News, Tips, Security Lab
Experts Analyzed the Activities of the PYSA Cyber-Extortion Group
Specialists from the Swiss cybersecurity company PRODAFT have published the results of an 18-month study on the PYSA cyber-extortion group.…
RuRansom Malware Destroys Data in Russian Systems
VMware specialists spoke about the activity of the RuRansom wiper, which attacks Russian systems and deliberately destroys its data, including…
Anonymous hackers published the mail database of the Ministry of Culture of Russia
The media discovered that Anonymous hackers had made public a database of emails from the Russian Ministry of Culture, the…
The US won’t cooperate with Russia on ransomware anymore
The US suspends its cooperation with Russia on ransomware criminals amidst the brutal war the Russian government wages against Ukraine,…
RaidForums shutdown as the result of Operation Tourniquet
The chain of international law enforcement agencies – Europol, FBI, NCA and others – seized the world’s largest hacker forum…
10 tips to secure a laptop on vacation
Summer comes and the bells ring for the vacations. If you have a partner or not there is one constant companion which will follow you on your vacation in any…
What is Trojan CoinMiner csrss.exe?
Csrss.exe (also known as Client Service Runtime Process) is a legitimate and vital process of Microsoft Windows OS. The genuine csrss.exe file is located in “C:\Windows\System32\” and it is normal…
How to protect your PC from a virus, that has infected systems all around the world? Be careful, WannaCry may come for you!
I think you’ve already heard about this virus. For the past few days, it spread to computers in 74 counties! The biggest impact we can see is in China, Russian…
Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses
Something is off with your device and you have the premonitions why. You got infected with a computer virus. But put the panic aside and before you do anything in…
Top 10 Deadliest Virus in
Computer viruses are really similar to real-life ones. They can infect thousands of PCs in just one hour, so we can call it an epidemic. Agreed, it is exciting to…
How to become an expert in application security (Security tips)
Every day hundreds of new mobile applications appear in the App Store and Play Market. Some of them will have less than 10 thousand downloads, others are becoming unbelievably popular.…
Microsoft Tech Support Scam Affiliate Program
The new sector of cyber attacks has become popular nowadays. In the guise of Microsoft Technical Support (Microsoft Tech Support Scam). Scammers try to force Internet users into making a…
Once more about data breaches
One of the biggest breaches of databases happened recently – personal information on nearly 50 thousand users was stolen and replaced by random files with instructions on how to get…
How can hackers crack your router?
Do you think that you are protected from hackers? Of course, you are using a wireless access point with an encryption. You are wrong! pull your password from the air!…
Top-6 biggest tech failures of 2016
Samsung Galaxy Note 7 The biggest failure of Samsung for all history is Galaxy Note 7. Smartphones started exploding, that caused a stoppage in production and users were forbidden from…
The Danger of Botnet Network: How to Detect Botnet on You PC
The word “botnet” is now ubiquitous, and almost all users know what it means. This is not surprising because this network can be virtually any device with Internet access. Such…
How to use Wi-Fi for free and keep your data private
Where do you plan to spend the most of your time this winter holidays? Malls, restaurants, cinema, ice rink… all these places have something in common. Free Wi-Fi – we…