Classifieds Easy (Search.classifiedseasy.com)

Classifieds Easy is marketed as a browser extension that can enhance your access to deals, coupons, and the discounts available in your vicinity and online stores you like. Classifieds Easy is available for installation at Classifiedseasy.com and claims to offer carefully curated resources from Craigslist.org and Backpage.com. Web surfers that like to browse for deals, job opportunities and giveaways may be interested in installing the Classifieds Easy browser extension. Classifieds Easy may support Google Chrome, Internet Explorer and Mozilla Firefox. Computer users that use an Internet client that is built on the Chromium and Mozilla projects may be able to run the Classifieds Easy extension as well. If you decide to install Classifieds Easy, you should note that it may make several alterations to your online experience....

Posted on January 12, 2017 in Browser Hijackers

Search.ydserp.com

The Search.ydserp.com site is presented to users as a search service and a potential replacement for the default new tab page in your browser. Web Bar Media manages Search.ydserp.com that you may know for the Web Bar adware. Computer users that visit Search.ydserp.com may be welcomed to install Web Bar and other tools developed by Web Bar Media. Search.ydserp.com features links to services like Amazon, YouTube, Flickr, Gmail, and Facebook that may be useful to some users. PC users that handle freeware bundles may be invited to install a browser extension associated with Search.ydserp.com. The Search.ydserp.com add-on may support Google Chrome, Internet Explorer, Edge and Mozilla Firefox. However, the Search.ydserp.com site is mentioned in reports from users regarding browser hijacking. Given the history of Web Bar Media with...

Posted on January 12, 2017 in Browser Hijackers

Package Track

The Package Track software by Polarity Technologies Ltd. is promoted at Searchpackaget.com as a tool that helps users track parcels and packages sent via services like USPS, FedEx UPS and CanadaPost. The Package Track software works as a browser extension and relies on integration with Google Chrome, Internet Explorer, Safari and Mozilla Firefox. The Package Track extension depends on Search.searchpackaget.com to provide easy access to package tracking technologies. Package Track does not come with a standalone program window and may add an icon to the main user interface, which allows users to load Search.searchpackaget.com quickly. The Package Track extension is designed to make alterations in the browser’s behavior to allow the user to benefit from the full suite of features at Search.searchpackaget.com. The changes may...

Posted on January 12, 2017 in Possibly Unwanted Program

Growing Malware Attacks and Vulnerabilities Making the Internet a Risky Place

The Internet is a vast world mostly made up of ones and zeros. While the Internet harbors the knowledge of the world, it also perpetuates malicious intent from those who choose to take the shortcuts in life and cheat the unsuspecting out of their hard earned money through the use of malware. As a massive two-sided spectrum, the Internet is an essential part of life as we know it in our modernized world today. In the recent years, though, malware has taken on a new life form to be more aggressive and utilize sneaky techniques to infiltrate computers from around the world. Fundamentally, the Internet is a risky place, where about 46% of the top one million websites are considered risky, according to a recent “ State of the Web 2016 ” study conducted by Menlo Security. The spoils of war are imminent on the Internet when it...

Posted on January 11, 2017 in Computer Security

News-cloud.net

News-cloud.net is a Russian site that is dedicated to news on technology, social events, cars and useful tips. The site was reported by users who were redirected to news articles, and their new tab page feature links to News-cloud.net. News-cloud.net uses the support of advertisers to stay afloat and may work with freeware developers to popularize content on the site. Computer users that like to use free programs should not skip the ‘Advanced’ option and make sure they are installing the tools they need from a software bundle. Partners of News-cloud.net may enable browser add-ons and media players to make modifications to the Internet preferences of to provide content from News-cloud.net. Some users may not welcome these modifications. News-cloud.net was mentioned on several occasions of browser hijacking. Researchers...

Posted on January 11, 2017 in Browser Hijackers

Convertmypdf.co

Web surfers that would like to save a page for later reading as a PDF file may be interested in what Convertmypdf.co has to offer. Convertmypdf.co offers Web surfers help with saving pages on the Internet as PDF documents that can be opened with any decent PDF viewer. Computer users that run the Internet Explorer, Google Chrome, and Mozilla Firefox may be welcomed to click the ‘Convert Now’ button at Convertmypdf.co and proced with the installation of a browser extension. The app hosted at Convertmypdf.co may appear differently depending on your default Internet client. For Firefox users it is listed as ‘ConvertMyPdf By convertmypdf.co.’ In Internet Explorer, the app features the name ‘WindowsFormsApplication1,’ which most users are unlikely to associate with Convertmypdf.co. Web surfers that...

Posted on January 11, 2017 in Browser Hijackers

TSS GMusicPlayer

The prefix TSS before GMusicPlayer stands for ‘Tech Support Scam’ and you should not install the GMusicPlayer software. The GMusicPlayer program should not be mistaken for the legitimate music player GOM Audio from Gretech Corp. TSS GMusicPlayer is a security detection that refers to a fake media player that may be used to generate misleading security notifications on the compromised PC. The notifications associated with TSS GMusicPlayer may appear as pop-up windows in the browser, banners on your favorite pages and message boxes on your desktop. TSS GMusicPlayer is part of a small but expanding family of software that is designed to appear as a legitimate service while phishing messages are shown on your screen. Software that behaves like TSS GMusicPlayer is listed on our database and includes apps like Desk 365 and...

Posted on January 11, 2017 in Possibly Unwanted Program

Evil Ransomware

The Evil Ransomware is an encryption ransomware Trojan that is written in JavaScript. The Evil Ransomware encrypts its victims’ files, adding the extension ‘fie0locked’ to each affected file. Once the victim’s files are encrypted and no longer accessible, the Evil Ransomware displays a ransom note, dropping it on the affected computer’s Desktop. The Evil Ransomware is designed to take its victims’ files hostage until a ransom is paid. There are several ways in which threats like the Evil Ransomware may be distributed. One of the most common ways of distributing the Evil Ransomware is through corrupted email attachments distributed in spam email campaigns. The Evil Ransomware has been linked to a JavaScript exploit that is used to install this threat on the victim’s computer. The Evil...

Posted on January 11, 2017 in Ransomware

Ramsomeer Ransomware

The Ramsomeer Ransomware is part of a large family of encryption ransomware Trojans. The Ramsomeer Ransomware is designed to encrypt the victim’s files to demand a ransom. As with most threats of this type, the best measure to deal with the Ramsomeer Ransomware is to take preventive actions such as using a reliable security application and having backups of all files on an external memory device. The Ramsomeer Ransomware represents a danger to the computer users’ data, and steps should be taken to prevent the Ramsomeer Ransomware infections, as well as other ransomware Trojan attacks. The Ramsomeer Ransomware seems to have been created by Turkish hackers or target computer users in Turkey. This is because the Ramsomeer Ransomware’s ransom note is delivered in both English and Turkish. There is still not much known...

Posted on January 11, 2017 in Ransomware

Spora Ransomware

The Spora Ransomware is a sophisticated ransomware Trojan that has an advanced payment site and the capacity to carry out its attacks online. The Spora Ransomware first appeared in January 2017 and caught the attention of PC security researchers immediately, because of its ability to carry out attacks online, a strong encryption engine, and a sophisticated ransomware payment site that is far more advanced than payment sites associated with other ransomware Trojans observed previously. The Spora Ransomware may be distributed using spam email messages that trick computer users into believing that the email contains an invoice attachment. The attachment is a ZIP archive file that contains HTA files inside. These HTA files use a double extension, which causes computer users to believe that the file is a PDF or a DOC file. Opening this...

Posted on January 11, 2017 in Ransomware

How to Know If Your Computer is Vulnerable to Ransomware?

In the past few years, the computer security world has been turned upside down with the emergence of ransomware, which has been among the most dangerous and costly malware in existence. Not only has ransomware cost victimized computer users millions of dollars , but the stubborn nature of such threats don’t leave victims with many options. The question arises: How do you know if your computer is vulnerable to ransomware? Ransomware , as many of you may know, is a form of aggressive malware that utilizes ransom techniques to demand money from victimized computer users. The process of ransomware extorting money from computer users starts with its main ability to encrypt files and then claim that the files can be decrypted for a substantial payment in most circumstances. By encrypting files, ransomware is able to lock or limit...

Posted on January 10, 2017 in Computer Security

Scanascan.xyz

The Scanascan.xyz site is not trusted by security vendors because it may be used to promote suspicious technical support services. The uploaded to Scanascan.xyz is designed to resemble the security alert associated with the Google Safe Browsing that is shown when users open an insecure page. However, Scanascan.xyz offers a screenshot of the legitimate alert and provides misleading information. The messages aim to convince users that they might have a harmful Trojan on their PCs that is causing severe system errors. Additionally, the code on Scanascan.xyz features ‘loops.’ These ‘loops’ are JavaScript code, which makes browsers like Google Chrome, Opera, Mozilla Firefox, Edge, and Internet Explorer load Scanascan.xyz continuously. Thus, users may be unable to switch between tabs and close the browser. Web surfers...

Posted on January 10, 2017 in Adware

SkyName Ransomware

The SkyName Ransomware is a ransomware Trojan that is being used to attack computer users. Like most encryption ransomware Trojans, the SkyName Ransomware is designed to encrypt victims’ files to demand the payment of a fee in exchange for the decryption key. Encryption ransomware Trojans like the SkyName Ransomware have increased in popularity in the last few years because the attack they carry out can be quite devastating. You can prevent the SkyName Ransomware attacks by having a strong anti-malware program and backups of all files to minimize the extent of the damage in the event of an infection. Reports of attacks involving the SkyName Ransomware first surfaced on January 10, 2017. PC security researchers observed that samples of the SkyName Ransomware were submitted to online anti-virus scanners. This is a common way in...

Posted on January 10, 2017 in Ransomware

iLock Ransomware

PC security analysts have observed attacks involving the iLock Ransomware in January 2017. The first versions of the iLock Ransomware were observed in March 2016 carrying attacks in the wild, often with variants possessing different names. Earlier variants of the iLock Ransomware seemed to target computer users in Russian-speaking locations only. This is the opposite of many ransomware Trojans that are designed to avoid attacking computers where the Russian language is set as the default system language. This newer version of the iLock Ransomware, released in January 2017, includes English and Russian versions of the ransom note, named ‘WARNING OPEN-ME.txt’ and ‘ВНИМАНИЕ_ОТКРОЙТЕ-МЕНЯ.txt.’ The iLock Ransomware uses a strong encryption method that prevents computer users from recovering their files after they...

Posted on January 10, 2017 in Ransomware

Nemesis Ransomware

The Nemesis Ransomware is an encryption ransomware Trojan that uses a strong encryption method to prevent computer users from accessing their files. The Nemesis Ransomware is just one of the countless ransomware Trojans that use email addresses in the @india.com domain. Like other ransomware Trojans, the Nemesis Ransomware is designed to encrypt the victim’s files and then demand the payment of a ransom in exchange for the decryption key that is necessary to recover the affected files. Countless variants of the Nemesis Ransomware were released in the last year. One of the reasons why threats like the Nemesis Ransomware are so successful in their attacks is the use of a combination of AES and RSA encryption to make the victim’s files completely inaccessible. Even if the Nemesis Ransomware is removed from the infected...

Posted on January 10, 2017 in Ransomware