Posts

What is aMuleC “virus” and how to remove it

What is aMuleC “virus” and how to remove it

Peruse this report on the aMuleC adware that proliferates through application bundling and spawns a slew of intrusive ads on visited web pages. What is aMuleC? The aMuleC adware reflects the nuts and bolts of unauthorized ad serving. Also referred to as aMule C, this malicious browser extension can get around user authorization while making […]

Popcorn Time ransomware: .filock files decryption and removal

Popcorn Time ransomware: .filock files decryption and removal

Learn a way to get around the harsh cryptographic impact of the Popcorn Time ransomware, which introduces a cynical marketing model never seen before. Security experts have gotten accustomed to handling ransom Trojans that lock victims’ data and impose a decryption deal involving a payment. The new perpetrating program dubbed the Popcorn Time ransomware has […]

Goldeneye ransomware: virus decryption and removal

Goldeneye ransomware: virus decryption and removal

Similarly to its prototype called Petya, the new Goldeneye ransomware overwrites the Master Boot Record on PCs and demands a ransom to unlock the system. The nefarious craft of the Petya disk-encrypting ransomware is continuing with a new, slightly modified incarnation. As of December 6, 2016, numerous computer users are reporting attacks by a crypto […]

Decrypt .osiris files and remove Locky-Osiris ransomware virus

Decrypt .osiris files and remove Locky-Osiris ransomware virus

A new version of the Locky ransomware is out, which encrypts files using RSA and AES ciphers, appends them with the .osiris extension and demands 0.5 BTC. The latest update of the Locky ransomware as of December 5, 2016 has brought about a couple of changes to the way this infection manifests itself. The most […]

How to decrypt .wallet file ransomware virus

How to decrypt .wallet file ransomware virus

Learn how to go about the predicament where files on a computer become encrypted and get the .wallet extension due to the Dharma ransomware attack. Unexpected news hit the headlines of security resources mid-November: the developers of the CrySiS ransomware released the master decryption keys for their perpetrating software. This seemed like a big win […]

Cerber Ransomware 5.0.1: _README_.hta virus decryption and removal

Cerber Ransomware 5.0.1: _README_.hta virus decryption and removal

A notorious data-encrypting threat is currently manifesting itself as Cerber Ransomware 5.0.1, the latest edition that creates the _README_.hta ransom note. The Cerber ransomware keeps mutating to persevere with its successful deployment campaigns and continue to be a moving target for the IT security community. The new variant looks quite similar to its precursors on […]

Baidu Skype virus: get rid of Baidu.com link spam in Skype

Baidu Skype virus: get rid of Baidu.com link spam in Skype

Learn how to stop the Skype fraud where a virus compromises one’s account and sends spoofed messages with Baidu.com links to all of the victim’s contacts. Skype is a remarkable medium for people to stay in touch through video calls and instant messaging. At the same time, just like any popular communication platform, it is […]

Decrypt .zzzzz files and remove Locky/ZZZZZ ransomware virus

Decrypt .zzzzz files and remove Locky/ZZZZZ ransomware virus

Stay on top of the Locky ransomware epidemic, learn what characteristics its new ZZZZZ variant has under the hood and try to restore encrypted .zzzzz files. The temporarily dominant Aesir version of the Locky ransomware has recently passed the baton to a new build called ZZZZZ. While sharing many traits with its antecedent, it stands […]

Page 2 of 11«12345»10...Last »