Posts

Netflix hack: attacker unleashes his rage over failed extortion

Netflix hack: attacker unleashes his rage over failed extortion

Recently leaked 10 episodes of the “Orange Is the New Black” show’s season 5 have demonstrated how vulnerable entertainment companies are in face of hacking. A newsmaking hack incident as of late April 2017 involving Netflix and a related media company became a serious wakeup call for proprietors of popular streaming video services. A threat […]

ThunderCrypt virus: decrypt files and remove ransomware

ThunderCrypt virus: decrypt files and remove ransomware

This entry provides the low-down on the new ThunderCrypt ransomware, which uses asymmetric cipher to lock files and demands Bitcoins for decryption. Unfortunately, cryptography isn’t entirely about benign scope of use these days. This domain of applied science was originally meant to secure communication, data transfer and information storage. However, cybercrooks ventured into turning this […]

Onion ransomware: decrypt .onion virus extension files

Onion ransomware: decrypt .onion virus extension files

The .onion file virus appears to be the latest incarnation of the Dharma ransomware, a high-profile threat using cryptography to take data hostage. The CrySiS / Dharma ransomware family is one of the old stagers on the arena of online extortion. It stands out from the rest in a couple of ways. The cybercriminals in […]

How to uninstall KuaiZip virus ads

How to uninstall KuaiZip virus ads

If the KuaiZip application has ended up on a PC, removing it is a necessary security measure as it displays annoying ads and promotes other malicious software. Using the KuaiZip software is a mixed blessing. On the one hand, it claims to archive data with higher compression ratio than competing tools WinRAR, WinZip and 7-Zip […]

Nemesis decryptor: redeem encrypted files from Cry9/Nemesis ransomware

Nemesis decryptor: redeem encrypted files from Cry9/Nemesis ransomware

This tutorial highlights key characteristics of the Nemesis ransomware variant called Cry9 and provides efficient instructions to restore hostage files. No other computer threat compares to ransomware when it comes to prevalence and troubleshooting difficulties. The threat actors involved in this illegal cyber-borne business have literally weaponized cryptography, an originally benign field of science. By […]

“The requested resource is in use” virus popups in Windows

“The requested resource is in use” virus popups in Windows

Learn what infection displays ‘The requested resource is in use‘ error notifications when certain applications are launched, and how to fix the problem. In a way, the computer threat landscape is reminiscent of real-world criminal plots, with villains and their accomplices working in tandem to pull off wicked felonies. Recent evidence of such a similarity […]

AES-NI Ransomware removal: decrypt .aes_ni_0day files

AES-NI Ransomware removal: decrypt .aes_ni_0day files

Users who got their personal files encrypted and appended with the .aes_ni_0day or .aes256 extension should leverage this tutorial for recovery assistance. Just like fingerprints in a real-world crime investigation, every ransomware attack is accompanied by unique IOCs (indicators of compromise) that make it possible to identify the specific crypto threat and the family it […]

Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin

Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin

A new crypto threat called Rensenware is breaking new ground with its unique tactic, where it encourages victims to play a game rather than cough up money. In a move that hardly anyone in the security community could possibly anticipate, a questionably judicious individual going by Twitter nickname Tvple Eraser has made quite an appearance […]

Wcry ransomware: .wcry files decryptor and virus removal

Wcry ransomware: .wcry files decryptor and virus removal

Update 13.05.2017: This information also applies to an updated Wcry variant called Wana Decrypt0r 2.0 active as of May 2017, which uses the .WNCRY extension to stain hostage files. Get a viable fix for the Wcry ransomware issue, where all important files on a computer get encrypted with AES algorithm and a ransom of 0.3 […]

Microsoft Warning Alert scam: remove fake virus popups

Microsoft Warning Alert scam: remove fake virus popups

Get rid of the Microsoft Warning Virus scam issue, which is on the rise with fake threat detection reports and recommendations to call an impostor technician. Tech support scams have always been a goldmine for ne’er-do-wells who seek easy gain. These manipulative campaigns revolve around the use of browser hijackers, screen lockers or popup viruses […]

Page 3 of 15«12345»10...Last »