Beware: Malicious Pokemon App Hijacking and Rooting Android Devices

Posted: September 15, 2016 | Category: Cybersecurity
At any given time during today's culture, there is a hot item that captivates millions around the world. Today, one of those in things happens to be the Pokemon GO app that has taken the smartphone and mobile device world by storm in recent months. Unfortunately, with the fame of Pokemon GO hackers have leveraged its popularity to masquerade malicious Pokemon apps only to hijack and root Android devices. Countless users are intrigued by the new Pokemon GO game and could be on the hunt for...

'844-307-1890' Tech Support Scam

Posted: September 15, 2016 | Category: Browser Hijackers
The '844-307-1890' tech support scam is an attack that imitates Windows system alerts to redirect computer users towards a fake technical support number. Con artists manning these lines may request information or try to gain access to your computer, which could help them launch other attacks. Besides recognizing the clear signs of an '844-307-1890' tech support scam, you can best protect your PC by having anti-malware tools for blocking the '844-307-1890' tech support scam and removing...

Searchtechstart.com

Posted: September 15, 2016 | Category: Browser Hijackers
Searchtechstart.com is a low-quality search engine that may not have any valuable features to offer to its visitors. However, despite its lack of any interesting features or tools, the Searchtechstart.com website seems to be generating a significant amount of traffic on a daily basis. This is because its authors may use dubious tricks to attract more viewers to this website, even if they have to force the user's Web browser to redirect them to Searchtechstart.com whenever they attempt to use...

HDD Encrypt Ransomware

Posted: September 15, 2016 | Category: Ransomware
The HDD Encrypt Ransomware, also detected as Mamba, is a Trojan that encrypts your PC's data at the disk level instead of isolating individual files. Because these attacks block you from both your information and your operating system, alternate system boot-up strategies may be mandatory for restoring the affected machine. When prescriptive security steps can't prevent an infection, use your anti-malware products for identifying and deleting the HDD Encrypt Ransomware before it can complete...

Qubiv

Posted: September 14, 2016 | Category: Adware
Qubiv is the name of a website that allows users to play Flash-based online games free of charge. The website also offers its users the opportunity to download the Qubiv Web browser extension, which may introduce a toolbar to Web browsers like Chrome, Firefox and Internet Explorer. The Qubiv toolbar provides a search field, as well as quick links to some of the most popular games on Qubiv. Keep in mind that every 'feature' that Qubiv offers can be accessed by visiting Qubiv's official website...

Outfire Browser

Posted: September 14, 2016 | Category: Adware
The Outfire Browser is a Chromium-based Web browser that resembles Chrome strongly, but also provides some of the functions that are common to adware and browser-hijacking extensions. Trojans monetizing this browser may use it to replace Chrome or any other, default browser you may be using. Since its features provide no user benefits and have significant implications regarding other security issues, malware experts advise deleting the Outfire Browser with your anti-malware software and...

LockLock Ransomware

Posted: September 14, 2016 | Category: Ransomware
The LockLock Ransomware is a Trojan that blocks your files by encoding them with a cipher, with its modifications detectable from additional changes in the extension tags. The LockLock Ransomware campaign uses ransom messages for soliciting payments in return for decryption help, although this threat does belong to a family that is often easy for members of the PC security sector to decode. Even if you do choose to pay the threat actor's fee, your anti-malware software should always be...

Searchiksa.com

Posted: September 14, 2016 | Category: Browser Hijackers
Searchiksa.com is a dubious search engine that features a customized Google Search field. The page does not appear to link to any external websites, nor does it include ads or other content that may be associated with promoting low-quality software or suspicious Web destinations. However, the Searchiksa.com website may be linked to more than one browser hijackers whose purpose is to convince users into agreeing to install them, therefore allowing them to modify a Web browser's configuration...

Atom Ransomware

Posted: September 14, 2016 | Category: Ransomware
The Atom Ransomware is an updated variant of the Shark Ransomware and includes most of that threat's features, such as encrypting your files and creating extortion messages. The Atom Ransomware's distribution model uses third parties that may implement unpredictable install exploits, although blocking this threat can prevent your PC from suffering from a potentially unrecoverable loss of data. Detecting this Trojan beforehand or removing the Atom Ransomware after its installation always...

CatHomepage Toolbar

Posted: September 14, 2016 | Category: Possibly Unwanted Program
CatHomepage is a Web browser extension developed and published by Mindspark Interactive Network. This software is identified as a Potentially Unwanted Program, and its purpose is to make the user's homepage a bit more attractive by adding cute cat pictures. While seeing cute and fluffy cats every time you launch your Web browser may seem like a great way to better your mood, you should also know that the installation of CatHomepage may replace your Web browser's default new tab page. All...

NsCpuCNMiner32.exe

Posted: September 13, 2016 | Category: Potentially Unwanted Programs (PUPs)
NsCpuCNMiner is a Trojan that uses your PC's hardware to generate Monero coins, a cryptocurrency similar to Bitcoin. Extended exposure to NsCpuCNMiner infections may cause permanent damage to your PC, as well as be a point of origin for various system instability issues. Since this threat does include self-distribution capabilities, malware experts recommend using anti-malware tools to uninstall NsCpuCNMiner while keeping any contact with any systems or storage devices to a minimum. The...

Discoveranswer.com

Posted: September 13, 2016 | Category: Browser Hijackers
Discoveranswer.com is a browser hijacker that attempts to offer an internet search feature as its primary service. Use of the Discoveranswer.com site is not harmful to a Windows PC. However, the Discoveranswer.com page is known to have advertisements or sponsored links displayed, which if used, may cause unwanted redirects loading pages that have unwanted content. One of the more discerning issues of Discoveranswer.com is that it has components that load from the installation of random...

Detailexplore.com

Posted: September 13, 2016 | Category: Browser Hijackers
Detailexplore.com is a search engine that few people would visit on their own, considering that they can use legitimate search aggregators such as Google, Bing and Yahoo. However, sometimes Detailexplore.com may appear in a user's Web browser, even though the person in question has never heard of this page before. This may seem like a weird occurrence at first, but there's a perfectly reasonable explanation why this may happen. The reason is a small piece of software that anti-malware product...

Allinchrome.com

Posted: September 12, 2016 | Category: Browser Hijackers
The Allinchrome.com start page on your screen may be a sign of an infection with a browser hijacker. The Allinchrome.com portal is deemed as untrusted and is known to redirect users to a low-quality search provider registered as Atajitos.com . Security analysts note that Atajitos.com is an unreliable search provider and is blacklisted by most Web filtering services. Using Allinchrome.com to search the Web is not advised because you may be suggested to open potentially compromised pages and...

FreeMaps Toolbar

Posted: September 12, 2016 | Category: Potentially Unwanted Programs (PUPs)
The FreeMaps Toolbar is a re-branded variant of the MapsGalaxy Toolbar by Mindspark Interactive Network LLC. The FreeMaps Toolbar is supposed to offer users easy access to driving directions from public services like Google Maps and HERE Maps. The FreeMaps Toolbar is compatible with Google Chrome, Mozilla Firefox and Internet Explorer. An analysis of the FreeMaps Toolbar shows that the FreeMaps Toolbar acts as the-middle-man between you and services from Google and Microsoft. The FreeMaps...

'+61 (1800) 893-775' Pop-Ups

Posted: September 12, 2016 | Category: Browser Hijackers
The '+61 (1800) 893-775' pop-ups are part of a technical support tactic whose affected computer users are most likely to be residents of Australia due to '+61' being the country code of Australia. These pop-ups may appear out of nowhere, and most users are surprised by them because they tend to be accompanied by audio files that are played automatically and a number of annoying alerts and warnings that may prove to be difficult to close. The text and audio content tell users the same thing –...

'844-730-8222' Pop-Ups

Posted: September 12, 2016 | Category: Browser Hijackers
The '844-730-8222' pop-ups are misleading messages that may appear in your Web browser while you browse any of your favorite pages. Pop-ups of this type may often report non-existent computer problems or attempt to promote questionable technical support services that may cost hundreds of dollars. One website that is known to host the '844-730-8222' pop-ups is hxxp://computervirusalertsystem.today. Users who come across this page may often be taken there when they browse low-quality websites...

Galaxy-s7.megaprizes.xyz

Posted: September 12, 2016 | Category: Browser Hijackers
Galaxy-s7.megaprizes.xyz is a dubious website that is used to host fake reward offers, raffles, and other content that claims to give users the opportunity to win amazing prizes. The domain name includes the phrase 'Galaxy S7', and this is exactly what this website offers as a gift – the chance to win a brand new 'Samsung Galaxy S7,' as well as a 'Samsung Gear VR' device. Its authors have even taken the time to plagiarize the layout design of Facebook, as well as to create a comment section...

CryPy Ransomware

Posted: September 12, 2016 | Category: Ransomware
The CryPy Ransomware is a file encryption Trojan that uses ciphers to block your computer's data while it demands a ransom fee. Free decryption assistance is not always available or risk-free, and malware researchers suggest using other ways of protecting your files that don't require breaking the CryPy Ransomware's encryption code. Even if you can't restore the ransomed content, deleting the CryPy Ransomware through appropriate anti-malware strategies will keep it from encoding or erasing...

'888-898-3501' Pop-Ups

Posted: September 12, 2016 | Category: Browser Hijackers
The '888-898-3501' pop-ups are technical support hoaxes that claim to be alerting PC users to a variety of security issues, including threat infections. Con artists may use these attacks to gain access to your PC or collect money by selling a fake PC repair product. Legitimate security software, such as anti-malware and anti-adware suites, can remove the '888-898-3501' pop-ups by deleting their associated local files, but even a single encounter with these pop-ups can endanger your system....