android malware breaches 1 million Google Play accounts

By |December 2nd, 2016|Blog|Comments Off on Gooligan Android malware breaches 1 million Google Play accounts

13,000 devices are infected with Gooligan every day A new malware attack is hitting Android devices at an alarming rate. This attack is the largest ever breach of Google accounts, according to Check Point, a security research firm that is working with Google to monitor and document the outbreak. The malware attack hijacks phones using [...]

17 11, 2016

Microsoft calling? Mind the tech support scammer!

By |November 17th, 2016|Blog|Comments Off on Microsoft calling? Mind the tech support scammer!

After a long day, there is nothing like sitting down at your computer with a cup of tea to catch up on the news online. But what would you do if you were faced with a pop-up telling you that your computer has a virus and that ‘tech support’ is conveniently letting you know? The [...]

16 10, 2016

30 seconds and 50 dollars is all it takes to steal your PC login

By |October 16th, 2016|Blog|Comments Off on 30 seconds and 50 dollars is all it takes to steal your PC login

Imagine you’ve been at work for a few hours. It’s time to get up, grab a coffee and some morning tea. You’ll only be away from your desk for ten minutes so you know it will be easier to just hit the lock screen on your workstation than to completely log out and then log [...]

12 10, 2016

Malware in sex toys: How private is your playtime?

By |October 12th, 2016|Blog|Comments Off on Malware in sex toys: How private is your playtime?

In a time where fridges self-monitor their own food levels and cars can drive themselves, it was inevitable that the Internet of Things would catch up with the sex toy industry. Our playthings can now be controlled by an app and that can be paired to another person’s phone from wherever in the world they happen [...]

2 10, 2016

No honour among thieves: hackers who hack each other

By |October 2nd, 2016|Blog|Comments Off on No honour among thieves: hackers who hack each other

In ransomware, as in any profitable business, there is a constant struggle to compete in the marketplace. Ransomware, the strain of malware which crypto locks a victim’s hard drive until the developer of the malware is paid, is a highly lucrative – and illegal- income earner for its authors. The strategy is so successful that [...]