Top Security News

Beware: Cybercriminals Leveraging Coronavirus to Exploit Computer Users and Spread Malware It hasn't taken a lot of time for threat actors to realize the social engineering opportunity that the novel coronavirus (2019-nCoV) has presented them. The respiratory infection that originated in...
Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria There's no doubt that the Coronavirus has created a worldwide hysteria and pandemic from having a negative impact on many economies to pressing government officials to hold conferences addressing...
Hackers Exploiting Coronavirus Fears To Push Malware As the Covid-19 pandemic goes into full swing, we see increasing numbers of hackers and nation-state actors trying to exploit the global fears for their own gains, spreading malicious software...

Top Articles

CoronaVirus Ransomware

CoronaVirus Ransomware screenshot

The CoronaVirus Ransomware (also called CoronaVi2022 Ransomware) is a file-locker, which was released in the wild recently, and it seems that its author has opted to use the name of the Coronavirus (also known as COVID-19), which is a disease that is threatening users worldwide. Just like the disease it is named after, the CoronaVirus Ransomware also threatens users worldwide, but in a different way – it will try to encrypt their files, and also overwrite the contents of their drive's Master Boot Record (MBR). The latter operation may cause a lot of trouble, since the victims' computers will not load their operating system and, instead, they will display a copy of the CoronaVirus...

Posted on March 12, 2020 in Ransomware

Hackers Spreading Malware via Coronavirus Maps Online

Hackers Spreading Malware via Coronavirus Maps Online screenshot

The ongoing outbreak of the coronavirus is now disrupting business across the world, but apparently cybercriminals have no days off, since they're just as active as they were before the beginning of the outbreak. It appears they are now capitalizing on the fears of the people regarding the pandemic. It was back in January that the hackers started using the coronavirus threat as a focus of an email campaign that infected users with malware, and now they are expanding their operations to coronavirus outbreak maps that follow the number of infections and deaths across the world. Many organizations are feeling the pressure from these attacks, such as John Hopkins University who created...

Posted on March 11, 2020 in Computer Security

APT Attack Spreads Malware Using Coronavirus Theme

APT Attack Spreads Malware Using Coronavirus Theme screenshot

The APT (Advanced Persistent Threat) group was spotted sending out spear-phishing emails that allegedly have detailed information about COVID-19, a.k.a. Coronavirus, but instead, they infect the victims with a custom remote access Trojan (RAT). The group is using the coronavirus pandemic to infect unsuspecting victims with a previously unseen malware. The malware is dubbed 'Vicious Panda' by researchers, with the attackers using it in a campaign at the moment. Researchers managed to find two Rich Text Format (RTF) files that were targeting the Mongolian public sector during the outbreak. Once the files are open, a unique and custom-made remote access Trojan is executed. It develops a list...

Posted on March 16, 2020 in Computer Security

More Articles

FunSafeTab

The FunSafeTab Web browser extension is a dodgy utility that is not likely to provide you with any helpful tools or unique features. However, this is not the case, and you should not install the FunSafeTab add-on. The FunSafeTab Web browser extension is listed as a PUP (Potentially Unwanted Program) by cybersecurity researchers. This is because this dodgy Web browser add-on will tamper with your system's settings automaticlly. This behavior is a red flag because genuine applications will not apply any changes to your configurations without getting your explicit consent first. The FunSafeTab extension will alter your settings to set the 'Search.funsafetabsearch.com' as your default new tab page. This affiliated website hosts a basic search engine that is not likely to provide you with the high-quality services you may be used to. This...

Posted on March 27, 2020 in Browser Hijackers

ActiveTrack

The ActiveTrack application is a bogus tool that is compatible with Mac systems only. Users who end up with the ActiveTrack application on their Mac may have trusted a misleading advertisement promoting the dodgy tool as a helpful utility. Another distribution method is free software bundles. Users often download free software without realizing that it is bundled with PUPs (Potentially Unwanted Programs) or adware. If you do not pay close attention to what you agree to during the installation process, you may end up installing software that may be not only useless but also detrimental to your browsing quality. The ActiveTrack application is listed as adware by malware analysts. This means that the goal of the ActiveTrack tool is to inject unwanted advertisements on every Web page you browse online. The advertisements can become...

Posted on March 27, 2020 in Mac Malware

ManageSearchView

The ManageSearch View app is a fake utility that targets OSX users. It is likely that the creators of the ManageSearch View application are marketing it as a helpful tool that will enhance the user's searches. However, this is not the case, definitely, because the ManageSearch View is adware. Adware, like the ManageSearch View application, often ends up on users' systems with the help of software bundles. The software bundle may contain one application that the users need, but if they do not pay attention while installing it, they may end up consenting to install additional software without noticing it. This is what the creators of adware count on – users who rush during the installation process and fail to pay attention to the details. Once the ManageSearch View adware is installed on your Mac, you will notice a spike in the number of...

Posted on March 27, 2020 in Mac Malware

ValueKnow

The ValueKnow application may appear to be a useful tool at first glance, but we can assure you that it is not – this is nothing more than adware. This is an application targeting Mac users exclusively. It is likely that the ValueKnow utility may end up on one's Mac via software bundles or misleading advertisements that promoted it as a helpful tool that may provide users with discounts and coupons or other useful services. If the ValueKnow tool is being distributed via software bundles, then the creators of this adware count on users rushing through the installation process and agreeing on installing additional software without realizing it. If you have installed the ValueKnow adware on your computer, regardless of whether you realized it or not, you will notice an increase in the number of advertisements displayed every time you...

Posted on March 27, 2020 in Mac Malware

'UPS' Email Virus

The 'UPS' email virus is a newly detected spam email campaign that is used for the distribution of threatening malware. The threat distributed via the 'UPS' Email Virus phishing campaign is the Hancitor Trojan downloader. This threat also is known as the Chanitor Trojan downloader. Threats like the Hancitor Trojan downloader are often used as the first-stage payload that allows the con. artists to plant additional malware on the compromised system. It is likely that the conman behind the 'UPS' email virus operation may have gotten their hands on a database containing numerous email addresses of users worldwide. Users who are not using the services of a legitimate, reputable email utility are more likely to receive the 'UPS' email virus as the fake message may not be filtered and sent to their spam folder. According to reports, the...

Posted on March 27, 2020 in Trojans

'Christmas Party' Email Virus

The 'Christmas Party' email virus is a phishing email campaign that has been distributing threats to innocent users since December 2019. Many cyber crooks prefer to use phishing emails as an infection vector to propagate their threatening creations. In the case of the 'Christmas Party' email virus, the operators of this tactic appear to be propagating the Emotet banking Trojan. However, this does not mean that the 'Christmas Party' email virus conmen will not utilize this propagation method to distribute other malware in future campaigns. Users who receive the 'Christmas Party' email virus would be urged to volunteer in setting up the Christmas party of the organization they work in. It is not yet known is the operators of the 'Christmas Party' email virus operation are targeting any specific companies or businesses in this campaign....

Posted on March 27, 2020 in Trojans

'Greta Thunberg' Email Virus

Many cyber crooks use spam email campaigns to propagate their threatening creations to unsuspecting users. Malware researchers have spotted a new phishing email campaign circulating the Web recently – the 'Greta Thunberg' email virus. Greta Thunberg is a young climate activist from Sweden who won Times Person of the Year 2019, so it is not surprising that her name may be used by cybercriminals seeking to propagate malware. The 'Greta Thunberg' email virus campaign consists of fake emails that appear to be sent by a legitimate source. The bogus email claims that the user is invited to one of the climate change demonstrations organized by the young activist Greta Thunberg. The fake email would contain an attached file, which the user is urged to review to find out the date and location of the demonstration in question. However, the...

Posted on March 27, 2020 in Trojans

'Coronavirus' Email Virus

The 'Coronavirus' email virus is a recently spotted phishing campaign targeting users worldwide. The conmen behind this tactic are using the Coronavirus, also known as COVID-19, pandemic to benefit themselves. Taking advantage of people's fear is not unusual for cybercriminals, as they are not the most moral and upstanding citizens, certainly. The 'Coronavirus' email virus campaign consists of fake emails that appear to be sent by the WHO (World Health Organization). Of course, this is not the case, and the 'Coronavirus' email virus is in no way affiliated with the WHO. The bogus email appears to contain important information regarding how to slow down the spread of the deadly Coronavirus. It is paramount for users to be informed in regards to COVID-19, and we can assure you that there is plenty of legitimate, freely available...

Posted on March 27, 2020 in Trojans

LightSpy

The LightSpy malware is a threat that targets iOS devices. Threats that are designed to target iOS systems specifically are not very common, as they are rather difficult to build. This means that the creators of the LightSpy threat are likely highly-skilled and well-experienced cyber crooks. The LightSpy malware targets 12.01 to 12.2 versions of iOS. Cybersecurity experts believe that the LightSpy threat also may be compatible with an older variant of iOS – 11.03. Likely Originates from China After studying the LightSpy threat, malware analysts found that this malware likely originates from China. However, researchers have not yet managed to pinpoint a certain APT (Advanced Persistent Threat) that may be responsible for the LightSpy malware. Some analysts believe that the LightSpy threat may be the creation of the Lotus Bloom hacking...

Posted on March 27, 2020 in Mac Malware

Urancspitte.info

There are many websites online who do not provide their visitors with any interesting or meaningful content, despite their claims. Among them is the Urancspitte.info page. Many of them take part in the so-called 'Click Allow to Continue' tactic, and the Urancspitte.info site is no exception. The visitors of the Urancspitte.info website would be asked to click on the 'Allow' button on the page as soon as they launch it. The site displays a fake CAPTCHA prompt that the user is meant to complete to access the page's contents. However, clicking on the 'Allow' button will not prove that you are not a robot – it will allow the website to send you push-notifications via your Web browser. To some users, this may not seem like an issue. However, we can assure you that the Urancspitte.info page will abuse this privilege and will flood you with...

Posted on March 27, 2020 in Browser Hijackers

How to fix Kernel Security Check Failure error in Windows 10

How to fix Kernel Security Check Failure error in Windows 10 screenshot

Powering up a Windows 10 PC should usually cause no problems. Sometimes, however, you get the Blue Screen of Death (BSoD) instead. The blue screen only appears when one out of a few specific errors occurs on your system. In this guide, we shall outline the steps you need to make if the so-called Kernel Security Check Failure accompanied by the 0x000000139 error code is the reason for your BSOD. The Kernel Security Check Failure may be due to: Loose cable connections Data corruption Failed hardware compatibility check (HDD, RAM, drivers, etc.) Malware attacks. Loose cable connections may refer to your removable devices. When attached to your PC, they communicate with your Windows 10 OS the...

Posted on March 27, 2020 in Computer Security

Hacking Attacks Targeting World Healthcare Organization Rise Amid COVID-19 Pandemic

Hacking Attacks Targeting World Healthcare Organization Rise Amid COVID-19 Pandemic screenshot

A group of elite hackers might have been behind a recent attack against the World Health Organization (WHO), as Reuters reported. Flavio Aggio, Chief Information Security Officer of the WHO, has noted that the cyberattacks against the organization have increased two-fold since the global outbreak of the COVID-19 disease. One break-in attempt was spotted by Alexander Urbelis, an attorney and cybersecurity expert working at the New York-based Blackstone Law Group, which is involved in monitoring suspicious internet domain registration activity. Urbelis first noticed the incident on March 13, when the attackers set up a bogus email login portal for WHO staff that mimicked the organization's...

Posted on March 27, 2020 in Computer Security

Linksys and D-Link Routers Targeted by Oski Malware

Linksys and D-Link Routers Targeted by Oski Malware screenshot

Hackers are have been targeting popular brand routers for years, but new malware is now thrown in the mix. The malware is used to gain access to home networks and to hijack devices. Researchers from Bitdefender discovered that criminals were hacking into devices and changing the DNS settings to show browser alerts. The alerts were used to push people into downloading fake coronavirus information apps. Linksys and D-Link routers were the most affected, with hackers using brute force attacks to access the admin panel of the routers. Once there, the hackers change the DNS settings to redirect the traffic toward their servers. Hijacking the router Once a router is hijacked with a specific IP...

Posted on March 27, 2020 in Computer Security

Search For Directions

The Search For Directions Web browser extension offers its users a variety of tools that will help them find their way while traveling. This utility claims to provide users with maps, up-to-date traffic information, points of interest service, etc. This may sound like a great offer, but all these tools and services are already available online freely, therefore there is no need to install any third-party applications to access them. The Search For Directions Web browser add-on is not offering any unique tools or features, so you don't need to install it on your system. If you install the Search For Directions add-on, this shady utility will change the settings of your Web browser to set the 'S.searchfordirections-serp.com' as your default new tab page. This helps the affiliated website boost its traffic. The...

Posted on March 26, 2020 in Potentially Unwanted Programs

Phytotyper.com

The Phytotyper.com site is a bogus Web page that does not host any meaningful content. This dodgy site only hosts advertisements. If you tend to browse dodgy pages like adult websites or illicit streaming platforms, you may come across advertisements affiliated with the Phytotyper.com page. Alternatively, you may be viewing advertisements associated with this shady site if you have adware installed on your computer. Often, adware manages to sneak into a user's computer via free software bundles. If the user is not paying close attention during the installation process of free applications, they may end up agreeing to install PUPs (Potentially Unwanted Programs) or adware on their PCs. Then, you may begin noticing a sharp increase in the number of advertisements you view every time you try to browse the Web. This can be very irritating...

Posted on March 26, 2020 in Browser Hijackers
1 2 3 4 5 6 7 8 9 10 11 1,415