AhelioTech LTD

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • From Darknet with Love: Meet Spora Ransomware

    Ransomware has been a growing threat, with new families cropping up every week. Emsisoft researchers are often involved in the discovery and analysis of new threats, and this ransomware is no different. Originally spotted on ID-Ransomware earlier today, it caught our attention due to a few unique features and the high level of professionalism in both implementation […] The post From Darknet with L...

  • Gooligan Android malware breaches 1 million Google Play accounts

    13,000 devices are infected with Gooligan every day A new malware attack is hitting Android devices at an alarming rate. This attack is the largest ever breach of Google accounts, according to Check Point, a security research firm that is working with Google to monitor and document the outbreak. The malware attack hijacks phones using […] The post Gooligan Android malware breaches 1 million Google...

  • Microsoft calling? Mind the tech support scammer!

    After a long day, there is nothing like sitting down at your computer with a cup of tea to catch up on the news online. But what would you do if you were faced with a pop-up telling you that your computer has a virus and that ‘tech support’ is conveniently letting you know? The […] The post Microsoft calling? Mind the tech support scammer! appeared first on AhelioTech.

  • 30 seconds and 50 dollars is all it takes to steal your PC login

    Imagine you’ve been at work for a few hours. It’s time to get up, grab a coffee and some morning tea. You’ll only be away from your desk for ten minutes so you know it will be easier to just hit the lock screen on your workstation than to completely log out and then log […] The post 30 seconds and 50 dollars is all it takes to steal your PC login appeared first on AhelioTech.

  • Malware in sex toys: How private is your playtime?

    In a time where fridges self-monitor their own food levels and cars can drive themselves, it was inevitable that the Internet of Things would catch up with the sex toy industry. Our playthings can now be controlled by an app and that can be paired to another person’s phone from wherever in the world they happen […] The post Malware in sex toys: How private is your playtime? appeared first on Aheli...

  • No honour among thieves: hackers who hack each other

    In ransomware, as in any profitable business, there is a constant struggle to compete in the marketplace. Ransomware, the strain of malware which crypto locks a victim’s hard drive until the developer of the malware is paid, is a highly lucrative – and illegal- income earner for its authors. The strategy is so successful that […] The post No honour among thieves: hackers who hack each other appear...

AhelioTech LTD

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • Yahoo hack hits half a billion users

    Yahoo announces that data from as many as 500 million user accounts were stolen in a breach during 2014. The data breach poses many problems for Yahoo CEO Marissa Mayer as she tries to close a $4.8bn sale to Verizon Communication who were only made aware of the leak two days ago. With the deal not set to close […] The post Yahoo hack hits half a billion users appeared first on AhelioTech.

  • Are all hackers criminals?

    Not all hackers are created equal. The terms ‘hacker’ and ‘cyber criminal’ seem to be used interchangeably in online media which is both misleading and reductive. A cybercriminal uses online means to profit from illegal activity regardless of the cost to its many victims. Hacker is a blanket term that doesn’t allow for much differentiation […] The post Are all hackers criminals? appeared first on ...

AhelioTech LTD

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • How to identify your ransomware infection to find the right decrypter tool

    How would you feel if you opened your computer to find it had been locked with a ransom note demanding cash immediately? Ransomware is the most common online threat of 2016, making up a huge percentage of today’s active threats. It has turned out to be one of the easiest and highest income earners for attackers. All […] The post How to identify your ransomware infection to find the right decrypter...

AhelioTech LTD

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Fabiansomware: when hackers lose it

    Cybercrime has existed for as long as the internet has. However, 2016 has well and truly been the year of ransomware. New ransomware families are popping up weekly and the Emsisoft Malware Lab battles them daily on the frontline. As a result, our lab is often at the receiving end of hate from authors of […] The post Fabiansomware: when hackers lose it appeared first on AhelioTech.

AhelioTech LTD

Category: Content
Type: Blog Article

Generated 5 months ago

AhelioTech LTD

Category: Content
Type: Blog Article

Generated 5 months ago

AhelioTech LTD

Category: Content
Type: Blog Article

Generated 6 months ago

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in