Home Tags Security

Tag: Security

Petya Recap and How To Prevent from Ransomware in General

The dust of the WannaCry hasn't completely settled, we again face another malicious attack in the form of ransomware. This time, it goes by...

Someone has Tried to Hack Window 10 S

Microsoft has made a claim that no known ransomware runs on Windows 10 S, the new and store app only operating system. And someone...

Microsoft Claims Windows 10 S A Ransomware Free Windows System

In a white paper "Next-gen ransomware protection with Windows 10 Creators Update" that provides a deeper level of the technical details on the ransomware...

Whom to Blame: Stealing Windows Credentials Using Google Chrome

DefenseCode has published a paper that details an attack that leads to Windows credentials theft, affecting the most popular browser in the world, Google...

The Hero Who Stopped WannaCry, Accidentally

Believe it or not, the massive WannaCry ransomware that shot down tens of thousands of computers has a back door that will kill itself...

What Windows Patches Needed to Prevent WannaCry Ransomware

A global ransomware campaign, called WannaCry, has now infected over 10,000 organizations and 200,000 individuals in over 150 countries, including the UK National Health...

Interactivly Learn How Security Vulnerability Exploitation Works and How To Prevent...

Security has been a hot topic for the last couple years, all the hacking and data breach you hear on the news are mostly...

How To Use BitLocker to Encrypt and Protect USB Drives in...

BitLocker Drive Encryption is a full disk encryption feature introduced by Microsoft first in Windows Vista but further developed in Windows 7, 8.1 and...

RanSim to Test How Vulnerable Your Computer is Against Ransomware Attack

Ransomware is arguably the No.1 cyber threats at the moment and will most likely remain that position in the foreseeable future. In 2016, ransomware cost individuals...

RansomFree to Protect Your PC From All Kinds of Ransomware

Ransomware is an evil malware that encrypts the victim’s files and then requests payment in return for the key to decrypt the encrypted data....