Top Security News

Top 5 Popular Cybercrimes: How You Can Easily Prevent Them Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles, the days of robbing banks in...
Fake Windows Support Calls Seek to Scam and Infect Computer Users with Malware Fake phone calls from crooks on the other end claiming to be a support team from a well-known entity is an increasing pandemic, which has claimed an alarming rate of victims in the recent weeks. There have been a large number of phone calls received by computer users in various countries from...
Spam Alert: Phishing Email Scam Titled 'Bank of America Alert: Account Suspended' We recently discovered a new phishing scam from a Bank of America spam email message that attempts to warn a computer user of an 'invalid login' resulting in a 'suspended banking account'. The spam message is ultimately a phishing scam that tries to lure computer users to a phishing site to...

Top Articles

LockerGoga Ransomware

LockerGoga Ransomware screenshot

While security researchers have expected ransomware attacks to slow down in 2019, recent ransomware outbreaks remind us that we must remain ever vigilant. One such outbreak that made headlines involved a ransomware known as LockerGoga. The ransomware targeted Norwegian manufacturing company Norsk Hydro, one of the world's top aluminum producers, forcing it to halt operations in multiple factories. This severely hindered the company's production and caused its stocks to fall by 0.8 percent. It is also suspected that a variant of LockerGoga was used to target French engineering company Altran Technologies earlier in January. Ransomware is a type of malware that encrypts the files of a...

Posted on March 31, 2019 in Ransomware

'National Consumer Center' Pop-Ups

'National Consumer Center' Pop-Ups screenshot

The 'National Consumer Center' pop-ups are connected to known online tactics. According to complaints, the 'National Consumer Center' pop-ups may claim that the computer user has won a free iPhone or some other similar costly prize. The 'National Consumer Center' pop-ups may include the legend 'National Consumer Center' in the upper left corner, with an official looking font, and advertisements on the right. These pop-ups are among the most common online tactics and may be used to intrude on the computer user's privacy. The 'National Consumer Center' pop-ups may be caused by adware components installed on the affected Web browser. However, the 'National Consumer Center' pop-ups also may...

Posted on April 28, 2016 in Browser Hijackers

Movies123 Ads

Movies123 Ads screenshot

People who do not like paying for legal streaming services often end up either looking to download the media they are after illicitly or searching for Web pages that offer to stream pirated content for free. However, as it is said, there is no free lunch. Websites that host pirated media tend to work with a whole network of other dodgy actors. Mainly dubious advertisers who will try to sell you all sorts of shady products and subscriptions. A common trick used by dodgy websites like the Movies123 page is to try and trick the user into giving them permission to display browser notifications. Many legitimate websites ask for permission to send browser notifications, but their goal is to...

Posted on September 13, 2019 in Adware

More Articles

Usinesmycete.info

Like many other websites of this kind, the Usinesmycete.info is a dodgy page whose sole purpose is to trick its visitors into allowing it to display Web browser notifications. Such websites tend to trick users into believing they are hosting engaging content like an interesting video or a gallery of high-quality images. However, this is never the case, and if visitors fall for this trickery, they may allow the shady page to display notifications in their Web browser. Of course, Web browser notifications can be a useful tool if they are in the right hands. Legitimate websites often ask for permission to display Web browser notifications in order to keep their visitors up to date with new deals, latest gossip, or breaking news. However, dodgy websites like the Usinesmycete.info provide no content of value, and you should not allow them...

Posted on January 27, 2020 in Browser Hijackers

Xiny

Some cyber crooks prefer to target a low-hanging fruit instead of going after big fish. This is the case with the developers of the Xiny malware who have chosen to target users who are still using outdated software. This threat is a Trojan that targets exclusively Android devices. The Xiny Android Trojan targets outdated variants of the Android OS. This Android Trojan has been operating for several years now. Around 12% of the victims of the Xiny Trojan appear to be using Android 4, which is an OS that was first released back in 2011. Needless to say, using an OS that is nearly a decade old is neither safe nor wise. Outdated software usually has a number of vulnerabilities that can easily be exploited by cybercriminals. However, the Xiny Trojan is also capable of infiltrating devices that run Android versions 5 to 9. Capabilities Once...

Posted on January 27, 2020 in Malware

AlphaBetaCrypt Ransomware

Among the most popular threats online are data-locking Trojans. The popularity of these malware kind stems from the fact that any rookie cyber crook can build a threat using a ransomware building kit and quickly start generating cash. The AlphaBetaCrypt Ransomware is one of the newest threats of this type. This threat operates in a similar manner to most file-encrypting Trojans - compromises a user's system, locks their files, and then demands them to pay a ransom fee while promising to provide them with a decryption key. Propagation and Encryption Although there is no confirmation regarding the propagation method used in the distribution of the AlphaBetaCrypt Ransomware, there are some speculations. Malware researchers think that the likely infection vectors may include bogus application updates, malvertising campaigns, spam emails...

Posted on January 27, 2020 in Ransomware

Installflash-upgrade.com

Many low-level shady actors online choose to build dodgy websites that are used for the promotion of fake application updates. One of the most commonly pushed application updates are updates for the Adobe Flash Player. This trick is so popular because most regular users online would have the Adobe Flash Player installed on their system. While the majority of bogus application updates usually serve to promote the installation of PUPs (Potentially Unwanted Programs), some push more threatening software like Trojans. It would appear that the operators of the Installflash-upgrade.com website promote different applications periodically. Some visitors of the website report that they were asked to download and install a dodgy application meant to optimize their PC performance. Others state that the Installflash-upgrade.com page pushed a...

Posted on January 27, 2020 in Browser Hijackers

Zahkit.pro

Operators of dubious websites are known to use countless social engineering techniques to convince the users to take actions they otherwise would not. One of these tricks is tricking the visitor into believing that their dodgy website is hosting very entertaining content that they can only view if they comply with the website's requests. Often the page would require the user to either install a fake update of the Adobe Flash Player or click on the 'Allow' button they are presented with. The creators of the Zahkit.pro have taken the latter approach. Tricks Users into Allowing Web Browser Notifications Upon visiting the Zahkit.pro website, users will be asked to click on the 'Allow' button if they wish to view the content of the page. However, visitors of the Zahkit.pro site who click on the 'Allow' button will not be presented with the...

Posted on January 27, 2020 in Browser Hijackers

Dengelmeg.com

The Dengelmeg.com site is a page that would attempt to hijack your Web browser’s notifications to promote dodgy products and shady services. While Web browser notifications can be a useful tool if used the correct way, dubious websites only use them to bombard their visitors with unwanted and irrelevant advertisements. Promotes Dodgy Products and Shady Services Operators of dodgy pages like the Dengelmeg.com site tend to use a variety of tricks to get the user to allow them to display Web browser notifications. It would appear that the Dengelmeg.com site claims to host adult content as its visitors are asked to confirm their age. However, this is nothing more but a trick as clicking on the button that is meant to confirm your age will actually give the shady page permission to display browser notifications. It is far more likely for...

Posted on January 24, 2020 in Browser Hijackers

Seriorladded.info

There are countless shady websites online that do not host any valuable content and whose main goal is to promote dodgy products and bogus services. Among these dubious Web pages is the Seriorladded.info site. The operators of the Seriorladded.info generate revenue by hijacking their visitors' Web browser notifications and bombarding them with advertisements. Presents Visitors with a Bogus CAPTCHA To trick users into allowing the Seriorladded.info site to display Web browser notifications, the dodgy page would require them to click on the 'Allow' button that is supposedly going to confirm that they are not a robot. However, this is not a real CAPTCHA, and clicking on the 'Allow' button will enable the Seriorladded.info website to begin spamming the user with unwanted advertisements via their Web browser notifications feature. This is a...

Posted on January 24, 2020 in Browser Hijackers

Getmackeepersoftpro.xyz

The Getmackeepersoftpro.xyz Web page is a dodgy site whose purpose is to promote PUPs (Potentially Unwanted Programs) targeting Apple devices. Once a visitor launches the Getmackeepersoftpro.xyz page, the site will detect what device the user is utilizing. This website can determine the model and the brand of the user's system. The visitor will be greeted with a bogus pop-up window that advertises a VPN service for Mac computers. Alternatively, if the user is visiting the odgy site via their iPhone or iPad, they will be presented with a similar pop-up message promoting an application for their device. It is crucial for users to avoid downloading any software from shady or unconfirmed sources as the products they promote are not reliable and may end up harming your system. Promotes Dodgy VPN and Similar Services It would appear that...

Posted on January 24, 2020 in Browser Hijackers

Topi Ransomware

One of the newest copies of the STOP Ransomware is called the Topi Ransomware. The creators of the Topi Ransomware have borrowed the code of the notorious STOP Ransomware and altered it slightly to fit their needs. The STOP Ransomware family was the most active one throughout the entire 2019, with over 200 copies of the threat circulating the Web. Propagation and Encryption Authors of ransomware threats tend to use a variety of infection vectors to propagate these nasty Trojans. It is likely that the most popular propagation methods are spam email campaigns. The attackers would send the targeted user an email that contains a message riddled with social engineering tricks. The o of the fake message is to trick the user into opening the file attached to the email. Usually, the attached file is macro-laced, and launching it would...

Posted on January 24, 2020 in Ransomware

Reha Ransomware

The Reha Ransomware is among the most recently uncovered file-encrypting Trojans. Once spotted and dissected, this threat revealed that it is a variant of the infamous STOP Ransomware. During 2019 the STOP Ransomware family claimed countless victims as it emerged as the most active ransomware family throughout the entire year. The Reha Ransomware would compromise a user's PC, lock all their files, and then present them with a ransom note asking for cash in return for a decryption key. Propagation and Encryption Malware researchers have not yet identified with any certainty what is the infection vector responsible for the spreading of the Reha Ransomware. Some speculate that the authors of the Reha Ransomware may be utilizing spam emails containing macro-laced attachments. It is also likely that the attackers may be using malvertising...

Posted on January 24, 2020 in Ransomware

Beware: Fake FedEx Text Alerts and Emails Used in New Scam

Beware: Fake FedEx Text Alerts and Emails Used in New Scam screenshot

There is an awful lot of spam making the rounds, both in email and mobile text format. With an average of 300 billion emails being sent every day and the majority of those being spam that has unsolicited or malicious content, spam is a very serious issue. With so much of it going around, it is no wonder that there are bad actors out there who pretend they represent huge corporations and household names. FedEx happens to be among those names. In early 2020 there have been reports of mobile texts that claim the recipient has a package being delivered by FedEx, with a link in the text that is supposedly used to "set delivery preferences". The fake texts use that link to take the victim to a...

Posted on January 24, 2020 in Computer Security

OnyxLocker Ransomware

Malware analysts have uncovered yet another ransomware threat in the wild. This brand-new file-encrypting Trojan is called the OnyxLocker Ransomware. It is likely that the creators of this threat originate from the Russian Federation as the ransom note has versions in Russian and English. It appears that the OnyxLocker Ransomware does not belong to any of the popular ransomware families, and its creators may have built it from scratch. Propagation and Encryption The most commonly used infection vectors when it comes to the propagation of ransomware threats are spam emails containing infected attachments, torrent trackers, bogus application downloads and updates, pirated copies of popular software and media, etc. Like most threats of this type, the OnyxLocker Ransomware would make sure to encrypt all the data it can get its hands on to...

Posted on January 23, 2020 in Ransomware

Fbot

The Fbot botnet is a more recent variant of the infamous Mirai Botnet. The operators of the Fbot botnet peak their activity for a set period usually and then go quiet for several weeks. This is likely a tactic to avoid detection. The Fbot botnet is comprised of IoT (Internet-of-Things) devices running Linux-based OS. The devices targeted by the Fbot botnet tend to be smart gadgets and tools, routers, etc. In February 2019, malware researchers found that the Fbot botnet has managed to compromise and hijack more than 25,000 DVR/NVR devices around the globe. Used For DDoS Attacks Many operators of botnets opt to plant cryptocurrency miners on the hijacked devices that are then used for mining cryptocurrencies spending the computing power of the host without their owners’ knowledge. However, another very common, and more old-school...

Posted on January 23, 2020 in Botnets

Free Streaming Radio

The Free Streaming Radio is an application that presents itself as a useful tool for users who enjoy listening radio. The creators of the Free Streaming Radio application claim to provide users with radio streams online that will keep them entertained for hours. However, all the radio streams the Free Streaming Radio provides are available online freely. There is no need for users to install third-party applications like the Free Streaming Radio add-on to get content that is available for free one click away. After analyzing this application, cybersecurity experts have identified it as a PUP (Potentially Unwanted Program). Sets a New Tab Page PUPs like the Free Streaming Radio application are not inherently unsafe to your system and do not pose a threat to your data's security. However, PUPs do not provide any valuable content and are...

Posted on January 23, 2020 in Potentially Unwanted Programs

My Driving Directions

Users who browse dodgy sites like illicit streaming sites, shady dating platforms, adult content pages, etc. are likely to come across a variety of PUPs (Potentially Unwanted Programs). Among the most recently spotted PUPs is the My Driving Directions application. The authors of this application claim to provide users with helpful maps and navigation services. However, the My Driving Directions application does not offer any unique features to its users - all the tools and services offered are already available online freely. This means that users who want to take advantage of free navigation services do not need to install the My Driving Directions application or any other third-party program. Changes the User's New Tab Page If the users install the My Driving Directions application, they will notice that this add-on alters their Web...

Posted on January 23, 2020 in Potentially Unwanted Programs
1 2 3 4 5 6 7 8 9 10 11 1,388