Top Security News

Beware: Cybercriminals Leveraging Coronavirus to Exploit Computer Users and Spread Malware It hasn't taken a lot of time for threat actors to realize the social engineering opportunity that the novel coronavirus (2019-nCoV) has presented them. The respiratory infection that originated in...
Beware: Fake FedEx Text Alerts and Emails Used in New Scam There is an awful lot of spam making the rounds, both in email and mobile text format. With an average of 300 billion emails being sent every day and the majority of those being spam that has...
Ransomware Attack Costs 300 Employees their Jobs Did you know that a ransomware attack could cost you your job? That is exactly what happened to 300 employees at an Arkansas Telemarketing firm that was forced to lay off 300 of its employees and...

Top Articles

VulkanRT

The software package known as VulkanRT has recently caused a bit of commotion online. There have been posts on various forums and online communities, made by people who got confused by the sudden appearance of an entry named "VulkanRT" in their installed programs list. Some users were surprised and confused by the new entry and, not knowing what it was, assumed it was a virus and communicated their fears online. In reality, VulkanRT is not a threat or a malicious piece of software. The RT in the name stands for "runtime libraries". Vulkan, on the other hand, is the name of a graphical API which has the purpose of providing direct control over the computer's GPU and CPU usage. VulkanRT is developed by the Khronos Group in 2014 with the participation of huge IT names such as Intel, NVidia, AMD, Google , and Apple. The API was initially...

Posted on December 29, 2017 in Browser Hijackers

Bundesliga-streams.net

The Bundesliga-streams.net website does not host any unsafe content, but it is a shady page that should be avoided. Users who come across the Bundesliga-streams.net page were likely looking for illicit streams of football (soccer) games from the German football league called the Bundesliga. We recommend you not to visit websites like the Bundesliga-streams.net as they are hosting illicit content and often have malvertising present on their page. These malvertising campaigns tend to promote low-quality products and dodgy or fake services. Uses Social Engineering Tricks The Bundesliga-streams.net site, much like many other shady pages, is likely to use a variety of social engineering techniques to manipulate the actions of the user. Among them can be: The users may be asked to download and install a fake codec pack or media player if...

Posted on November 11, 2019 in Browser Hijackers

Sodinokibi Ransomware

Sodinokibi Ransomware is a new malware threat that is gaining traction in the cybercriminal circles. Although Sodinokibi operates in the typical ransomware fashion - it infiltrates the victim's computer, uses a strong encryption algorithm to encrypt the files, and demands a payment for their restoration, analyzing its underlying code reveals that it is an entirely new malware strain and not an updated variant of an already existing ransomware. Zero-Day Exploit Facilitates First Sodinokibi Attack Sodinokibi was first detected on April 25 when it was used in an attack that exploited a zero-day Oracle WebLogic Server vulnerability. The severity of the zero-day exploit couldn’t be understated as it allowed the remote execution of code without any of the otherwise required authentication credentials. Oracle issued a patch on April 26,...

Posted on May 1, 2019 in Ransomware

More Articles

Btog.pro

The Btog.pro is a fake website that is designed to mislead its users into providing it with permission to display Web browser notifications. The Btog.pro site may pretend to host very engaging content that will grab your attention and trick you into launching this bogus Web page. However, unfortunately, there is no content worth your time on the Btog.pro site as this is nothing more than an empty page. The operators of the Btog.pro site use the popular 'Click Allow to Continue' low-level online tactic. This trick is utilized by countless bogus websites. Users are required to click on the 'Allow' button spawned on their screens if they choose togo ahead and view the content they were promised. The site would claim that users who do not comply will not get access to the content of the page. Clicking on the 'Allow' button will give...

Posted on February 28, 2020 in Browser Hijackers

Hidemyhistory.co

The Hidemyhistory.co is a search engine that users may end up with unknowingly if they trusted a shady Web browser extension promising them to improve their privacy online. It is likely that the Hidemyhistory.co site is being promoted by a Web browser add-on that claims to help users' hide their history' online. If you like to conceal your browsing history, you need simply to open a private (also known as incognito) page on your preferred Web browser. Using private mode on your Web browser will prevent it from storing your Web browsing history. This means that the installation of any third-party applications are not mandatory because every reputable Web browser has a private mode. However, users who have the Hidemyhistory.co site set as their default search engine may notice that they are not getting the organic search results that...

Posted on February 28, 2020 in Browser Hijackers

SearchWebSvc

The SearchWebSvc is a piece of adware targeting Mac computers. This particular Mac adware is rather sneaky as it can hide its component on the compromised system. However, if the SearchWebSvc adware is present on your system, you do not need to panic – this application will not harm your Mac or threaten the security of your data. Despite the fact that the SearchWebSvc application is not unsafe, it is recommended that users uninstall it as soon as they spot it on their systems. The presence of the SearchWebSvc adware on your Mac will result in countless advertisements flooding the websites you visit. This is likely to decrease your browsing quality greatly, as the advertisements will clutter the pages you visit and distract you from the content you are interested in. It is likely that the advertisements affiliated with the SearchWebSvc...

Posted on February 28, 2020 in Mac Malware

8800 Ransomware

The 8800 Ransomware is a newly spotted data-encrypting Trojan that belongs to the infamous Dharma Ransomware family – the second most active ransomware family in the whole of 2019. Many cyber crooks with little to no experience take the approach of the creators of the 8800 Ransomware – they simply borrow the code of an existing file-locking Trojan such as the Dharma Ransomware and alter it ever so slightly. Propagation and Encryption It is likely that the criminals responsible for the 8800 Ransomware are spreading it via corrupted spam emails. The emails in question would contain a fake message alongside an infected attachment. If the users get tricked into launching the attached file, their system will be compromised. Among other commonly used propagation methods are torrent trackers, bogus application updates and downloads,...

Posted on February 28, 2020 in Ransomware

Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria

Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria screenshot

There's no doubt that the Coronavirus has created a worldwide hysteria and pandemic from having a negative impact on many economies to pressing government officials to hold conferences addressing the public on how to protect themselves. However, on the front of computer security, the Wuhan Coronavirus is having a dire impact on the tech world where cybercrooks are exploiting the COVID-19 Coronavirus to spread the known threats of Remcos, Emotet, and Lokibot, which are various types of data-stealing malware. The U.S. Federal Trade Commission (FTC) has stepped in to warn computer users of continuous scams that tout phishing campaigns to spread malware threats. These campaigns are ones that...

Posted on February 28, 2020 in Computer Security

YKUP Ransomware

Malware researchers have spotted a brand-new copy of the infamous Dharma Ransomware. The Dharma Ransomware family was the second most active ransomware family in 2019. This new variant of the notorious Dharma Ransomware is called the YKUP Ransomware. Propagation and Encryption Malware analysts are not fully certain what is the propagation method used by the creators of the YKUP Ransomware. It is likely that they are utilizing malvertising campaigns, bogus software downloads and updates, spam emails containing macro-laced attachments, torrent trackers, or other shady tricks to distribute the YKUP Ransomware. The YKUP Ransomware is likely targeting a wide variety of filetypes. Rest assured that all your images, audio files, documents, spreadsheets, archives, databases, videos, presentations, and other common filetypes will be locked by...

Posted on February 28, 2020 in Ransomware

SepSys Ransomware

The SepSys Ransomware is a new data-locking Trojan, which is likely to ruin the day of many users worldwide. This ransomware threat is designed to lock a long list of filetypes to ensure maximum damage on the compromised machine. All documents, images, audio files, videos, archives, presentations, databases, spreadsheets, and other common filetypes will be locked securely with the help of an encryption algorithm. The locked files will be unusable until the user unlocks them using the appropriate decryption key. Propagation and Encryption Mass spam email campaigns are the most popular propagation method in regard to the spreading of ransomware threats. The targeted users would receive an email that contains a corrupted attachment and a fake message urging them to launch the attached file. Needless to say, users who comply will expose...

Posted on February 28, 2020 in Ransomware

Chrysaor

The Chrysaor spyware toolkit is a threat that has been designed to target Android devices specifically. According to malware researchers, it is likely that the Chrysaor toolkit is the creation of the NSO Group. This is a cybersecurity company located in Israel. It has been speculated that the NSO Group is working on behalf of governments to develop various malware types. Among the most popular threats developed by the NSO Group is the Pegasus spyware. The Chrysaor malware is a modified variant of the Pegasus threat. After studying the Chrysaor threat, malware researchers concluded that this might be among the most threatening spyware designed to target Android devices. So far, the Chrysaor threat is known to have infected a limited number of Android devices located in the United Arab Emirates, Israel, Georgia, Mexico, and Turkey,...

Posted on February 28, 2020 in Spyware

Verified-extensions.com

If you have come across the Verified-extensions.com site, you have likely been looking for illicit streaming platforms hosting pirated content. However, the Verified-extensions.com site does not host any media. Despite it being an empty page, the Verified-extensions.com site claims to host media that may attract the attention of users and lure them in. The Verified-extensions.com website will claim that users will be unable to view the media on the page unless they install a Google Chrome extension from Verified-extensions.com. It is likely that the extension promoted by the Verified-extensions.com site is a PUP (Potentially Unwanted Program) that is not to be trusted. However, you do not need to worry about the security of your computer or the safety of your data, as the Verified-extensions.com website is not affiliated with the...

Posted on February 27, 2020 in Browser Hijackers

Us.loading.best

The Us.loading.best site is a bogus page that is likely to claim to host very engaging content that may be of interest to you. However, despite its claims, the Us.loading.best site is an empty page with no content. The Us.loading.best website hosts a tactic known as ‘Click Allow to Continue.’ Users who come across this tactic will be asked to click on the ‘Allow’ button displayed on their screens if they want to continue and enjoy the content they were promised. As it was mentioned, there is no content to be viewed on the Us.loading.best site, so do not bother giving this bogus page any permissions. Users who give in with the demands of the Us.loading.best page will be bombarded with advertisements via their Web browser notifications constantly. Legitimate sites use Web browser push notifications mindfully, but pages like the...

Posted on February 27, 2020 in Browser Hijackers

Phensiveeas.pro

The Phensiveeas.pro website is a fake page that aims to hijack your Web browser notifications to bombard you with unwanted and irrelevant advertisements. This is a low-level tactic utilized by countless bogus websites worldwide. The Phensiveeas.pro will demand you to allow it to display Web browser notifications as soon as you launch the page. Users often will be asked to click on the ‘Allow’ button under the false pretense that they will not be able to access the interesting content hosted on the site unless they comply. However, there is no content to be viewed on the Phensiveeas.pro website, and permitting this site to send you push-notifications via your Web browser will turn into a nuisance quickly. While reputable websites will use the Web browser notifications feature to provide their users with useful information, fake sites...

Posted on February 27, 2020 in Browser Hijackers

Place-web.com

The Place-web.com website is yet another Web page utilizing the common trick known as ‘Please Press Allow to Continue.’ There are numerous sites online that exist for the sole purpose of hijacking the Web browser notifications of their visitors, and the Place-web.com page is one of them. Users who launch the Place-web.com website will be required to click on the ‘Allow’ button on their screens if they wish to continue and view the content they were looking for. However, like almost all pages of this type, the Place-web.com site does not host any valuable content as it is nothing more than an empty website. However, permitting this site to send you push-notifications via your Web browser will result in constant spam advertisements. Users state that even when they close their Web browser, they are still receiving push notifications...

Posted on February 27, 2020 in Browser Hijackers

CrowdExclusive

The CrowdExclusive application is designed to target Mac computers exclusively. This application is classified as adware. The CrowdExclusive adware is propagated via fake pop-up windows or bogus advertisement campaigns. The pop-up windows and fake advertisements spreading the CrowdExclusive application would claim that you need to install urgent updates on your system. Users will be urged to click on the link provided by the ad or the pop-up window, which is meant to trigger the installation of an upgrade for an application present on their computers. However, this is nothing more than a scheme. Attempting to download an update provided by a dodgy pop-up window or a shady ad will result in the installation of the CrowdExclusive adware on your Mac. Once the r CrowdExclusive application is installed on your computer, you will notice...

Posted on February 27, 2020 in Adware

Directionstab.com

The Directionstab.com search engine is a service promoted by a dodgy Web browser add-on. The Web browser extension pushing the Directionstab.com search engine is called Directions Tab, and it is known to promote itself as a useful tool that will provide its users with maps and directions that may come in handy when traveling. However, the Directions Tab tool fails to mention one crucial detail – it will change your default new tab page with a sponsored site called Directionstab.com. It is important to note that the services provided by the Direction Tab application are freely available online. This utility does not provide its users with any unique features or tools. Instead, the data displayed in the Directions Tab Web browser extension is pulled from services like Google Maps, Mapquest and Bing Maps. Remember that you do not need to...

Posted on February 27, 2020 in Potentially Unwanted Programs

Privatetab.org

The Privatetab.org domain belongs to a dubious search engine that is known to be promoted by various PUPs (Potentially Unwanted Programs) online. A PUP affiliated with the propagation of the Privatetab.org search engine is known to be a dodgy Web browser add-on compatible with the Mozilla Firefox and Google Chrome browsers. The Web browser extension involved in the spreading of the Privatetab.org search engine tends to pose as a tool that helps users protect their identity online. It also would claim to be a helpful tool that would aid users in protecting their search queries from the watchful eyes of advertisement companies. However, none of this is true. Users who install the dubious Web browser extension in question will have their default search engine replaced with the Privatetab.org search engine. Since no legitimate Web browser...

Posted on February 27, 2020 in Browser Hijackers
1 2 3 4 5 6 7 8 9 10 11 1,401