When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.
Black and white: Not all hackers are bad
NSA-approved: mobile virtualization
WannaCry: A historic cyberattack
Web browser cybersecurity, ranked
The most advanced Gmail phishing scam yet
What is virtual “sandboxing”?
The phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.
Is the government really spying on you?
Some ransomware strains are free to decrypt
Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure.

