Zimbra Ransomware

The Zimbra Ransomware is a specialized Encryption Trojan that is designed to compromise the Zimbra enterprise collaboration software and encrypt all files stored in the Zimbra email storage. The Zimbra cryptomalware runs as a Python script that is easily modified and can load modules from remote servers. Security researchers suspect that the Zimbra cryptomalware is introduced into the Zimbra framework via a compromised server. The Zimbra Ransomware is similar to FessLeak and PowerWare . These threats do not require a psychical body to run and work as in-memory processes. Moreover, the Zimbra Ransomware may damage major OS platforms including Linux, Windows, and Mac. The Zimbra Ransomware uses the RSA and AES encryption methods to encode all files that reside within the Zimbra email repository. The Zimbra Ransomware can alter the header of any file regardless of its size and make...

Posted on June 23, 2016 in Ransomware

Carbonite Online Backup Service Resets User Passwords Due to Cyber Attack

Online backup services are a sure bet for safeguarding your computer's data with a proper backup, whether it is a Mac or Windows PC. Unfortunately, hackers are taking aim at many online services, one being the Carbonite online backup service, which decided to reset all user passwords due to a large scale ATO (account takeover) attack. Just this week, the GoToMyPC service suffered a cyber attack that forced remote access service to have users reset their passwords. Virtually identical to the ATO attack that took place at GoToMyPC, Carbonite has succumbed to the same fate that resulted in the company taking precautions to prevent infiltration of user accounts by forcing everyone to reset their login passwords. Brute-force attacks, or cyber attacks that attempt to log into multiple user accounts through previously compromising other related online account login credentials, are...

Posted on June 22, 2016 in Computer Security

FunMediaTab Ads

The FunMediaTab browser extension by Imali Media Ltd. is promoted on Funmediatab.com as been a better alternative to software like Kodi, Plex and Emby. The FunMediaTab browser extension may attract users that seek a lightweight application that does not require extensive configuration by the user to work properly. The FunMediaTab software will integrate into your browser and change your new tab page design and search provider settings. The FunMediaTab extension might change your search aggregator to Search.Funmediatab.com and redirect you to a custom version of Yahoo that is laid with many ads and sponsored links. You might experience pop-up windows that are titled 'Presented by FunMediaTab' and you may be welcomed to buy products from less-reputable sites while shopping on Amazon and Best Buy. Security experts reveal that the FunMediaTab browser extension is adware and is a modified...

Posted on June 22, 2016 in Adware

Liodsefboxons.ru

The Liodsefboxons.ru domain is associated with a browser hijacking application that may have arrived on your system as a browser add-on, plug-in, Browser Helper Object and extension. The browser hijacker linked to Liodsefboxons.ru may travel in free software packages that include riskware like the Dynamic Pricer and the FastAgain PC Booster . Security analysts report that the Liodsefboxons.ru browser hijacker is designed to be compatible with the most used browsers and perform redirects via Trapfleiyb-mz.ru. The browser hijacker at hand connects to Liodsefboxons.ru, which acts as an access point and then loads Trapfleiyb-mz.ru that is a redirect-gateway to more than twenty sites and a dozen advertisers. The Liodsefboxons.ru browser hijacker may use information like your recently visited pages to determine what page to load and which promotions should be provided to your attention....

Posted on June 22, 2016 in Browser Hijackers

Kozy.Jozy Ransomware

Malware researchers report a surge in the development of ransomware that can delete the Shadow Volume Copies. Therefore, users need to be mindful of the Kozy.Jozy Ransomware. The playful name of the Kozy.Jozy malware is derived from the kozy.jozy@yahoo.com email provided to its victims for contact. The Kozy.Jozy Ransomware is an encryption Trojan that is similar to BitCryptor and CryptoDefense and can prevent data restoration via the Shadow Volume Service in Windows. Initial analysis suggests that the Kozy.Jozy Ransomware is a product of Russian-speaking developers, and it appears to target users that have IPs corresponding to countries where Russian is spoken. The Kozy.Jozy Trojan is deployed to users via links on forums, malvertising, and spam mail. That way the Kozy.Jozy Ransomware can be delivered to hundreds of thousands users as opposed to using a spam bot only. The...

Posted on June 22, 2016 in Ransomware

CryptoRoger Ransomware

Security investigators report that macro-enabled documents attached to spam email are used to deploy the CryptoRoger Encryption Trojan among users that work with invoices, CVs, and reports on a daily basis. The coders behind the CryptoRoger Ransomware seem to employ social engineering and target users that need to process many documents from unknown senders to increase their chances of compromising PCs successfully. Unfortunately, hospitals and NGOs that may fall victim to the CryptoRoger Ransomware can deny access to data. The CryptoRoger Trojan might use JavaScript to input commands directly into Windows and hide its presence. The CryptoRoger Trojan is designed to begin encrypting files on next system reboot to make it harder for security experts to determine the infection vector. Additionally, the CryptoRoger Trojan can request instructions from its operators on how to proceed with...

Posted on June 22, 2016 in Ransomware

Negozl Ransomware

The NegozI Ransomware is an Encoding Trojan that is used to lock the data of users and direct them to send 5 Bitcoins to a predefined wallet address. For your information, 5 Bitcoins are equal to $3,300 which is a small fortune for most users and small businesses. The NegozI Ransomware is a severe cyber threat to individual users and poorly configured networks, but it is not on the same level as the KimcilWare and the Dr Jimbo Ransomware . It appears that the malware actors behind the NegozI Ransomware cannot limit their greed and might use spam bots, malicious links, compromised chat accounts, and fake software updates to spread the NegozI Trojan among as many users as they can. Apart from the absurd ransom demand and strange name, the NegozI Ransomware is nothing special under the hood. The NegozI Ransomware uses one of the preferred encryption algorithms that is AES-256 to...

Posted on June 22, 2016 in Ransomware

Nemucod Joins Growing List of Ransomware Using JavaScript to Infect Computers

The enormity of issues that have been presented to the computer security world due to the infiltration of ransomware is massive. Ransomware has taken the ranks as the most prolific type of malware we have encountered in the last couple of years. During the natural progression of malware, ransomware authors are evolving their threats and utilizing JavaScript and PHP to infect computers more effectively. The latest ransomware to employ such a method is Nemucod , which is a variant that once delivered the Nemucod dropper that can download additional malware onto an infected computer. We recently reported on a case of RAA Ransomware using JavaScript to disguise itself so it may secretly infect computers and initialize its actions of encrypting data. Moreover, there have been other threats that use JavaScript for their infection processes, such as Ransom32 and JS.Crypto...

Posted on June 21, 2016 in Computer Security

Light Manager

The Light Manager program by SecuriDEX LLC. is advertised on Lightmanager.online as a tool that can extend the functionality of software like AMD Vision Engine Control Center, Intel HD Graphics Control Panel and NVIDIA Control Panel. The Light Manager program may allow users to make finer adjustments to the lighting of their screen and improve your reading and movie experience significantly. The Light Manager software may manifest on your desktop as a widget in the bottom right corner that is accessible via an icon in the tray area and a custom keyboard shortcut. The Light Manager program may introduce several runtime-DLLs into your OS and add a new service in the Services.msc module. The Light Manager application is not whitelisted by graphics card manufacturers and may cause programs to display errors. Computer users should be prepared for driver error messages and bad video...

Posted on June 21, 2016 in Possibly Unwanted Program

FunCyberTab Ads

The FunCyberTab browser plug-in that you can find at Funcybertab.com is promoted via freeware bundles as a layer of security that you should install considering today's cyber environment. The FunCyberTab plug-in offers functionality that is similar to MySafeTab and Shield Plus Privacy Protector . The FunCyberTab browser plug-in may change several aspects of your online experience including your new tab, search provider and homepage settings. The FunCyberTab plug-in is programmed to make modifications to your browser and divert Internet traffic to Funcybertabsearch.com. The FunCyberTab plug-in may change your default search aggregator to Search.Funcybertab.com, which is a customized version of Yahoo. Your new homepage by FunCyberTab may have links to AliExpress, Amazon, DealExtreme and eBay, which are designed to load promotions from affiliated merchants. Security authorities reveal...

Posted on June 21, 2016 in Adware

Searchprivacy.co

The Searchprivacy.co domain is the official search engine that comes with the SearchPrivacy browser extension. The SearchPrivacy browser extension may arrive on your PC as a tool inside a free software package. SearchPrivacy is promoted as an extension that can deliver a secure connection to the Internet and incognito search capability to your normal browser mode. Web surfers that install the SearchPrivacy extension will not need to go into the incognito/private browsing mode of their browser. At Searchprivacy.co users are promised to receive upgrades that include no ad re-targeting, hidden search queries, no tracking cookies, and no search history logging. The SearchPrvacy software is not open source, and its developers need to make money to pay for the server costs at least. You may want to read the privacy policy of the SearchPrivacy software and read section four that discusses...

Posted on June 21, 2016 in Browser Hijackers

Maintenance Software Ads

The Maintenance Software is not a program related to the Microsoft Corp. or any legitimate software developer. The Maintenance Software may be listed in your Plug-ins and Extension Manager, and you may experience pop-up ads and notice an unusual number of banners displayed on your favorite site. The Maintenance Software is flagged as adware that is a member of the EoRezo family of adware. The name of the 'Maintenance Software' adware is generalized to fool users into thinking that it is an updater module and a safe component to their Internet browser. However, the 'Maintenance Software' adware is not a safe program, and it may send data like your Internet history, bookmark collections, software and hardware configuration to third parties. The 'Maintenance Software' adware may have arrived on your computer bundled with freeware applications like CinemaXPro and Desktop Dock ....

Posted on June 21, 2016 in Adware

Dr Jimbo Ransomware

The Dr Jimbo Ransomware is a ransomware Trojan that con artists use to force computer users to pay large amounts of money to recover their files. The Dr Jimbo Ransomware and similar threats encrypt the files on a computer, taking the victim's data hostage essentially. The Dr Jimbo Ransomware delivers a ransom note that can vary. A common ransom message associated with the Dr Jimbo Ransomware reads as follows: Hello! Have news for the owner of this server! All your data was crypted but no worries, we have decrypter for any your file. But you must have some Bitcoins and be ready for payment. For more info you can write to next email: dr.jimbo@bk.ru Subject - your server IP ( so we can see what you real) Message body - any your text (you can attach your file here) We can guarantee what we can decrypt any your file, if you not sure then send any crypted file(just one!) then...

Posted on June 21, 2016 in Ransomware

DynamiteArcade Ads

PC users that live by the motto 'work hard - play hard' may be attracted to install the DynamiteArcade gaming platform. The DynamiteArcade software requires limited space on your hard drive and is designed to integrate with your browser to deliver entertaining content from Dynamitearcade.com. You can install the DynamiteArcade software from Dynamitearcade.com, or you may find it bundled with free software such as AnonymizerGadget and CinemaProGo . The DynamiteArcade program may need users to provide administrative privileges during its installation process. Also, the DynamiteArcade program may modify your new tab page settings and uninstall extensions that interfere with its operations. You should note that the DynamiteArcade application is classified as an adware that may provide you with links to games like Sushi Matching and cover your desktop with pop-ups ads. The...

Posted on June 20, 2016 in Adware

Trotux.com

The Trotux.com page is the home for the Trotux browser add-on that may be promoted to users as a search enhancer. The Trotux add-on may promise users security and smart suggestions, but you should be made aware that the Trotux.com domain may not be trustworthy. Trotux.com hosts an unreliable search engine that functions as a redirect-gateway to Google. Web surfers may have problems searching for images and videos on Trotux.com because the Trotux.com does not provide a search functionality on its own. The Trotux add-on is recognized as a browser hijacker that is designed to divert Web traffic from users to Trotux.com and affiliated pages. The Trotux browser hijacker may edit your DNS settings and proxy setup to prevent direct access to services by Google, Bing and Yahoo. Instead, users are rerouted to Trotux.com and would have to use the search field on Trotux.com to access their...

Posted on June 20, 2016 in Browser Hijackers
1 2 3 4 5 6 7 8 9 10 11 12 1,065