Marlboro Ransomware

A new ransomware family known as Marlboro Ransomware was reported recently. Fortunately, in less than 24 hours, malware researchers tracked down the Marlboro Ransomware infection, analyzed it, and released a decryption program. The Marlboro Ransomware was first observed on January 12, being spread through spam email messages. These messages include a corrupted Microsoft Word attachment that downloads and installs the Marlboro Ransomware on the victim’s computer. If your machine has been exposed to the Marlboro Ransomware, malware researchers recommend using the available decryption utility to restore the affected files after removing the Marlboro Ransomware completely with the help of a reliable security application. The Marlboro Ransomware exists in two versions currently, targeting 32-bit and 64-bit versions of the Windows...

Posted on January 13, 2017 in Ransomware

Hackers Turning Large Profits Selling Zero-Day Exploits to Attack Computers and Networks

Have you ever wondered where some hackers get the tools to attack and compromised other computers and networks over the Internet? Well, as it turns out, there is a massive market where hackers are turning large profits to sell off zero-day exploits, which are known as a vulnerability or a hole in software known to others. With the nearly endless vat of computers connected to the Internet, which all run some form of software that may have known security holes, hackers are inclined to take advantage of those zero-day vulnerabilities actively. Zero-day exploits have long been known to be a major profit area for hackers and there is a massive underground society devoted to marketing and selling off these zero-day exploit packages. All in all, hackers are motivated to earn hundreds of thousands of dollars in active campaigns to sell off...

Posted on January 12, 2017 in Computer Security

Search.tagadin.com

Search.tagadin.com is registered as a site dedicated to business and economy. However, Search.tagadin.com appears to host a search service and resemble Google.com in many ways. The Search.tagadin.com site features what is known as ‘doodles ‘ on Google.com, which is a 500×200 pixel image that may appear hand-drawn and is usually related to an important event during the day. The design of Search.tagadin.com has similarities with the layout of Google back from 2010 when we had a black bar at the top and quick links to video, news, and images. Search.tagadin.com is owned by Resoft Ltd. that you may know for the TappyTop browser and the Safe Finder extension that are classified as riskware. Also, Resoft Ltd. operates the Snap.do search portal that is associated with more than a few cases of browser hijacking....

Posted on January 12, 2017 in Browser Hijackers

MovieCorner (Search.moviecorner.com)

MovieCorner is advertised as a multi-platform software that can help users find the best movie for a night with their friends and family. MovieCorner is developed by Findinfo Ltd. with the aim to provide users around the world and all platforms with easy access to movies. MovieCorner can be incorporated to Internet Explorer, Safari, Google Chrome and Mozilla Firefox. The official site for MovieCorner is Search.moviecorner.com/movies where you can find a link to Search.moviecorner.com/movies/films/list-all that includes the list of titles available on MovieCorner. However, you may be surprised to find that all movies provided via MovieCorner were uploaded on the same date—September 6th, 2016. The movies at Search.moviecorner.com/movies/films/list-all date as far back as 1944 to 2008. The extensive library of movies you may be promised...

Posted on January 12, 2017 in Browser Hijackers

Classifieds Easy (Search.classifiedseasy.com)

Classifieds Easy is marketed as a browser extension that can enhance your access to deals, coupons, and the discounts available in your vicinity and online stores you like. Classifieds Easy is available for installation at Classifiedseasy.com and claims to offer carefully curated resources from Craigslist.org and Backpage.com. Web surfers that like to browse for deals, job opportunities and giveaways may be interested in installing the Classifieds Easy browser extension. Classifieds Easy may support Google Chrome, Internet Explorer and Mozilla Firefox. Computer users that use an Internet client that is built on the Chromium and Mozilla projects may be able to run the Classifieds Easy extension as well. If you decide to install Classifieds Easy, you should note that it may make several alterations to your online experience....

Posted on January 12, 2017 in Browser Hijackers

Search.ydserp.com

The Search.ydserp.com site is presented to users as a search service and a potential replacement for the default new tab page in your browser. Web Bar Media manages Search.ydserp.com that you may know for the Web Bar adware. Computer users that visit Search.ydserp.com may be welcomed to install Web Bar and other tools developed by Web Bar Media. Search.ydserp.com features links to services like Amazon, YouTube, Flickr, Gmail, and Facebook that may be useful to some users. PC users that handle freeware bundles may be invited to install a browser extension associated with Search.ydserp.com. The Search.ydserp.com add-on may support Google Chrome, Internet Explorer, Edge and Mozilla Firefox. However, the Search.ydserp.com site is mentioned in reports from users regarding browser hijacking. Given the history of Web Bar Media with...

Posted on January 12, 2017 in Browser Hijackers

Package Track

The Package Track software by Polarity Technologies Ltd. is promoted at Searchpackaget.com as a tool that helps users track parcels and packages sent via services like USPS, FedEx UPS and CanadaPost. The Package Track software works as a browser extension and relies on integration with Google Chrome, Internet Explorer, Safari and Mozilla Firefox. The Package Track extension depends on Search.searchpackaget.com to provide easy access to package tracking technologies. Package Track does not come with a standalone program window and may add an icon to the main user interface, which allows users to load Search.searchpackaget.com quickly. The Package Track extension is designed to make alterations in the browser’s behavior to allow the user to benefit from the full suite of features at Search.searchpackaget.com. The changes may...

Posted on January 12, 2017 in Possibly Unwanted Program

Growing Malware Attacks and Vulnerabilities Making the Internet a Risky Place

The Internet is a vast world mostly made up of ones and zeros. While the Internet harbors the knowledge of the world, it also perpetuates malicious intent from those who choose to take the shortcuts in life and cheat the unsuspecting out of their hard earned money through the use of malware. As a massive two-sided spectrum, the Internet is an essential part of life as we know it in our modernized world today. In the recent years, though, malware has taken on a new life form to be more aggressive and utilize sneaky techniques to infiltrate computers from around the world. Fundamentally, the Internet is a risky place, where about 46% of the top one million websites are considered risky, according to a recent “ State of the Web 2016 ” study conducted by Menlo Security. The spoils of war are imminent on the Internet when it...

Posted on January 11, 2017 in Computer Security

News-cloud.net

News-cloud.net is a Russian site that is dedicated to news on technology, social events, cars and useful tips. The site was reported by users who were redirected to news articles, and their new tab page feature links to News-cloud.net. News-cloud.net uses the support of advertisers to stay afloat and may work with freeware developers to popularize content on the site. Computer users that like to use free programs should not skip the ‘Advanced’ option and make sure they are installing the tools they need from a software bundle. Partners of News-cloud.net may enable browser add-ons and media players to make modifications to the Internet preferences of to provide content from News-cloud.net. Some users may not welcome these modifications. News-cloud.net was mentioned on several occasions of browser hijacking. Researchers...

Posted on January 11, 2017 in Browser Hijackers

Convertmypdf.co

Web surfers that would like to save a page for later reading as a PDF file may be interested in what Convertmypdf.co has to offer. Convertmypdf.co offers Web surfers help with saving pages on the Internet as PDF documents that can be opened with any decent PDF viewer. Computer users that run the Internet Explorer, Google Chrome, and Mozilla Firefox may be welcomed to click the ‘Convert Now’ button at Convertmypdf.co and proced with the installation of a browser extension. The app hosted at Convertmypdf.co may appear differently depending on your default Internet client. For Firefox users it is listed as ‘ConvertMyPdf By convertmypdf.co.’ In Internet Explorer, the app features the name ‘WindowsFormsApplication1,’ which most users are unlikely to associate with Convertmypdf.co. Web surfers that...

Posted on January 11, 2017 in Browser Hijackers

TSS GMusicPlayer

The prefix TSS before GMusicPlayer stands for ‘Tech Support Scam’ and you should not install the GMusicPlayer software. The GMusicPlayer program should not be mistaken for the legitimate music player GOM Audio from Gretech Corp. TSS GMusicPlayer is a security detection that refers to a fake media player that may be used to generate misleading security notifications on the compromised PC. The notifications associated with TSS GMusicPlayer may appear as pop-up windows in the browser, banners on your favorite pages and message boxes on your desktop. TSS GMusicPlayer is part of a small but expanding family of software that is designed to appear as a legitimate service while phishing messages are shown on your screen. Software that behaves like TSS GMusicPlayer is listed on our database and includes apps like Desk 365 and...

Posted on January 11, 2017 in Possibly Unwanted Program

Evil Ransomware

The Evil Ransomware is an encryption ransomware Trojan that is written in JavaScript. The Evil Ransomware encrypts its victims’ files, adding the extension ‘fie0locked’ to each affected file. Once the victim’s files are encrypted and no longer accessible, the Evil Ransomware displays a ransom note, dropping it on the affected computer’s Desktop. The Evil Ransomware is designed to take its victims’ files hostage until a ransom is paid. There are several ways in which threats like the Evil Ransomware may be distributed. One of the most common ways of distributing the Evil Ransomware is through corrupted email attachments distributed in spam email campaigns. The Evil Ransomware has been linked to a JavaScript exploit that is used to install this threat on the victim’s computer. The Evil...

Posted on January 11, 2017 in Ransomware

Ramsomeer Ransomware

The Ramsomeer Ransomware is part of a large family of encryption ransomware Trojans. The Ramsomeer Ransomware is designed to encrypt the victim’s files to demand a ransom. As with most threats of this type, the best measure to deal with the Ramsomeer Ransomware is to take preventive actions such as using a reliable security application and having backups of all files on an external memory device. The Ramsomeer Ransomware represents a danger to the computer users’ data, and steps should be taken to prevent the Ramsomeer Ransomware infections, as well as other ransomware Trojan attacks. The Ramsomeer Ransomware seems to have been created by Turkish hackers or target computer users in Turkey. This is because the Ramsomeer Ransomware’s ransom note is delivered in both English and Turkish. There is still not much known...

Posted on January 11, 2017 in Ransomware

Spora Ransomware

The Spora Ransomware is a sophisticated ransomware Trojan that has an advanced payment site and the capacity to carry out its attacks online. The Spora Ransomware first appeared in January 2017 and caught the attention of PC security researchers immediately, because of its ability to carry out attacks online, a strong encryption engine, and a sophisticated ransomware payment site that is far more advanced than payment sites associated with other ransomware Trojans observed previously. The Spora Ransomware may be distributed using spam email messages that trick computer users into believing that the email contains an invoice attachment. The attachment is a ZIP archive file that contains HTA files inside. These HTA files use a double extension, which causes computer users to believe that the file is a PDF or a DOC file. Opening this...

Posted on January 11, 2017 in Ransomware

How to Know If Your Computer is Vulnerable to Ransomware?

In the past few years, the computer security world has been turned upside down with the emergence of ransomware, which has been among the most dangerous and costly malware in existence. Not only has ransomware cost victimized computer users millions of dollars , but the stubborn nature of such threats don’t leave victims with many options. The question arises: How do you know if your computer is vulnerable to ransomware? Ransomware , as many of you may know, is a form of aggressive malware that utilizes ransom techniques to demand money from victimized computer users. The process of ransomware extorting money from computer users starts with its main ability to encrypt files and then claim that the files can be decrypted for a substantial payment in most circumstances. By encrypting files, ransomware is able to lock or limit...

Posted on January 10, 2017 in Computer Security
1 2 3 4 5 6 7 8 9 10 11 12 13 1,118