Category: Security
If you’re a Mac user, you’ll want to make sure you’re using your computer as securely as possible. The common notion is that the MacOS is secure out-of-the-box, but …
Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. Most of the infected …
If you host a website on a Linux server, you might want to watch out for the new FairWare ransomware. Not much is known about this ransomware yet, but …
Last week, BleepingComputer reported about a new ransomware that uses a fake Windows Update screen while it encrypts your files. This new ransomware is called Fantom Ransomware and it …
Legacy ciphers such as triple-DES (3DES) and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key. Security researchers were able to …
A few months ago, I wrote an article on how to configure IIS for SSL/TLS protocol cipher best practices. To test your configuration, you can use a handy tool …
While Windows Defender does a decent job at protecting your computer, Microsoft has a hidden feature built-in for the enterprise users. Luckily, a simple registry hack can increase your …
The CryptoWall ransomware has been updated to make it more difficult for users to recover their encrypted data. The latest version of CryptoWall, version 4.0, will now alter the …
Ransomware is a type of virus and malware that basically takes your computer hostage and demands that you pay a ransom to get your computer back to normal. As …
Win32/TrojanDownloader.Waski.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer. It …