Posts

How to decrypt .wallet file ransomware virus

How to decrypt .wallet file ransomware virus

Learn how to go about the predicament where files on a computer become encrypted and get the .wallet extension due to the Dharma ransomware attack. Unexpected news hit the headlines of security resources mid-November: the developers of the CrySiS ransomware released the master decryption keys for their perpetrating software. This seemed like a big win […]

Cerber Ransomware 5.0.1: _README_.hta virus decryption and removal

Cerber Ransomware 5.0.1: _README_.hta virus decryption and removal

A notorious data-encrypting threat is currently manifesting itself as Cerber Ransomware 5.0.1, the latest edition that creates the _README_.hta ransom note. The Cerber ransomware keeps mutating to persevere with its successful deployment campaigns and continue to be a moving target for the IT security community. The new variant looks quite similar to its precursors on […]

Baidu Skype virus: get rid of Baidu.com link spam in Skype

Baidu Skype virus: get rid of Baidu.com link spam in Skype

Learn how to stop the Skype fraud where a virus compromises one’s account and sends spoofed messages with Baidu.com links to all of the victim’s contacts. Skype is a remarkable medium for people to stay in touch through video calls and instant messaging. At the same time, just like any popular communication platform, it is […]

Decrypt .zzzzz files and remove Locky/ZZZZZ ransomware virus

Decrypt .zzzzz files and remove Locky/ZZZZZ ransomware virus

Stay on top of the Locky ransomware epidemic, learn what characteristics its new ZZZZZ variant has under the hood and try to restore encrypted .zzzzz files. The temporarily dominant Aesir version of the Locky ransomware has recently passed the baton to a new build called ZZZZZ. While sharing many traits with its antecedent, it stands […]

.aesir files decryptor – Aesir virus ransomware removal

.aesir files decryptor – Aesir virus ransomware removal

The Locky ransomware has got a slightly updated look and feel, the new variant appending the .aesir extension and creating -INSTRUCTION.html ransom notes. A fresh edition of the Locky file-encrypting ransomware lineage has been discovered. While sharing a lot of the characteristics with its predecessor known as Thor, the pest in question is undoubtedly a […]

Locky ransomware evolution

Locky ransomware evolution

There are ransomware samples out there whose devs cannot boast professional data encryption practices, which has allowed researchers to create workarounds for decrypting hostage files. Some examples include the Globe, DXXD, DMA Locker, and 7ev3n strains. On the other hand, there are ransom Trojans like Locky, which cripple victims’ files beyond recovery. In that case, […]

.Ace file virus: what is it and how to remove related ransomware

.Ace file virus: what is it and how to remove related ransomware

Learn what dangers can emanate from an .ace extension file attached to email and how to act in case a ransomware infection intrudes on a computer this way. Distributors of file-encrypting ransomware appear to be constantly searching for new methods to deposit their code onto Windows machines. There are multiple known attack vectors, including the […]

Cerber Ransomware 4.1.1: decrypt files and remove virus

Cerber Ransomware 4.1.1: decrypt files and remove virus

Cerber Ransomware 4.1.1, the newest version of one of today’s nastiest crypto infections, has minor changes under the hood but is still a strong adversary. A ransomware attack entails critical risks to one’s data and computer health. Personal files become off limits, hardware gets an additional processing burden, and random applications may end up unusable. […]

Cerber ransomware evolution

Cerber ransomware evolution

The abnormally rapid progress of the crypto ransomware industry over the past several years has induced a delineation between the author and the actual distributor of an infection. The underground affiliate model called RaaS (Ransomware as a Service) has made this extremely dangerous extortion contrivance readily available for dummies and high-profile threat actors alike. The […]

Thor virus: how to decrypt .thor files ramsomware

Thor virus: how to decrypt .thor files ramsomware

This guide provides the low-down on the newest Locky variant called Thor ransomware and advises on workarounds to decrypt files with the .thor extension. Yesterday’s edition of Locky ransomware that appended the .shit suffix to one’s files didn’t last. The unexpected news that hit the headlines literally hours later is that a new heir to […]

Page 4 of 11« First...«23456»10...Last »