Controlled Folder Access - new Windows 10 feature against ransomware
Ransomware is a real pain for both large businesses and individuals, since it has lately become the most popular way to encrypt end-user information and then anonymously squeeze money for returning everything back.read a full article
Call of Duty WW2: Prepare for the battle
Call of Duty WW2: Prepare for the battle.
Did you have a chance to play Call of Duty WW2 open beta? I hope so, as IMHO this is the best Call of Duty Series game for the last 10 years.read a full article
Petya ransomware strikes back!
A new wave of malware attacks has been launched this week in Europe and has spread all over the world for the last 2 days. The name of the virus - Petya is well known and we have already written about the ways to protect your computer from this ransomware. Unfortunately, Ukrainian government (the European country that was attacked in the beginning of the wave) did not read our recommendations and lots of governmental and business networks were infected with Perya virus.read a full article
Amazon's smart speaker Echo has been a huge success after it was released in June 2015. On May 2017 Google presented its own smart speaker, Google Home.
Now Apple has made a move releasing its version of the smart speaker - Apple HomePod.read a full article
You don't WannaCry? How to be protected?
Protecting computer from viruses and other threats is becoming more and more challenging task year after year. Seems that antivirus giants are fighting with badware enthusiasts, turning customer devices into the never ending battlefield. The latest news from this war are not inspiring for users, since the new ransomware - WannCry (also known as WCry or WannaCrypt) hit millions of computers..
We already wrote about ransomware in general here, but WannaCry seems to be the most successful of these kind of malware, keeping device files as hostages, demanding money. Thousands of computers were affected around the world including personal computers, payment terminals enterprise networks and others.read a full article