Posts

DHL scam emails distributing virus files

DHL scam emails distributing virus files

A massive wave of spam impersonating DHL Express has been depositing offending code onto recipients’ computers, so be careful with these fake emails. Popular international shipping services have been consistently luring online crooks as a domain for exploitation because of large customer base and the present-day emphasis on online methods of client interaction. No wonder […]

KillDisk ransomware decryption and removal

KillDisk ransomware decryption and removal

Find out why the KillDisk ransomware is particularly dangerous and how to go about the predicament where this infection holds all data on a computer hostage. KillDisk demonstrates how malicious code can evolve over time. This sample used to hit the headlines as an extremely harmful threat involved in high-profile cyber-attacks against critical infrastructure. According […]

Sysgop01@india.com – CryptoLocker replica ransomware decryptor and removal

Sysgop01@india.com – CryptoLocker replica ransomware decryptor and removal

The sysgop01@india.com ransomware, also known as SysGop, PClock or CryptoLocker, is currently in active rotation, so learn how to avoid it and decrypt files. In-the-wild reach of the SysGop ransomware strain is broadening. Its proliferation appears to feature no restrictions geography-wise, infecting English-speaking Windows users along with people whose operating system localization is Russian. The […]

Win.Trojan.Toa virus removal

Win.Trojan.Toa virus removal

The disruptive activity of Win.Trojan.Toa can range from intrusiveness to PC productivity impact, so learn a few simple tips on removing this infection. The concept of computer Trojans is heterogeneous. This term can denote highly dangerous threats, such as file-encrypting ransom Trojans that extort cryptocurrency for data. It can also be used to designate low-severity […]

The Insolvency Service scam emails

The Insolvency Service scam emails

In a bid to implement a new phishing model, cybercriminals have recently launched an email scam campaign abusing the Insolvency Service agency’s name. Business owners in the UK are confronted with a new massive scam wave revolving around false corporate misconduct. Online fraudsters have been sending rogue Company Investigations Inquiry Reminders (Notifications or Notices) purportedly […]

Firefox-patch.js virus removal: block ‘Urgent Firefox update’ popup

Firefox-patch.js virus removal: block ‘Urgent Firefox update’ popup

Learn how to get rid of a browser virus redirecting to rogue Firefox update pages and displaying firefox-patch.js popups that distribute malicious software. What is firefox-patch.js? In pursuit of new malware proliferation vectors, cybercriminals have come to employ a mix of social engineering and adware-backed techniques. This compound tactic has a high infection rate, because […]

What is aMuleC “virus” and how to remove it

What is aMuleC “virus” and how to remove it

Peruse this report on the aMuleC adware that proliferates through application bundling and spawns a slew of intrusive ads on visited web pages. What is aMuleC? The aMuleC adware reflects the nuts and bolts of unauthorized ad serving. Also referred to as aMule C, this malicious browser extension can get around user authorization while making […]

Popcorn Time ransomware: .filock files decryption and removal

Popcorn Time ransomware: .filock files decryption and removal

Learn a way to get around the harsh cryptographic impact of the Popcorn Time ransomware, which introduces a cynical marketing model never seen before. Security experts have gotten accustomed to handling ransom Trojans that lock victims’ data and impose a decryption deal involving a payment. The new perpetrating program dubbed the Popcorn Time ransomware has […]

Goldeneye ransomware: virus decryption and removal

Goldeneye ransomware: virus decryption and removal

Similarly to its prototype called Petya, the new Goldeneye ransomware overwrites the Master Boot Record on PCs and demands a ransom to unlock the system. The nefarious craft of the Petya disk-encrypting ransomware is continuing with a new, slightly modified incarnation. As of December 6, 2016, numerous computer users are reporting attacks by a crypto […]

Decrypt .osiris files and remove Locky-Osiris ransomware virus

Decrypt .osiris files and remove Locky-Osiris ransomware virus

A new version of the Locky ransomware is out, which encrypts files using RSA and AES ciphers, appends them with the .osiris extension and demands 0.5 BTC. The latest update of the Locky ransomware as of December 5, 2016 has brought about a couple of changes to the way this infection manifests itself. The most […]

Page 3 of 11«12345»10...Last »