New Locky ransomware: what you need to know

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

Black and white: Not all hackers are bad

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.

How Windows 10 plans to defeat ransomware

How Windows 10 plans to defeat ransomware

The recent WannaCry and Petya ransomware attacks have caused massive disruptions for Windows users. Although ransomware infection has slowed down in the past few weeks, many experts are saying that this is only just the beginning. Soon, newer and far more dangerous strains of malware will be developed.

How thin and zero clients save money

How thin and zero clients save money

Businesses are always looking for ways to cut costs without sacrificing growth. For the longest time, many believed that they had to purchase workstations with its own processing power, RAM, and hard drive. But thanks to virtualization, companies can save money and get the computing processes they need with thin and zero clients.

The benefits of virtualization in 2017

The benefits of virtualization in 2017

The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualization makes this relationship far more flexible, and we’ve got a rundown on a few of the best examples.

Google ridding MR from search results

Google ridding MR from search results

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results.

Wikileaks details router vulnerabilities

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.