Everything you need to know about ransomware
FAQ about ransomware: types, origins, dangers, and how you can stay safe
225 articles
FAQ about ransomware: types, origins, dangers, and how you can stay safe
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker — but we developed a cure.
How heuristic analysis and System Watcher work in Kaspersky Internet Security.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
Fantom ransomware displays a fake Windows Update screen while encrypting your files.
Another piece of ransomware bites the dust: Kaspersky Lab now offers a free decryption tool for the WildFire cryptor.
Are you set up to block ransomware from jumping from one machine to your network?
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
New ransomware called Satana encrypts your files and blocks the operating system from booting.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Theoretically, every business should have already learned how to protect itself against ransomware. Actually it’s not the case.