‘Error DW6VB6’ Pop-Ups

Computer users have reported the ‘Error DW6VB6’ pop-ups on their computer. These pop-ups disrupt normal activity on the affected computer, inconveniencing computer users and making it difficult to use the affected computer. The ‘Error DW6VB6’ pop-ups are associated with a well-known tactic that is used to take money from inexperienced computer users. If the ‘Error DW6VB6’ pop-ups are appearing on your computer, it is important to ignore all of their content and treat them as part of a hoax. Steps should be taken to remove the underlying cause of the ‘Error DW6VB6’ pop-ups or avoid visiting websites where the ‘Error DW6VB6’ pop-ups or similar types of messages are displayed. The ‘Error DW6VB6′ pop-ups may appear on the computer users’ Web browser when they...

Posted on December 22, 2016 in Adware

Am-15.net

The Am-15.net site that is registered to the 208.91.196.145 IP address was mentioned in user reports related to browser hijacking. Our researchers found out that the site is used to host advertisement banners and urge users to buy software, subscribe to services and seek help from suspicious computer support agencies. A quick look into the 208.91.196.145 IP address of Am-15.net shows that the site is one of many portals dedicated to advertisements and shopping suggestions. It is safe to assume that third parties might use adware and browser hijacking software to reroute users to Am-15.net and affiliated pages. The Am-15.net browser hijacker may arrive on the computer via software bundling and make changes to Internet clients like Google Chrome, Opera, Mozilla Firefox and Internet Explorer. New settings may be enforced by rogue...

Posted on December 22, 2016 in Browser Hijackers

PadLock Screen Locker

The Padlock Screen Locker is a low-level threat that is used to force computer users to spend their hard earned money. Essentially, the Padlock Screen Locker locks computer users out of their computers. The Padlock Screen Locker displays a full-screen message that contains the image of a padlock. Computer users cannot bypass the Padlock Screen Locker lock screen, which takes the victim’s computer hostage. These threats were among the most common types of threats some years ago, but the last couple of years, leading into 2016, have seen the rise of more sophisticated ransomware Trojans, which take the victim’s files hostage by encrypting them with a strong encryption Trojan. Although it is possible that the Padlock Screen Locker may be improved to include an encryption functionality, as it stands currently, it is a low-level...

Posted on December 22, 2016 in Ransomware

ProposalCrypt Ransomware

The ProposalCrypt Ransomware is a ransomware Trojan that is used to force computer users to pay a fee to recover their files, which the ProposalCrypt Ransomware takes hostage. The ProposalCrypt Ransomware carries out a typical ransomware attack, encrypting the victims’ files to take them hostage. Victims will not be able to access the encrypted files and will need to pay the ProposalCrypt Ransomware ransom to obtain the necessary decryption utility or code. PC security researchers consider threats like the ProposalCrypt Ransomware as real dangers to the computer users’ data and money. Therefore, by taking preemptive steps such as backing up all data and using a reliable security program that is fully up-to-date you can protect your data from encryption ransomware Trojans like the ProposalCrypt Ransomware. The...

Posted on December 22, 2016 in Ransomware

Free-Freedom Ransomware

The Free-Freedom Ransomware’s demands are somewhat unique, making computer security researchers question the real motive behind the Free-Freedom Ransomware infection. The authors of the Free-Freedom Ransomware use a payment website to collect $30 USD worth of Gift Card codes for the Google Play Store. This payment website is also used to collect information about the victims, including their phone number, address and email. This data could potentially be used to bypass two-factor security on certain websites (such as banking portals), since the people responsible for the Free-Freedom Ransomware may have had access to the victim’s stored passwords. The Free-Freedom Ransomware is a threat infection that can have numerous unwanted results for victims of the attack. PC security researchers are concerned that the...

Posted on December 22, 2016 in Ransomware

‘0800-090-3829’ Pop-Ups

The ‘0800-090-3829’ alerts in your browser are not legitimate security notifications and should be ignored. However, that may be difficult given the fact the origin of the ‘0800-090-3829’ pop-ups might be a browser hijacker on your computer. Security researchers alert that corrupted advertisements and browser hijacking software are put to “good use” by con artists that aim to fool users and receive payment for fake services. Uncertified technical support agents operate the 0800-090-3829 phone line which might be promoted to users via ads generated by adware and browser hijacking software that reroutes users to insecure pages. In both cases, it is not a good idea to call 0800-090-3829 and ask for help. We have received reports that the ‘0800-090-3829’ pop-up alerts are hosted on pages...

Posted on December 21, 2016 in Browser Hijackers

fixfiles@protonmail.ch Ransomware

The ‘fixfiles@protonmail.ch’ Ransomware is a variant of Fantom Ransomware which is named after the contact details left inside ‘RESTORE-FILES! .hta’ which serves as the ransom notification. Security analysts reveal that the ‘fixfiles@protonmail.ch’ Ransomware features new obfuscation layers and its encryption procedure was modified. These changes are intended to hinder detection by AV software and allow the Trojan infect many users before researchers catch onto it. Slight modifications in the code, coupled with customized obfuscation techniques and encryption engine allows threats like the ‘fixfiles@protonmail.ch’ Ransomware and the DXXD Ransomware to remain persistent throughout 2016. ESG experts note that malicious documents attached to spam emails continue to be the preferred...

Posted on December 21, 2016 in Ransomware

‘.braincrypt File Extension’ Ransomware

The ‘.braincrypt File Extension’ Ransomware is one of the first encryption Trojans written entirely in Google’s Go programming language. Analysts note that the first crypto malware to use Google’s Go programming language was Trojan.Encoder.6491 and many experts suspect that we might see a shift in how ransomware is written in the near future. Samples of ‘.braincrypt File Extension’ Ransomware show that the Trojan utilizes multi-core processing and the AES-256 encryption algorithm to facilitate its operations. As you may guess, the ‘.braincrypt File Extension’ Ransomware is named after the suffix it appends to encrypted data. For example, ‘Sabaton – Ghost division.mp3’ becomes ‘Sabaton – Ghost Division.mp3.braincrypt’ and you would be unable to play...

Posted on December 21, 2016 in Ransomware

EnkripsiPC Ransomware

The EnkripsiPC Ransomware was reported on forums dedicated to cyber security, and it is an encryption Trojan that attacks users in Indonesia and neighboring countries in Southeast Asia. The EnkripsiPC Ransomware may be the work of God-fearing Muslims judging by the message left by the malware on infected computers. Islam is adhered by 40% of the population in Southeast Asia, and the EnkripsiPC Ransomware relates to its victims using traditional Arabic greetings while asking users to pay for the decryption key. The EnkripsiPC Ransomware is released to users via corrupted documents attached to spam emails and uses several emails to facilitate payments. Researchers add that the EnkripsiPC Ransomware might use the code name IDRANSOMv3 which was spotted in its code. The developer of the IDRANSOMv3 (EnkripsiPC) Ransomware equipped the...

Posted on December 21, 2016 in Ransomware

Report: 2016 Holiday Malware Infection Rates Remain at Double the Normal Rate

The 2016 holiday shopping season started with a dramatic spike in malware infections, and that spike has not let up. ESG reports that as of December 19th, malware infections on its customers’ computers are 99.23% higher than the average number of infections in the month prior to the holiday shopping season starting on Black Friday. The infection rate is tracking much higher than the infection rate in 2015 , which saw an 84% spike. In 2014 the spike was 42%. “We believe the continued spike in malware is due in large part to increased online activity by holiday shoppers, and increased efforts on the part of malware makers to take advantage of those shoppers,” said ESG spokesperson Ryan Gerding. The busiest day so far for malware infections was not on Cyber Monday. Instead, it was Wednesday, December 14th....

Posted on December 20, 2016 in Computer Security

‘1-844-257-9402’ Pop-Ups

The appearance of ‘1-844-257-9402’ Pop-Ups in your web browser may often be accompanied by additional minor issues such as having an impossible to close the tab which informs you that your computer has been blocked due to suspicious activity. ‘1-844-257-9402’ Pop-Ups are not the only pop-ups to use this misleading message, but they are the ones that you may encounter if you somehow end up at Helpline-9.xyz, a low-quality page that scammers use to host malicious pop-ups that aim to promote fake technical support services. The ‘1-844-257-9402’ Pop-Ups use special JavaScript code that forces the user’s web browser to use full-screen mode constantly, therefore making it very difficult for inexperienced computer users to get rid of these pop-ups without restarting their entire browser or computer....

Posted on December 20, 2016 in Browser Hijackers

‘1-844-890-4980’ Pop-Ups

‘1-844-890-4980’ Pop-Ups include fake information regarding the state of your computer, and they may attempt to trick you into calling certified computer technicians who’ll help you fix any present Windows issues. However, we assure you that the ‘1-844-890-4980’ Pop-Ups are not related to a reputable provider of technical support services, and the phone number they refer to is likely to be used by a team of scammers who attempt to steal money from computer users by convincing them to pay hundreds of dollars for low-quality technical support services or software. In order to gain the user’s attention and trust, the scammers may fill the ‘1-844-890-4980’ Pop-Ups with false information regarding malware infections, corrupted Windows files, or other computer issues that sound as if they must...

Posted on December 20, 2016 in Browser Hijackers

‘rescuers@india.com’ Ransomware

The ‘rescuers@india.com’ Ransomware is a ransomware Trojan that is a variant of the Globe Ransomware family. The differences between the ‘rescuers@india.com’ Ransomware and other threats in this family of ransomware are superficial, mainly consisting in slight alterations to the layout and the wording of the ransom note and the way the ‘rescuers@india.com’ Ransomware identifies the files that have been encrypted during the attack. Fortunately, the Globe Ransomware family of ransomware Trojans has been decoded by PC security researchers. Computer users that have been a victim of the the ‘rescuers@india.com’ Ransomware attack can often recover their files by using a decryption program released by malware researchers. The main way in which the ‘rescuers@india.com’...

Posted on December 20, 2016 in Ransomware

‘amagnus@india.com’ Ransomware

The ‘amagnus@india.com’ Ransomware is an encryption ransomware Trojan that is used to force computer users to pay large amounts of money to recover access to their files. Like most encryption ransomware Trojans, the ‘amagnus@india.com’ Ransomware is designed to block access to the files on the infected computer through the use of a strong encryption algorithm that it uses to encrypt the files. Once the files have been encrypted by the ‘amagnus@india.com’ Ransomware, they are no longer accessible. Even if the ‘amagnus@india.com’ Ransomware infection is removed, the files that were compromised during the ‘amagnus@india.com’ Ransomware attack will remain inaccessible. This is what makes encryption ransomware attacks so effective, and the reason why they have become one of the...

Posted on December 20, 2016 in Ransomware

Izito.it

Izito.it is an Italian search engine that may appear in the web browsers of non-Italian users even though they may have never heard of this website before. This strange thing may happen because of browser hijackers – small pieces of software whose primary purpose is to modify a web browser’s configuration by setting the new tab page, home page, or search engine to a pre-defined website. In this case, the Izito.it browser hijacker does exactly what its name states – it hijacks the web browser’s configuration so that the user will be redirected to Izito.it whenever they perform a certain action. So what exactly awaits users who visit Izito.it? The good news is that this website is not marked as malicious by any antivirus software publisher, and there’s no information that it is associated with any suspicious or...

Posted on December 19, 2016 in Browser Hijackers
1 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 1,126