Is it always wrong to pay up when hit by a ransomware attack? ESET's David Harley explores.
The operators of the notorious trojan downloader Nemucod seem to have stepped up their game, serving their victims with ransomware and ad-clickers.
Beware jackware, malicious software that seeks to take control of a device, the primary purpose of which is not data processing or digital communications.
Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.
It has been two weeks since ESET created a TeslaCrypt decryptor, which allows victims of this ransomware to get their files back. Since then, over 32,000 users around the globe have taken advantage of this opportunity and downloaded the tool.
WeLiveSecurity sits down with Igor Kabina, the ESET malware researcher who ultimately created the universal ESET TeslaCrypt decryption tool.
These days, it is not Vogon poetry that’s the most widespread risk one can encounter in the universe, but rather ransomware, explains ESET's Ondrej Kubovič.
Jigsaw 2.0 is not fully-fledged ransomware, but it does try to feed off of ransomware’s current popularity amongst cybercriminals, writes ESET's Ondrej Kubovič.
There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort, reports ESET's Josep Albors.
Ransomware is everywhere. At least that might be the impression left by a seemingly endless stream of news reports on recent cyberattacks, reports ESET's Ondrej Kubovič.
There has been a marked increase in ransomware attacks recently. We take a look at what this means and why backing up your data helps you combat this threat.
Weeks after it started attacking and encrypting victims' information, Locky is still targeting many users. Here's what you need to know about this threat.
A new ransomware named Ransom32 poses as Google Chrome and is distinguished from similar threats by its weight.
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.
Starting a few days ago, we began receiving multiple reports of malware-spreading campaigns in various countries mostly in Latin America and Eastern Europe.
Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.
Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new. We’ve noted a significant increase in Filecoder activity over the past few summer months - in this blog post we address the questions we’re getting about this issue.