Prima pagina Vizualizeaza site-ul in limba:   RO Romana

Abonare newsletter:

How to create strong, secure passwords by learning how to crack them

Create stronger, more secure passwords: We are nagged to do it all the time, but few of us actually make the effort. Meanwhile, passwords continue to be stolen, leaked, and cracked on a regular basis. So this time we’re hoping to get your attention by looking at it from the attacker’s side!


How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

If you use Apple iPhone or MacBook, here we have a piece of alarming news for you. Turns out merely visiting a website — not just malicious but also legitimate sites unknowingly loading malicious ads as well — using Safari browser could have let remote attackers secretly access your device's camera, microphone, or location, and in some cases, saved passwords as well.


Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.


IT Point Services reseller autorizat

  • Dell partnerdirect registered 2011 rgb
  • Int security i hrz rgb 3000
home » Despre noi » Companie » Shade Ransomware Decryption Tool « Inapoi la pagina anterioara

Shade Ransomware Decryption Tool

 

McAfee, working collaboratively with another security vendor and global law enforcement, were able to extract the decryption keys for the Shade ransomware. As part of that effort, we developed a decryption tool capable of unlocking user files, applications, databases, applets, and other objects infected by the Shade ransomware. This tool is available free as a part of the “No More Ransom” project, an initiative with law enforcement to share ransomware threat intelligence, coordinate malware campaign takedowns, educate users on how to protect themselves, and provide tools to unlock infected systems.

Download Shade Ransomware Decryption Tool

 

How to Use the Shade Ransomware Decryption Tool

The Shade Ransomware Decryptor Tool is provided as-is and subject to McAfee's End User License Agreement. Decryption keys may not be available in all instances.

 

Resources