'844-324-6233' Tech Support Scam

Posted: September 30, 2016 | Category: Browser Hijackers
The '844-324-6233' tech support scam is a fraudulent scheme that works by tricking users into believing that their computer's performance and stability are suffering from software and hardware issues. This tech support scam does this by displaying a fake error message on top of all other Windows, and advising users to call 844-324-6233 for assistance. As you can probably guess, this number is not affiliated with any reputable technical support services, and its sole purpose is to help con...

Yahoo Confirms the Biggest Data Breach in History

Posted: September 29, 2016 | Category: Cybersecurity
It all started in August when security experts stumbled upon an advert from a hacker nicknamed Peace_of_Mind who offered sensitive information related to quite a few Yahoo accounts on TheRealDeal Dark Web market. He wanted 3 bitcoins (about $1,800 at the current rate) in exchange for a data dump that, in his own words, contained the names, usernames, MD5 hashed passwords, and dates of birth of around 200 million Yahoo users. According to the ad, the data was stolen in 2012. Peace_of_Mind is...

Tofsee Botnet's Survival Hangs in the Balance

Posted: September 29, 2016 | Category: Malware News
Tofsee is a piece of malicious software that's been out in the wild for quite a while now. It's known for using infected PCs as cryptocurrency miners and as click fraud machines. Another feature has enslaved thousands of computers into a botnet that is referred to either as Tofsee or as GHEG. The botnet has been around for just as long as the malware that created it. It's a powerful tool for spammers. Throughout the years it has sent countless messages advertising either pharmaceutical...

Cloud System Care

Posted: September 29, 2016 | Category: Possibly Unwanted Program
Cloud System Care is a PC optimization utility that promises to improve your computer's overall performance, reduce the time Windows needs to start, as well as reduce the loading time of various applications. According to Cloud System Care's official website, the program achieves this by cleaning and optimizing the Windows Registry, removing junk files and fixing various PC errors. It is true that software that executes this task might be able to improve a computer's performance slightly, but...

StreamlinedDIY Toolbar

Posted: September 29, 2016 | Category: Possibly Unwanted Program
StreamlinedDIY is a browser toolbar that is identified as a Potentially Unwanted Program by a large number of popular anti-malware solutions. This toolbar claims to provide users with expert DIY tutorials that cover a broad range of topics such as home improvement, technology tricks, life hacks, recipes, and even money-saving suggestions. While this may seem like an attractive tool to have at your disposal, we'd like to inform you that the content which StreamlinedDIY promotes is not original...

EasyWeatherAlert Toolbar

Posted: September 29, 2016 | Category: Possibly Unwanted Program
EasyWeatherAlert is a toolbar developed by Mindspark Interactive Network, the company behind toolbars like WeatherBlink Toolbar , HowToSimplified Toolbar , TrackAPackage Toolbar , and similar software. The EasyWeatherToolbar promises to provide users with information about the local and national weather, weather forecasts, and a real-time weather radar. It is true that the EasyWeatherToolbar provides such information, but its sources are 3rd-party websites and services that aren't...

Krypte Ransomware

Posted: September 29, 2016 | Category: Ransomware
The Krypte Ransomware is a variant of the Razy Ransomware, a Trojan that encrypts your content and loads a note ransoming their decryptor (despite it not saving the pertinent decryption information). PC owners can mitigate the data loss of the Krypte Ransomware infections by keeping regular backups elsewhere. Anti-malware tools also should be able to detect and delete the Krypte Ransomware, or Trojan installers circulating through common compromise techniques such as e-mail attachments....

Android.Lockscreen Ransomware Means Business This Time

Posted: September 28, 2016 | Category: Malware News
Android.Lockscreen is one of the many ransomware families that attack Google's popular mobile operating system . Unlike its PC counterparts, it doesn't encrypt any files. As the name would suggest, it instead changes your password, puts up a lockscreen, and locks you out of your phone or tablet. Android.Lockscreen first started infecting Android devices back in March 2015, and it urged victims to make a phone call to what was represented as technical support. In reality, the hackers were...

'Validate Copy Of Your Microsoft Windows' Tech Support Scam

Posted: September 28, 2016 | Category: Adware
The 'Validate Copy Of Your Microsoft Windows' tech support scam is a hoax using a fake Windows authentication process to compromise information, collect money, or damage your PC's security. These attacks may implement themselves in a screen-locking format that blocks your use of the Windows UI or other applications. Malware experts recommend using standard anti-malware tools and strategies to remove this threat by deleting the threatening software or temporary files that may let it load...

DXXD Ransomware

Posted: September 28, 2016 | Category: Ransomware
The DXXD Ransomware is a file-encoding Trojan that uses encryption to take your saved data hostage. These attacks most often are initial phases in ransom strategies that try to sell decryption options to the victims, although there are free decryptors for the DXXD Ransomware. Use whatever means you see fit to recover your encrypted content, but only after deleting the DXXD Ransomware with anti-malware tools to prevent any new attacks. Social engineering often is just as important to the...

Usr0 Ransomware

Posted: September 28, 2016 | Category: Ransomware
The Usr0 Ransomware is a Trojan that encrypts your PC's files, such as spreadsheets or images, and asks you to contact an e-mail address for instructions on decoding them. Almost all threat actors use similar attacks for demanding money from their victims, potentially under a restrictive time limit. Since this recovery method is uncertain and rewards a con artist behavior, malware analysts advise using other data restoration options while also uninstalling the Usr0 Ransomware with a qualified...

Help_you@india.com Ransomware

Posted: September 28, 2016 | Category: Ransomware
The 'Help_you@india.com' Ransomware is a Trojan that encrypts and renames your files and displays a pop-up recommending that you contact an e-mail address for assistance. These attacks can lead to permanent data loss, in some cases, even if the victim pays any fee the Trojan's administrators demand for their help. Besides using standard data protection strategies, you also can limit the harm caused by this threat by using anti-malware security capable of removing the 'Help_you@india.com'...

Stampado Ransomware Stopped in its Path with Free Decrypter

Posted: September 27, 2016 | Category: Malware News
Malware has been around for quite a while, but it is rapidly evolving to have a more aggressive approach to causing utter destruction. New threats are coming out each and every day, and older ones are getting updates. There is, of course, an incentive to put in an extra effort to make the computer experience of others worse. One of the hottest trends in cyber-crime is ransomware. As suggested by its name, it is a piece of malware that encrypts your valuable data and demands a ransom from you...

Over 100 Elite University Sites Hacked

Posted: September 27, 2016 | Category: Internet Security
A recent investigation has unearthed troubling information about the websites of dozens of high-class American universities. It seems that SEO spam has been subtly injected into their homepages without the knowledge of the webmasters. SEO stands for Search Engine Optimization; that is the process which determines the visibility of a website or page in a search engine's results. Fundamentally, it determines what gets to be on top of the front page. SEO has become a huge part of the internet...

'0800-015-4654' Pop-Ups

Posted: September 27, 2016 | Category: Adware
The '0800-015-4654' pop-ups are corrupted messages that may impair a Web browser completely by preventing users from accessing any of their tabs, bookmarks or browser tools. The appearance of these pop-ups may often come as a complete surprise, because they might get to your Web browser either via threatening software or when you visit a low-quality website that promotes the '0800-015-4654' pop-ups. Some of the pages that may host these pop-ups are rockno20.xyz, rockno19.xyz, rockno21.xyz,...

'888-345-8305' Pop-Ups

Posted: September 27, 2016 | Category: Adware
888-345-8305 is a phone number involved in an online technical support tactic that may be used to collect money and data from the computer user. Users may come across this number in the '888-345-8305' pop-ups, which may appear in their Web browser under certain circumstances such as visiting a corrupted website or installing an unsafe piece of software. When the '888-345-8305' pop-ups appear in a Web browser, they may prevent users from accessing most of the browser's features such as the...

Additionalsearch.co.uk

Posted: September 27, 2016 | Category: Browser Hijackers
Additionalsearch.co.uk is a low-quality search engine that is part of the Ask Partner Network. Usually, users tend to stay away from unreliable search engines, and they prefer using Google, Bing, Yahoo, and other popular online search solutions. However, Additionalsearch.co.uk may use aggressive methods to get users to take advantage of its services. This website is linked to a browser hijacker whose purpose is to modify a Web browser's settings so that it redirects users to...

'.odin File Extension' Ransomware

Posted: September 27, 2016 | Category: Ransomware
The '.odin File Extension' Ransomware is a Trojan built off of the preexisting code of the '.locky File Extension' Ransomware (or simply Locky). The '.odin File Extension' Ransomware uses a combination of the AES-RSA encryption method to encode and block your files while preventing you from identifying the key for decrypting them back to their prior formats. Until safe decryption solutions for this family become available, PC owners should use backups to mitigate any file damage and...

Win Heal 2016

Posted: September 27, 2016 | Category: Possibly Unwanted Program
Win Heal 2016 is a system cleaner that claims to identify security flaws and remove junk data from your PC. Malware experts confirm Win Heal 2016's scan results as being predetermined and fraudulent, with its services providing no significant features beyond promoting a hoax-linked phone line. Withhold any information from threat actors operating through Win Heal 2016's hotline and use a legitimate anti-malware product for uninstalling Win Heal 2016 as appropriate. Even while many threat...

Donald Trump Ransomware

Posted: September 27, 2016 | Category: Ransomware
The Donald TrumpRansomware is a Trojan that renames the files on your PC and displays a pop-up claiming that they're locked. As a probable data encrypting Trojan that still in development, the Donald TrumpRansomware's weaknesses include keeping redundant backups and paying attention to its most likely infection vectors, such as e-mail spam. You can remove current versions of the Donald TrumpRansomware with anti-malware products without requiring any extra steps for unlocking your data....