Track Global Malware Trends
View the trending of malware based on the "detection count" reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Spam Alert: Phishing Email Scam Titled ‘Bank of America Alert: Account Suspended’
We recently discovered a new phishing scam from a Bank of America spam email message that attempts to warn a computer user of an 'invalid login' resulting in a 'suspended banking account'. The spam message is ultimately a phishing scam that tries to lure computer users to a phishing site to...
Top 5 Popular Cybercrimes: How You Can Easily Prevent Them
Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles , the days of robbing...

Top Articles

Play-bar.net

The Play-bar.net search aggregator is similar to Ultimate-search.net , and it is a questionable service that is promoted by a browser hijacker. The Play-bar.net site is operated by Blisbury LLP and features a small search bar, a weather forecast in the top right corner and a clock widget in the top left corner. Additionally, the Play-bar.net site may offer users to play Adobe Flash games on online gaming platforms like Princess Games , GamesRockit and TikiArcade . The browser hijacker related to Play-bar.net is written with the purpose of diverting the Internet traffic of infected users to Play-bar.net and earn affiliate revenue. The Play-bar.net browser hijacker may modify your DNS settings and change your default search aggregator, homepage and a new tab to Play-bar.net. The Play-bar.net browser hijacker might edit your Windows...

Posted on October 14, 2015 in Browser Hijackers

Cerber Ransomware

The Cerber Ransomware is a ransomware infection that is used to encrypt the victims’ files. The Cerber Ransomware adds the extension CERBER to every file that the Cerber Ransomware encrypts. After the Cerber Ransomware has encrypted some of the files of the victim, the Cerber Ransomware demands the payment of a ransom in exchange for the decryption key. According to Cerber Ransomware’s ransom note, computer users have one week to pay the ransom amount before this amount is doubled. As the Cerber Ransomware encrypts the victim’s files, it creates TXT, HTML, and VBS files named ‘DECRYPT MY FILES’ with instructions on how to pay the Cerber Ransomware’s ransom. These files are dropped on every folder that contains files that were encrypted by Cerber Ransomware. According to these ransom notes, the...

Posted on March 4, 2016 in Ransomware

Cerber3 Ransomware

The Cerber3 Ransomware is a new version of a well-known ransomware Trojan. The Cerber Ransomware Trojan now uses a slightly different method during its attack. The main difference is that the files infected by the Cerber3 Ransomware can be identified through the use of .CERBER3 as the extension that identifies the files that have been encrypted in the attack. PC security analysts had observed a Cerber2 variant of this attack previously. This numbering system may indicate new versions of software, and threats are no exception. The appearance of the Cerber3 Ransomware indicates that the Cerber ransomware family is being developed and updated currently. The Cerber3 Ransomware was discovered recently, around the end of August of 2016. The Cerber3 Ransomware presents minor differences from previous versions of this threat. However,...

Posted on September 1, 2016 in Ransomware

DNS Unlocker

The DNS Unlocker is adware that has caught the attention of PC security researchers. Many computer users have been using programs like the DNS Unlocker to bypass region-locking components in online applications. The DNS Unlocker, in particular, has been advertised as a way for computer users to access Netflix for regions outside of their location. PC security analysts strongly recommend against this approach. There are numerous applications available that supposedly allow computer users to modify their IP or connect to certain websites that are blocked for certain regions. However, this is a common way for adware developers to distribute their low-level and mid-level threats. In several situations, it may be better to avoid using these types of components or looking for reputable options even if they are slightly more expensive than...

Posted on June 15, 2015 in Adware

Tavanero.info

Tavanero.info is a bogus search engine that is associated with a PUP (Potentially Unwanted Program). Tavanero.info attempts to mimic the look and feel of the Google search engine to mislead computer users. Tavanero.info uses the Google logo colors in its layout and even includes the term ‘GoogleTM Custom Search,’ despite the fact that Tavanero.info has no affiliations with Google. Tavanero.info should be considered for what it is, a bogus search engine that may be used to expose computer users to potentially harmful online advertisements and content. There is no legitimate connection between Tavanero.info and Google, despite this fake search engine’s claims. Tavanero.info is linked to a type of PUP known as a browser hijacker, mainly because these components may be used to hijack the computer users’ Web...

Posted on September 6, 2016 in Browser Hijackers

Tech-connect.biz

If Tech-connect.biz start appearing as your homepage and search engine, this means that your computer is housing a browser hijacker. Then you wonder how it could have happened if wasn’t you who introduced Tech-connect.biz on your machine. The answer is very simple; browser hijackers may be part of the installation of a free software you downloaded from the Web recently. This is a well-used method since the computer users may be in a hurry when installing the free program they need and instead of choosing ‘Advanced’ or ‘Custom,’ used the quickest installation method, skipping its EULA and additional details, giving the browser hijacker, adware, and PUPs, the permission to be installed unknowingly. Although not threatening, Tech-connect.biz may cause a series of inconveniences to the computer users, such as...

Posted on September 15, 2016 in Browser Hijackers

Antivirus Security Pro

Antivirus Security Pro screenshot

Antivirus Security Pro is a rogue security application that belongs to a large family of rogue security software known as . Antivirus Security Pro is a fake security program that is disguised as a legitimate anti-virus application. Antivirus Security Pro does this by displaying false positives and bogus security warnings on the victim’s computer. There are several ways in which criminals distribute Antivirus Security Pro, including malicious attack websites and spam email messages containing malicious attachments. Security analysts consider that Antivirus Security Pro presents a threat to your computer. Because of this, ESG security researchers strongly recommend that computer...

Posted on August 22, 2013 in Rogue Anti-Spyware Program

Zepto Ransomware

The Zepto Ransomware is a variant of the Trojan Locky Ransomware . The Zepto Ransomware is designed to infect all versions of the Windows operating system, from Windows XP all the way to Windows 10. Ransomware Trojans like the Zepto Ransomware are especially threatening because, even if removed, the victim’s files will still be inaccessible. Essentially, the Zepto Ransomware takes the victim’s files hostage, encrypting them and demanding the payment of a ransom to decrypt them. Since the files encrypted by the Zepto Ransomware are impossible to recover without access to the decryption key, PC security analysts advise that computer users take immediate preventive measures to avoid becoming victims of this and similar ransomware Trojan attacks. When the Zepto Ransomware is installed on the victim’s computer, it...

Posted on June 29, 2016 in Ransomware

CryptoLocker Ransomware

CryptoLocker Ransomware screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim’s files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim’s computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user’s files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from...

Posted on September 11, 2013 in Ransomware

CryptoWall Ransomware

CryptoWall Ransomware screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

HackTool:Win32/Keygen

HackTool:Win32/Keygen is a malicious Windows platform tool. HackTool:Win32/Keygen is used to generate keys for illegitimately-obtained versions of different software products. HackTool:Win32/Keygen may also download harmful files and deteriorate the performance of a system. Use an effective malware removal tool to remove HackTool:Win32/Keygen from your system. HackTool:Win32/Keygen may be used primarily for malicious purposes. A system with HackTool:Win32/Keygen installed may be susceptible to being infiltrated by a remote user. HackTool:Win32/Keygen software could generate software keys for applications installed that may eventually hold the PC users responsible for illegal usage. It would be wise to eliminate HackTool:Win32/Keygen to avoid those circumstances.

Posted on September 30, 2010 in Trojans

From Doc to Pdf Toolbar

From Doc to Pdf Toolbar is an unwanted toolbar/ adware application, which is advertised via other freeware and shareware program downloads to benefit from this. From Doc to Pdf Toolbar modifies the default homepage with Home.tb.ask.com and the default search provider with Search.tb.ask.com. From Doc to Pdf Toolbar installs a Browser Helper Object (BHO) that might corrupt, Internet Explorer, Google Chrome or Mozilla Firefox. From Doc to Pdf Toolbar is used to increase web traffic and make a profit from deceptive advertising by using blackhat SEO methods. PC users should always pay attention while installing software products because often, a software installer carries optional installations, such as From Doc to Pdf Toolbar. From Doc to Pdf Toolbar infiltrates into the attacked computer using misleading tactics without the victimized PC...

Posted on July 24, 2013 in Malicious Toolbars

Mapsgalaxy Toolbar

Mapsgalaxy Toolbar screenshot

The Mapsgalaxy Toolbar is a Potentially Unwanted Program (PUP) that may cause various unwanted issues on an affected computer. The Mapsgalaxy Toolbar is commonly bundled with freeware or shareware programs. Although in many cases computer users may opt out of installing the Mapsgalaxy Toolbar, many computer users don’t realize this option exists because of confusing installation procedures. The Mapsgalaxy Toolbar is categorized as a PUP, or Potentially Unwanted Program. Although the Mapsgalaxy Toolbar may have some legitimate uses, it is recommended to remove this PUP because of its associated with low quality search engines and potentially misleading advertisements. Redirects and...

Posted on September 10, 2013 in Malicious Toolbars

OnlineMapFinder

OnlineMapFinder is a Potentially Unwanted Program (PUP) that is advertised at Free.onlinemapfinder.com/index.jhtml as a premium Web-app. The OnlineMapFinder application is developed by Mindspark Interactive Network, Inc. and is described at Free.onlinemapfinder.com/index.jhtml as “Maps, Driving Directions and more in one Chrome New Tab” briefly. The OnlineMapFinder application works as a browser extension/add-on that you can attach to internet Explorer, Google Chrome and Mozilla Firefox. You may find the OnlineMapFinder useful if you are traveling around the world with a laptop on your back. The OnlineMapFinder app may load exciting content from sources like Maps.nationalgeographic.com, Historicaerials.com and Mapquest.com. OnlineMapFinder may be eliminated by going through the Web browser add-ons and extensions menu to...

Posted on March 4, 2014 in Potentially Unwanted Programs

Elex Hijacker

The Elex Hijacker is a Web browser hijacker that may take over a Web browser, change its homepage and other settings and prevent computer users from restoring their Web browser to its default setting. The Elex Hijacker may be associated with a variety of other unwanted symptoms. The main reason that makes the Elex Hijacker is considered a browser hijacker is because its main purpose is to take over a Web browser to force computer users to view certain websites repeatedly and open new Web browser windows and tabs while the computer users attempt to use their computers. The Elex Hijacker is promoted as a useful Web browser extension or add-on. However, PC security researchers have determined that the Elex Hijacker does not offer any useful or beneficial service. Rather, the Elex Hijacker is designed to make money at the expense of...

Posted on December 12, 2015 in Browser Hijackers

CounterFlix

The Counterflix software is advertised as an application that can allow users to load geo-restricted content from services like Hulu, Pandora and Netflix. PC users that live in countries like India, China, and Russia, where Internet censorship applies may be interested in installing Counterflix. The services provided by Counterflix are available through the app and the modification of your DNS configuration. The setup page for Counterflix can be found at Counterflix.com and users will need to edit their system settings to install the Counterflix correctly. You should note that the Counterflix software is provided on an “As-Is” basis and you will not receive support from its developers. Unfortunately, the makers of Counterflix do not provide contact information like a Facebook page or a Twitter account, which you may need in case of...

Posted on October 2, 2016 in Adware

Cerber 4.0 Ransomware

The Cerber 4.0 Ransomware represents the next generation in development of the ‘.cerber’ line of encryption Trojans. The Cerber 4.0 Ransomware joins other threats like the ORX-Locker and the Stampado Ransomware , which are offered as Ransomware-as-a-Service package. The RaaS business was pioneered by Encryptor RaaS in early 2015 and the developers of Cerber want a share of the market for ransomware. It appears that the coders behind the Cerber 4.0 Ransomware decided to open their product to foreign programmers and benefit from the expanded distribution network. The Cerber 4.0 Ransomware is said to boast several significant improvements compared to the Cerber v3 . The Cerber v4 creates a unique file extension marker for every victim, and the Trojan is programmed to bypass all security mechanisms employed by modern...

Posted on October 13, 2016 in Ransomware

Decryptallfiles3@india.com

The ‘Decryptallfiles3@india.com’ Ransomware is named after the email address users are supposed to contact in case their data was encrypted. The ‘Decryptallfiles3@india.com’ Ransomware is an encryption Trojan that is actively dispersed among Windows OS users via spam emails. Fake invoices, payment notifications, and photos from Facebook are known to serves as droppers for the ‘Decryptallfiles3@india.com’ Ransomware. In many cases, users are lead to believe they need to enable macro and load the document correctly while random characters are scattered across a blank page. Security experts remind users to make sure macro is disabled in their office suite since it is easily abused by threat actors who deploy threats through a macro. The ‘Decryptallfiles3@india.com’ Ransomware is one of...

Posted on December 16, 2016 in Ransomware

More Articles

‘powerfulldecrypt File Extension’ Ransomware

The detection name ‘.powerfulldecrypt File Extension’ Ransomware is used to specify an encryption Trojan that is based on the SamSam (Samas) Ransomware . The detection name ‘.powerfulldecrypt File Extension’ Ransomware is used as an easy way to distinguish a version of SamSam that is programmed to use the ‘.powerfulldecrypt’ extension when it marks files as encrypted. The ‘.powerfulldecrypt File Extension’ Ransomware emerged after the ‘.VforVendetta File Extension’ Ransomware and the Dr. Fucker Ransomware that are members of the Samas family of Trojans. The new variant dubbed the ‘.powerfulldecrypt File Extension’ Ransomware was added to the databases of security vendors on January 14th, 2017. PC security experts suspect that affected users were compromised...

Posted on January 18, 2017 in Ransomware

‘wuciwug File Extension’ Ransomware

The detection ‘.wuciwug File Extension’ Ransomware is used by security vendors regarding a variant of the Globe3 Ransomware . The ‘.wuciwug File Extension’ Ransomware is not very different from the main version of the Trojan. Evidently, the Trojan is using the ‘.wuciwug’ file extension to mark the encrypted files and it is the most prominent difference. For example, ‘Metal halide lamp.pptx’ is transcoded to ‘Metal halide lamp.pptx.wuciwug’ and the original file is deleted permanently. Other traits of the ‘.wuciwug File Extension’ Ransomware remain consistent with the ransom family it belongs to. The ‘.wuciwug File Extension’ Ransomware may be downloaded to computers when the user runs a bad macro from a text document and a PDF file. The distribution...

Posted on January 18, 2017 in Ransomware

Ploutus

The Ploutus malware is a Trojan that appeared in 2013 in Mexico and resurfaced on security scans in November 2016 with a new version. Ploutus is a Trojan that is designed to work on ATMs powered by the Windows OS. Ploutus can interact with the latest versions of Windows and Windows XP as well. Cyber security experts that were investigating empty ATMs revealed that the physical integrity of the machines was compromised to access the inside mechanisms and install the Ploutus Trojan. The initial release of Ploutus was designed to release cash when an external keyboard is connected to the infected ATM, but the new version features a significant improvement. The new version comes with a launcher that makes attempts at identifying security tools and killing them. Also, samples of Ploutus showed that the Trojan is using a better .NET...

Posted on January 18, 2017 in Trojans

‘0-800-090-3853’ Pop-Ups

The ‘0-800-090-3853’ dialog boxes in your browser may seem like security alerts from Microsoft, but they are not. The ‘0-800-090-3853’ warnings that refer to ‘Error # SL9DW61’ are phishing messages hosted on untrusted pages, and you should not perceive them as legitimate messages from the Microsoft Corp. The designers of the ‘0-800-090-3853’ pop-ups made an effort to fool users into thinking that they can contact help from Microsoft by calling the 0-800-090-3853 phone line. The number is not registered to a certified computer support agency, and you may want to avoid conversation with the staff on the 0-800-090-3853 phone line. As stated before, the ‘0-800-090-3853’ dialog boxes are generated on untrusted pages, which we have listed before and numbered more than two dozens....

Posted on January 18, 2017 in Adware

Balkan.ba

Balkan.ba is a news site tailored to suit an audience that speaks Serbian. Balkan.ba is dedicated to providing articles on business, lifestyle, sports, and entertainment to users in Serbia predominately. Balkan.ba has no version in English, but users across the globe reported being redirected to a page hosted on Balkan.ba. PC users that like to explore free software alternatives to shareware may install a browser plug-in that may redirect them to Balkan.ba/speshl/search.html that is a hidden page hosted on Balkan.ba. The plug-in is classified as a browser hijacker because it is reported to reroute users to Balkan.ba/speshl/search.html whenever they open a new tab or links on pages. The Balkan.ba/speshl/search browser hijacker may alter the Internet settings on browsers like Google Chrome, Internet Explorer, Opera, Mozilla Firefox and...

Posted on January 17, 2017 in Browser Hijackers

Havoc Ransomware

The Havoc Ransomware is a ransomware Trojan that carries out a typical attack of this nature. A bright violet ransom note characterizes the Havoc Ransomware’s. The Havoc Ransomware first appeared in January 2017, and there is little to differentiate the Havoc Ransomware from the numerous other ransomware Trojans that are active today. The Havoc Ransomware’s executable note is named ‘Havoc.exe’ and is commonly distributed using corrupted file attachments contained in spam email messages. The Havoc Ransomware, despite its unremarkable nature, is still capable of carrying out a harmful and effective encryption ransomware attack. In the Havoc Ransomware’s executable files’ file information section there is the message ‘Will bring the Havoc to your PC.’ Despite the scary language, however, the...

Posted on January 17, 2017 in Ransomware

VBRansom Ransomware

The VBRansom Ransomware is a ransomware Trojan that is used to extort computer users. The VBRansom Ransomware was first observed after an encryption Trojan project was uploaded online. According to the VBRansom Ransomware’s ransom note, the current version of the VBRansom Ransomware is its ‘Version 7,’ although it is unclear how true this may be. However, it is clear that the VBRansom Ransomware is still under development and there are aspects of the VBRansom Ransomware that are still unfinished. Analysis of the executable file linked to the VBRansom Ransomware makes it apparent that the creator of the VBRansom Ransomware plans to release the VBRansom Ransomware as a fake version of Adobe Reader, to trick computer users into opening the corrupted executable file. Other file names that have been associated to the...

Posted on January 17, 2017 in Ransomware

iMedia Start

The iMedia Start, also seen as the iMedia Search, is an application that you can find at ienjoyapps.com/utilities/imedia/. The iMedia Start (iMedia Search) software by ienjoyapps.com is promoted as a useful addition to the browser of users that like to browse media on their online sessions more than anything. The iMedia Start supports a version for Google Chrome only. PC users that are interested in the iMedia Start (iMedia Search) may need to do a transition from another browser to benefit from the iMedia Start extension. The official page of the iMedia Start says that the extension can enable users to download media files on their drives easy and fast. The statement on ienjoyapps.com/utilities/imedia/ reads: ‘Get all the media you want directly to your hard drive using iMedia, the best free tool available! This professional...

Posted on January 17, 2017 in Possibly Unwanted Program

Extminooop Ads

If there are too many pop-up windows titled ‘Ads Powered by Extminooop’ on your screen, there is a chance you are infected with the Extminooop adware. The Extminooop adware is a program that is designed to flood the user’s desktop with marketing materials from promoters and advertisers. The Extminooop adware may be bundled with free browser extensions and media players to reach a greater number of users. The Extminooop adware may alter the way your browser works and behaves. For example, the Extminooop adware might change the layout of your new tab page and generate a list of promotions whenever you open a new tab. The Extminooop adware may add parameters to the shortcut for Google Chrome, Internet Explore, Edge and Mozilla Firefox. The parameters set by the Extminooop adware may cause redirects to suspicious pages...

Posted on January 16, 2017 in Adware

‘Your Connection Is Not Safe’ Pop-Ups

The ‘Your Connection Is Not Safe’ alerts in your browser may make you think that a third-party is trying to collect data on your PC. The ‘Your Connection Is Not Safe’ alerts are styled after the ‘Your Connection Is Not Safe’ notifications by Google Safebrowsing and many users may consider calling the phone line listed on their screen. However, the ‘Your Connection Is Not Safe’ messages are phishing messages that may be presented on your display by a browser hijacker. The browser hijacker associated with the ‘Your Connection Is Not Safe’ pop-ups may run as an extension, add-on and a Browser Helper Object depending on your browser of choice. You may have installed a fake browser plug-in that can redirect you to the ‘Your Connection Is Not Safe’ messages whenever you...

Posted on January 16, 2017 in Adware

LambdaLocker Ransomware

The LambdaLocker Ransomware is a ransomware Trojan that was uncovered in January 2017. The LambdaLocker Ransomware will use a combination of the AES-256 and SHA-256 encryption to make the victim’s files inaccessible. The files encrypted using the LambdaLocker Ransomware will be identified by the file extension ‘.lambda_l0cked.’ The LambdaLocker Ransomware then drops a ransom note in the form of an HTML file named ‘READ_IT.hTml’ on the victim’s Desktop. The LambdaLocker Ransomware’s ransom note delivers a message that is both in English and Chinese. This makes it likely that the LambdaLocker Ransomware infection is designed to target computer users in China. According to the LambdaLocker Ransomware’s ransom note, the victim’s must pay 0.5 BitCoin (approximately $450 USD) to...

Posted on January 16, 2017 in Ransomware

HakunaMatata Ransomware

The HakunaMatata Ransomware is a ransomware Trojan that is used to take the computer users’ files hostage and then demand the payment of a large ransom in exchange for their recovery. The HakunaMatata Ransomware is similar to countless other ransomware Trojans that are active in the wild currently. PC security researchers advise computer users to take preventive steps to ensure that their files are well protected from these attacks. Some important steps to take include installing a reliable security program that is fully up-to-date and having backup copies of all files on an external memory device or the cloud. The files infected by the HakunaMatata Ransomware will be marked with the file extension ‘.HakunaMatata,’ a philosophy that became popular in Walt Disney’s ‘The Lion King’ and its...

Posted on January 16, 2017 in Ransomware

CryptoSweetTooth Ransomware

The CryptoSweetTooth Ransomware is a ransomware Trojan that is used to force computer users to pay large sums of money. The CryptoSweetTooth Ransomware is identical to various other ransomware Trojans that are active in the wild and belongs to a large family of ransomware Trojans based on HiddenTear, an open source ransomware engine project that is the basis for a large number of encryption ransomware Trojans released in 2016 and 2017. The CryptoSweetTooth Ransomware may be distributed via corrupted email attachments, in the form of corrupted documents attached to spam email messages that use some social engineering tactic. The CryptoSweetTooth Ransomware uses exploits involving macros and JavaScript to infect the victims’ computers. The current version of the CryptoSweetTooth Ransomware seems only to exist in a Spanish...

Posted on January 16, 2017 in Ransomware

Kaandsona Ransomware

The Kaandsona Ransomware is an encryption Trojan that was discovered on January 16th, 2017 when users reported strange files with the ‘.kencf’ extension. The Kaandsona Ransomware may be referred to as the RansomTroll Ransomware on some cyber security blogs considering the logo of the Trojan is a green troll glancing at a laptop. There are security experts suspecting that the Kaandsona Ransomware is developed in Estonia considering that the name can be pronounced as ‘Käändsõna’ in Estonian, but there is no evidence to support a thesis for the origin of the Kaandsona Ransomware. Trojans such as the Kaandsona Ransomware are developed in a ‘clean environment’ that is a virtual PC that has limited access to the Internet and serves as a proxy. When the Kaandsona Ransomware is packed, it undergoes a...

Posted on January 16, 2017 in Ransomware

Adobe Issues Emergency Update to Flash Due to Cerber Ransomware Attack

Ransomware has been a major nuisance in the computer security community in the recent years making history has one of the most dangerous types of malware. Ransomware has propagated to the point that Adobe is having to release an emergency update to its Flash application due to a security flaw that is being exploited to deliver ransomware to Windows PCs. If you are not all familiar with ransomware, it is wise to know that such threats will infect your system usually from a malicious spam email attachment where it will then load and encrypt several files on your computer. From there, ransomware is known to display a notification demanding payment from $200 to $1,000 to obtain a decryption key, which is claimed to decrypt and restore all encrypted files so they can then be accessible again. In the recent months, ransomware has evolved...

Posted on January 13, 2017 in Computer Security
1 2 3 4 5 6 7 8 9 10 11 1,118