GoPlay Search

The GoPlay Search browser extension is a product by the same team who created the Videodrome Search extension. The GoPlay Search program is developed by a team of programmers associated with the bettersearchtools.com site. The bettersearchtools.com site appears to be the homepage for a dozen extensions on the Chrome Web Store including Better Search Tools, bestMovies Search Plus, Videodrome Search and betterMovies Home. Additionally, the GoPlay Search software has a clone named justPlay Search, which supports the same functionality and connects to the same sites, but it has a separate page on the Chrome Web Store. Both versions of GoPlay Search are classified as Potentially Unwanted Programs (PUPs) that are ad-supports products by bettersearchtools.com. The GoPlay Search (a.k.a. justPlay Search) extension and its clone can be found on...

Posted on June 22, 2017 in Possibly Unwanted Program

CloudExtender

The CloudExtender software is classified as an adware that you may install with a free program bundle if you forget to explore the 'Advanced' and 'Custom' options. The CloudExtender adware places a virtual layer between the user and the loaded site, which enables the app to display promotional images, banners, play video/audio commercials, redirect the user to third-party sites and show pop-up windows. Computer security experts note that the content provided via the CloudExtender adware may include links to fake lotteries, prizes on Facebook, coupons, and discounts at reputable stores like Amazon and Walmart. The CloudExtender program is not your typical adware considering that it is reported to perform multiple browser redirects every time the user starts an online session. Apparently, the CloudExtender adware may edit the shortcut...

Posted on June 22, 2017 in Adware

‘Critical Chrome Update’ Pop-Ups

The 'Critical Chrome Update' pop-up alerts that you may notice in Google Chrome and other browsers are not legitimate notifications by Google Inc. about updates regarding their browser. The 'Critical Chrome Update' notifications may include the Google Chrome logo and originate on a page that supports HTTPS connection, but it does not mean that it is safe to download the proposed update. Modern-day browsers support automatic updates and do not use pop-up windows from sites like 'oolidvagrantup.com' to invite the user to take action. Companies like the Mozilla Foundation, Google Inc., Microsoft Corp and many others rely on an automated system to push updates fast, securely and reliably. Do not trust the 'Critical Chrome Update' warnings on your screen. If the browser fails to install new updates, an exclamation mark icon would appear in...

Posted on June 22, 2017 in Adware

Search.heasyspeedtest.co

The Search.heasyspeedtest.co site is associated with yet another clone of the Test My Speeds that comes under the name of Easy Speed Test. Both programs come from the same developer—Polarity Technologies Ltd. and offer the same functionality. However, Test My Speeds changes the user's browser settings to Search.testmyspeeds.co while the Easy Speed Test browser extension changes the new tab, start page and search to Search.heasyspeedtest.co. Regardless of the small differences, the Easy Speed Test extension offers access to the same Internet speed tool at openspeedtest.com, which is embedded into Search.heasyspeedtest.co as a widget. You may be interested to know that Polarity Technologies Ltd. is not a partner of openspeedtest.com and the service has its own extension named Internet Speed Test by openspeedtest.com, which can be...

Posted on June 22, 2017 in Browser Hijackers

TeslaWare Ransomware

If your security program is detecting the TeslaWare Ransomware on your computer, it will probably be detecting a variant of a RaaS (Ransomware as a Service) platform that is active online currently. Con artists can use these platforms to create custom versions of ransomware, which they can then use to attack computer users. Security experts noted that this RaaS campaign was initiated in mid-June 2017. It only costs the con artists between $40 and $80 USD to access this service and carry out effective ransomware Trojan attacks. The con artists will buy access to the TeslaWare Ransomware source code, which they can then alter and distribute using their preferred methods. There are numerous RaaS platforms active currently, all of which have created competition among threat actor's groups, and affected how typical threat infections are...

Posted on June 22, 2017 in Ransomware

XMRig

PC security researchers have received reports of infections involving XMRiger, which will show up on a computer and then be very difficult to remove. This may be due to an association between XMRig and a rootkit threat, which tends to make it very difficult for computer users and traditional anti-malware software to combat it. XMRig is a miner specifically, a type of threat that is used to make money at the expense of computer users by using the infected computer users to mine Monero, a cryptocurrency. XMRig can cause a computer to overheat and perform poorly, since XMRig uses additional system resources, taking these away from the victim. PC security researchers advise computer users to make sure that they use a reliable security program that possesses anti-rootkit capabilities when dealing with threats like XMRig. How Threatening is...

Posted on June 22, 2017 in Trojans

Researchers Dig Into Mole Ransomware Attack That Hit UK Universities

On June 14, Ulster University and University College London reported that they have both been hit by what was described as a 'widespread ransomware attack.' The two institutions quickly put together response teams which set off to contain and remove the malware. Although the term 'zero day' was used rather lightly, the people tasked with fending off the attack did a good job overall. The first thing they did was to take the drives hosting shared information for students and teachers offline. Sadly, by that time, some of the data had already been encrypted. There was good news, though. Both universities had fresh backups that weren't affected by the ransomware. Over the next few days, the response teams restored the information, made sure that the malware is well and truly gone, and on June 19, everything went back to normal. At first,...

Posted on June 21, 2017 in Computer Security

‘Unknown Security Breach’ Pop-Ups

The 'Unknown Security Breach' pop-up windows are generated on untrusted pages that feature bad scripts, which might crash your browser when loaded. The 'Unknown Security Breach' warnings may look like security alerts from companies like Microsoft Corp. and Google Inc., but they offer misleading content. The text on the 'Unknown Security Breach' signs is intended to scare users with unfamiliar system files, virus names and error codes. PC security experts advise against following the instructions displayed on the 'Unknown Security Breach' pop-ups. The 'Unknown Security Breach' alerts are part of a technical support tactic and advertise toll-free phone lines that are operated by uncertified computer support agents. In reality, con artists pose as employees of Microsoft that are ready to help you remove the threats mentioned on the...

Posted on June 21, 2017 in Adware

Soundrad.net

The Soundrad.net site is offered to users as a nice new tab and home page replacement that comes with an integrated search from search.soundrad.net. PC users that love to listen to radio stations on the Internet may like the Soundrad.net site. You may want to know that the Soundrad.net site supports a browser extension named 'SoundRad Default Search.' At the time of research, the SoundRad Default Search browser extension is available to Google Chrome users only. Additionally, the SoundRad Default Search extension can be installed as an optional offer to a free software bundle. The SoundRad Default Search extension does not appear to have an official page on the Chrome Web Store considering the product page is hidden, and a careful research revealed it to be on:...

Posted on June 21, 2017 in Browser Hijackers

TraNs Ransomware

The TraNs Ransomware is an encryption ransomware Trojan that PC security researchers discovered in the second week of June in 2017. The TraNs Ransomware is being used against home computers rather than businesses or Web servers, which usually involves attacks from more high-profile and sophisticated threats. The TraNs Ransomware may be delivered to the victims using spam email messages. These emails may be presented as Microsoft Word document attachments, which will use corrupted scripts to download and install the TraNs Ransomware onto the victim's computer. Once the TraNs Ransomware has been installed on the victim's computer, it will carry out an attack that involves encrypting the victims' files and taking them hostage to demand the payment of a $550 USD ransom in exchange for a decryption program. How the TraNs Ransomware...

Posted on June 21, 2017 in Ransomware

NSMF Ransomware

The NSMF Ransomware is an encryption ransomware Trojan that is based on HiddenTear, an open source ransomware platform that was released in the Summer of 2015. Since the release of HiddenTear, countless variants of its ransomware platform have been released, ranging from sophisticated threat campaigns to ransomware Trojans that could be seen as a prank or joke. The NSMF Ransomware is not a sophisticated threat. However, since it is based on HiddenTear, the NSMF Ransomware does carry out an effective encryption ransomware attack which will make its victims' files inaccessible. How the NSMF Ransomware may Enter a Computer PC security researchers advise computer users to take steps to protect their machines from the NSMF Ransomware and similar ransomware attacks, mainly through the use of a reliable security application and having backup...

Posted on June 21, 2017 in Ransomware

Gansta Ransomware

The Gansta Ransomware is a ransomware Trojan used to force computer users to pay a ransom after elements of their computers have become compromised. Ransomware Trojans like the Gansta Ransomware range from harmful infections where it is nearly impossible to recover the files affected by a threat created as a prank. Fortunately, the Gansta Ransomware infection seems to have been created as a joke between different hackers and does not seem to indicate that the Gansta Ransomware was intended for widespread distribution or attacks. Is the Gansta Ransomware an Inconvenient Joke? Maybe, there is no reason to be afraid of the Gansta Ransomware. Everything about the Gansta Ransomware seems to indicate that hackers created the Gansta Ransomware as a way to prank their friends and the Gansta Ransomware does not seem to carry out an attack...

Posted on June 21, 2017 in Ransomware

Ransomware Cripples South Korean Hosting Company, Ends Up Paying $1 Million Ransom

Have you ever wondered how damaging and expensive a ransomware attack can be exactly? Here's an example that should give you an idea. On June 10, a Korean web hosting provider going by the name Nayana was hit by a file-encrypting malware known as Erebus. 153 Linux servers were affected which represent more than half of the company's entire infrastructure. Thousands of websites went down, and according to ZDNet's Korean edition, the list of victims includes the AIDS Prevention Association of Korea and the National University Department. Of course, countless small and medium-sized businesses were also left without an Internet presence, and because Nayana is still in the process of paying the ransom and bringing everything back to normal, the amount of lost money is still growing. But why is the whole thing taking so long? In the...

Posted on June 20, 2017 in Computer Security

SpecialSearchOffer Search

The SpecialSearchOffer Search browser extension may be promoted to users as an online shopping utility that can help you save money while purchasing goods on the Internet. The SpecialSearchOffer Search browser extension is a third-party software that is not associated with reliable online stores like Amazon, eBay, Walmart and others. The SpecialSearchOffer Search app is identified as a browser hijacker that may make changes to your Internet settings and reroute your searches via Search.ssoextension.com/s?q= to Search.yahoo.com. The SpecialSearchOffer Search browser hijacker was reported by users in June 2017 after their browser began to use the Search.ssoextension.com/s?q= site as their default search provider. Web surfers reported being sent to Search.ssoextension.com/s?q= and then to Search.yahoo.com, which is the legitimate version...

Posted on June 20, 2017 in Browser Hijackers

Videodrome Search

The Videodrome Search browser extension from Bettersearchtools.com is classified as a clone of the MyMovie Start software by Myappline.com. Both applications behave like WowMovix, MixMovie, and nJoy Movies Search. Moreover, the programs mentioned before correspond to the same site—movix.searchalgo.com and the search portal— Searchalgo.com that is associated with cases of browser hijacking. PC users may be suggested that Videodrome Search offers access to movies, photos of celebrities and trailers for upcoming big screen titles. However, the Videodrome Search browser extension does not provide exclusive access to such content. The Videodrome Search app is classified as a Potentially Unwanted Program (PUP) that shares information about your online routine with advertisers with the aim to generate ad revenue for its creators. At the time...

Posted on June 20, 2017 in Possibly Unwanted Program
1 2 3 4 5 6 7 8 9 10 11 12 13 1,164