Mac users face increased ransomware threats

Apple is known for building secure devices, but don't get too complacent because ransomware attacks against Mac users are on the rise. Learn about the latest threats.

Karmen ransomware makes it easy for cybercriminals to launch attacks

A do-it-yourself software kit called Karmen allows just about anyone to launch ransomware attacks against businesses. Learn more.

Ransomware extortionists not as trustworthy as they’d have you believe

You can pay the ransom following a ransomware attack, but you may not get your data back. That's why you need a solid backup and recovery strategy.

Ransomware Recovery: How to meet realistic Recovery Time Objectives (RTOs)

Get tips on how to create a recovery plan for the data and applications your business depends on.

Spora ransomware could become a major player

Spora ransomware is relatively new, but its advanced capabilities indicate that it's poised to hit the big time. Read on to learn more.

How to create a BYOD policy that keeps your business data secure

Learn to create a BYOD policy that works for your business in three steps.

The top 10 ransomware attack vectors

Ransomware is infecting the computers of unsuspecting victims at an astronomical rate. The various methods that cybercriminals use to take over a machine and encrypt its digital files are called

How ransomware extortionists hide their tracks

Security expert Eric Vanderburg takes readers inside the mind of a cybercriminal. Learn how ransomware extortionists stay hidden and avoid prosecution.

Resume Ransomware: GoldenEye targets hiring managers, recruiters and HR

People charged with filling career positions at their companies need to be on the lookout for ransomware—especially GoldenEye ransomware. Learn more.

PopcornTime offers victims a choice: Pay the ransom or infect your friends

PopcornTime is a newly-discovered form or ransomware that operates off a disturbing principle. Learn more.