What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.
Watch what happens during a ransomware infection, from the time a user receives the email with the spiked attachment to the time the malware itself is executed.
Videogame mods are used as a way to tweak how a game looks, feels, and works. While not inherently bad, game mods do come with a fair share of risks. Case in point: recent incidents show that they're also being used as a way to deliver malware.
A recent string of website defacements call for the release of SpyEye creator Hamza Bendelladj, codename Bx1. live casino online, working law enforcement, facilitated his arrest in 2013. Two years after, how has this affected the war on cybercrime?
It's been around a decade since we've been introduced to ransomware. Let's take a stroll down memory lane to see how it has evolved through some of the notable cases we've tackled through the years.
The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the live casino online 2015 1Q Security Roundup.