Popcorn Time Ransomware

Posted: December 8, 2016 | Category: Ransomware
The 'Popcorn Time' Ransomware is a Trojan that uses a double layer of the Base64 encryption to lock your files, such as images and text documents. It explains its attacks in an accompanying ransom message as being a solicitation for funding for victims of Syrian warfare. The frequent accompanying dishonesty and lack of reliability in these texts cause malware experts to recommend other recovery choices, when possible, along with removing the 'Popcorn Time' Ransomware through the conventional...

Crypt.Locker Ransomware

Posted: December 8, 2016 | Category: Ransomware
The Crypt.Locker Ransomware is an update of the Jigsaw Ransomware, a Trojan that can both encrypt your files to lock them and delete them. Like its predecessor, the Crypt.Locker Ransomware uses time-based mechanisms for its data-erasing attacks, and a prompt and cautious response for limiting its damage potential is critical. Removing the Crypt.Locker Ransomware should use dedicated anti-malware tools supported by standard security techniques as described in this article, regardless of the...

QuickWeatherAlert Toolbar

Posted: December 8, 2016 | Category: Possibly Unwanted Program
The QuickWeatherAlert Toolbar is a Potentially Unwanted Program (PUP) published by Mindspark Interactive Network, a company whose name is linked to a long list of browser toolbars and extensions that aim to improve the overall Web browsing experience of their users. While some of their other products provide users with access to live radio stations, such as the DiscoverLiveRadio Toolbar , others focus on providing users with relevant information such as the current weather conditions, and...

MyDigitalCalendar Toolbar

Posted: December 8, 2016 | Category: Possibly Unwanted Program
The Mindspark Interactive Network has added another product to its portfolio – MyDigitalCalendar. This extension is meant to improve the users' online experience by allowing them to organize tasks, meetings, and set up reminders from their Web browser directly. This software is available for Internet Explorer, Mozilla Firefox, and Google Chrome so that the majority of Internet users should be able to take advantage of what it has to offer. However, we'd like to warn our readers that the...

Driver Updater Plus

Posted: December 7, 2016 | Category: Potentially Unwanted Programs (PUPs)
The Driver Update Plus is a Potentially Unwanted Program (PUP) that offers users the opportunity to keep all their drivers up-to-date automatically, with the help of one single piece of software. The publisher of the Driver Update Plus is Jawego Partners LLC, a company whose name is linked to other potentially unwanted applications such as PC Clean Plus . The Driver Update Plus software can indeed work as a tool to help you keep your software up-to-date, but you should keep in mind that the...

Vo_ Ransomware

Posted: December 7, 2016 | Category: Ransomware
The Vo_ Ransomware is a Trojan whose family encrypts your files to lock them while also adding a new prefix or extension to each name. Its attacks also solicit Bitcoin payments, which its authors claim will pay for a decryption program to reverse the data blockade. Although these recovery methods are potentially costly for no gain, malware researchers do encourage removing the Vo_ Ransomware through the usual anti-malware tools. For the creators of threatening software, copying previous...

Phoenix Ransomware

Posted: December 7, 2016 | Category: Ransomware
The Phoenix Ransomware is a variant of the RIP Ransomware, a Hidden Tear-based threat that locks your files and creates ransoming messages for selling its decryption solution. The Trojan targets specific directories and formats of content for locking, which may cause damage that the victim can't reverse. Protecting your PC with anti-malware tools capable of removing the Phoenix Ransomware and backups for recovering content at no charge are the two most highly-recommended tactics against this...

FreeManualsIndex Toolbar

Posted: December 7, 2016 | Category: Possibly Unwanted Program
The FreeManualsIndex Toolbar is a browser add-on whose purpose is to provide the user with quick access to a rich library of manuals for all sorts of devices and appliances. The list of manuals is arranged into categories and brands, and users also get the ability to use a search feature to look for particular models. While this is certainly a useful tool to have at your disposal, it does not provide you with an irreplaceable feature since the same content can easily be found by using your...

Discretesearch.com

Posted: December 7, 2016 | Category: Browser Hijackers
Discretesearch.com is a search engine that offers users the ability to keep their searches hidden from the spying eyes of major search aggregators like Google, Bing and Yahoo. According to the owners of Discretesearch.com, every search query you run through popular search engines is logged and may be used for marketing purposes such as improving the quality of the ads you see while browsing the Web. You may see this is a bad thing, but if you think more about it, you'll realize that avoiding...

Supermagnet@india.com Ransomware

Posted: December 7, 2016 | Category: Ransomware
The 'Supermagnet@india.com' Ransomware is a variant of the Dharma Ransomware. Both Trojans block your files, such as documents and pictures, with an encryption-based attack that modifies their internal data through an algorithm. Since this threat is non-decryptable by public means, malware researchers advise restoring any lost content from a backup after deleting the 'Supermagnet@india.com' Ransomware with any anti-malware product you consider appropriate. Trojans reusing attacks from...

GoldenEye Ransomware

Posted: December 7, 2016 | Category: Ransomware
The GoldenEye Ransomware is a Trojan that combines the data-encrypting features of both the Petya Ransomware and the Mischa Ransomware. In addition to locking your files, it can modify the underlying file system and interfere with the boot-up process negatively. PC users should protect their computers with anti-malware software able to delete the GoldenEye Ransomware before it compromises the system. Although they haven't seen the widespread recognition of 'freeware' threats like Hidden...

'Add Extension' Pop-Up

Posted: December 6, 2016 | Category: Adware
The 'Add Extension' pop-up is a browser-based attack that can install unwanted or threatening software through fraudulent pretenses. Since the 'Add Extension' pop-up requires contact with a hostile or compromised domain, PC users should monitor their browsing habits for reappearing safety issues, such as risky social networking links. Some anti-malware products also include protection against the 'Add Extension' pop-up and similar attacks. The weakest link in a campaign for distributing...

Satan666 Ransomware

Posted: December 6, 2016 | Category: Ransomware
The Satan666 Ransomware is a Trojan that encodes your files with a cipher so that it can sell its victims a decryption service. These encryption attacks are not always reversible, and con artists often refuse to give any assistance after taking their money, which makes keeping backups critical for limiting an infection's consequences. Your anti-malware programs also may identify and delete the Satan666 Ransomware without letting its file-encrypting payload trigger. The power of a brand is...

Osiris Ransomware

Posted: December 6, 2016 | Category: Ransomware
The Osiris Ransomware is a new version of the '.locky File Extension' Ransomware. Its symptoms, including desktop-hijackings, Web-based ransom messages, and threatening data-encrypting attacks meant to lock your files, are consistent with other members of this family. Vulnerable PC users can protect their PCs by updating all anti-malware software for removing the Osiris Ransomware accurately, as well a scrutinizing common infection vectors like e-mails. The '.locky File Extension'...

DirectionsWhiz

Posted: December 5, 2016 | Category: Potentially Unwanted Programs (PUPs)
DirectionsWhiz is a Potentially Unwanted Program (PUP) that may have an adverse impact on your Web browsing experience once you decide to install it. The purpose of this software is to help users find the quickest routes to their preferred destination, as well as to serve as an easily accessible map that can provide routing directions and other information such as local landmarks, nearby shops, ATMs, and other important places. However, the DirectionsWhiz software also may apply potentially...

'Windows Defender Prevented Malicious Software' Scam

Posted: December 5, 2016 | Category: Uncategorized
The 'Windows Defender Prevented Malicious Software' scam is a trick that con artists may use to convince people to pay money for non-existing services or useless software solutions. Unlike most technical support tactics, the 'Windows Defender Prevented Malicious Software' scam does not rely on Web browser pop-ups to lure potential victims. Instead, it uses a stand-alone application that may be propagated as fake software, or it also may be included in pirated software and other illicit...

'Microsoft Help Desk Tech Support' Scam

Posted: December 5, 2016 | Category: Trojans
The 'Microsoft Help Desk Tech Support' scam is associated with a corrupted Windows executable file whose purpose is to lock a user's desktop by displaying a fake Blue Screen of Death (BSOD) that can't be closed without following the on-screen instructions. The BSOD is well-designed and the text it displays warns users that system drivers have crashed and there's a problem with the Windows file 'gv3.sys.' The BSOD acts as if it is very helpful, as it instructs users to call 888-828-6971 to get...

RIP Ransomware

Posted: December 5, 2016 | Category: Ransomware
The RIP Ransomware is a Trojan that encrypts your files to lock you out of using them so that it can bargain for ransom money. Con artists don't always honor these transactions, and malware researchers emphasize the usefulness of having backups to circumvent most decrypting problems repeatedly. The standard anti-malware protection provided by your security software also can remove the RIP Ransomware before it completes encoding the contents of your drive or server. As con artists continue...

NoValid Ransomware

Posted: December 5, 2016 | Category: Ransomware
The NoValid Ransomware is a Trojan that attacks your data with a cipher to lock the files. While victims may try to pay the NoValid Ransomware's ransom for recovering the blocked content, these payments can be in vain, and malware experts always advise finding alternatives. Because of the time necessary for this Trojan's payload to complete, qualified anti-malware products should detect and remove the NoValid Ransomware before it finishes damaging your files. The NoValid Ransomware is a...

Sage Ransomware

Posted: December 5, 2016 | Category: Ransomware
The Sage Ransomware is a Trojan that encrypts your files so that you can't open them and, then, delivers instructions on paying its threat actors to get access to the decryptor. If not blocked by security software before its most visible symptoms appear, this threat may cause permanent file damage. Malware experts recommend having anti-malware tools for quarantining or removing the Sage Ransomware, and backups for recovering from worst-case scenarios. Just as legal businesses know that...