B.gtuvfpzd.xyz

Posted: September 12, 2016 | Category: Browser Hijackers
B.gtuvfpzd.xyz is a website that may bring unwanted ads and pop-ups to Web browsers with the help of adware or other low-quality software. The domain B.gtuvfpzd.xyz'may be used to host all kind of marketing content, but malware researchers state that the primary purpose of this page appears to be the distribution of fake Flash Player updates and other dubious software. It is strongly recommended not to download software from websites that you didn't visit on purpose, especially if they are...

Crypt0 Ransomware

Posted: September 12, 2016 | Category: Ransomware
The Crypt0 Ransomware is a Trojan that encrypts your files with the motivation of blocking them until you choose to pay its controlling threat actor a ransom fee. Paying these sums often results in undesirable consequences, rather than restoring your data, and malware experts recommend looking for other recovery options whenever you can do so. If they're active, most anti-malware monitoring products also should remove the Crypt0 Ransomware before it can encrypt any content. Brand-new...

SPCOptimizer

Posted: September 12, 2016 | Category: Possibly Unwanted Program
SPCOptimizer is a low-quality piece of PC optimization software whose interface is a blatant rip-off of CCleaner, a popular and reputable PC optimization utility that can remove junk files, as well as fix minor Windows Registry errors. While CCleaner might do its job fine, the same can't be said about SPCOptimizer. This utility, published and developed by Suresh Technologies, promises to improve a computer's performance, as well as to free up additional disk space. SPCOptimizer isn't fully...

Hackers Spread Monero Mining Malware Through Open FTP Servers

Posted: September 11, 2016 | Category: Hackers
As average personal computers are no longer powerful enough to mine cryptocurrencies, cyber criminals have found another way to steal resources and use them for their own benefit. The process known as ''mining'' consists of devoting free computer resources to solving mathematical problems that are needed for the validation of online transactions. A new and relatively easy to mine cryptocurrency named Monero, has captured the attention of hackers, who respectively developed new malware...

Search.getsports.co

Posted: September 11, 2016 | Category: Potentially Unwanted Programs (PUPs)
Search.getsports.co is a low-quality search engine linked to Get Sports, a Web browser extension that is meant to deliver news, updates, stories, and other sports-related content to the user's Web browser directly. The installation of the Get Sports extension also may introduce users to a Web browser toolbar that includes quick links to popular sports news outlets, as well as a search field that can be used to search the Web. All search queries executed via Get Sports' search field will end...

Researchers Find a New Way of Stealing Your Login Credentials via USB Devices

Posted: September 10, 2016 | Category: Cybersecurity
You need to leave the computer for a few minutes, but you don't want to shut it down? You think that by leaving it locked, your information will be safe from curious eyes? Rob Fuller has found a worryingly simple way of proving you wrong. When we say simple, the task is not exactly novice-friendly, but if modified correctly, an innocuous-looking USB device can be turned into a powerful password stealer . He was able to steal the passwords of users logged into locked out systems using two...

Cloud-based Malware Dominated by Ransomware Threats

Posted: September 10, 2016 | Category: Malware News
Social networks, collaborative platforms, and cloud services are among the most common infection vectors when it comes to malware, a report by Netskope reveals. The report states that over 43% of cloud-based malware consists of Javascript exploits, Office macros, PDF loopholes, and droppers. Jamie Barnett, CMO of Netskope, shared some other disturbing numbers about cloud storage. She is quoted saying that a worrying 10% of all enterprise-owned cloud storage 'has malware' in it, which is...

Miner-C Malware Sets Its Sights on Seagate NAS Devices

Posted: September 10, 2016 | Category: Malware News
Miner-C has been around for a few months now first detected by a security firm called GuardCore. A close inspection of Miner-C revealed that the malware displayed characteristics typical for worms. Initially, it targeted FTP servers with open FTP ports. Once it found a host, Miner-C would proceed towards brute-forcing its way into other servers using a list of default login credentials. Its ultimate goal is to use infected machines in order to mine for cryptocurrency. The criminals'...

100 Million Rambler.ru Accounts Compromised in a 2012 Data Breach

Posted: September 9, 2016 | Category: Cybersecurity
A person by the nickname of daykalif seems to be in possession of a lot of sensitive data. On September 1, he contacted a data breach indexing service called LeakedSource and gave away information stolen during the 2012 attack on Last.fm. The leak contained usernames, passwords, and other details related to more than 43 million accounts. On September 8, daykalif gave security company HEROIC access to more than 33 million passwords stolen in 2011 from a Russian instant messaging service called...

New Backdoor Creeps Its Way on Mac OS X

Posted: September 9, 2016 | Category: Mac Security
In the second week of September, security researchers with Kaspersky Lab pinned down a new version of an existing family of backdoors. The backdoor was first discovered in January 2016, when Kaspersky spotted and detailed the Mokes backdoor family. The threat was cross-platform from the start , targeting Windows and Linux. The new Mac OS X version has now been described in great detail by analyst Stefan Ortloff. The threat appears to be very high-profile, and this becomes evident even from...

GamesLava

Posted: September 9, 2016 | Category: Adware
GamesLava is a Potentially Unwanted Program (PUP) that, when installed, provides users with quick access to small, free online games. All of the games that this extension offers can be found at GamesLava.com, the official website of the company behind this software. At first sight, a small utility that provides you with game recommendations and links to intriguing online games may seem like an interesting tool to have in your Web browser. However, GamesLava doesn't offer anything unique – all...

Philadelphia Ransomware

Posted: September 9, 2016 | Category: Ransomware
The Philadelphia Ransomware is an update of the Stampado Ransomware and, like that threat also encrypts your files so that it can bargain for their restoration after you pay a ransom. Different builds of the Philadelphia Ransomware may target different types of data or install themselves through differing methods, although malware experts did verify the use of e-mail spam in the initial waves. Ideal recovery scenarios from this threat include deleting the Philadelphia Ransomware with your...

Dridex's Creators Want to Steal Your Bitcoin Wallet

Posted: September 8, 2016 | Category: Cybersecurity
The Dridex banking Trojan (previously known as Cridex and also referred to as Bugat ) has been around for quite some time now. At the beginning of the year, researchers observed a decline in its popularity when numerous ransomware families emerged and provided cyber criminals with a more hassle-free way of stealing money . That said, Dridex is not dead. Far from it. Experts at Forcepoint recently examined some new samples and came to the conclusion that over the last few months, the...

Trump Calls for New Investments in Cybersecurity During Speech for Military Programs

Posted: September 8, 2016 | Category: Cybersecurity
Presidential candidate Donald Trump has undoubtedly said more than his fair share of opinions on many matters that involve the security and stability of the United States. In Trump's quest to "trump" the election polls, he has come out to give his input on what should take place when it comes to cybersecurity, which is a looming issue that many have expressed their opinions on the task of beefing up infrastructures around the U.S. to ultimately combat cyberattacks . In Donald Trump's...

Hackers Use CCTV Cameras, Routers, and DVRs to Attack Telnet Ports

Posted: September 8, 2016 | Category: Hackers
Last year, CZ.NIC, the Czech national top-level domain administrator, set up a few honeypots in an attempt to gather more information about the way hackers act these days. The researchers' main idea was to see how threat actors try to infiltrate a system through SSH – the most widely used remote connection protocol. They did decide to leave Telnet as a 'complimentary feature,' just to see if somebody still uses it. The hackers do use it, they use it quite extensively. It turns out that the...

Chromestart5.ru

Posted: September 8, 2016 | Category: Browser Hijackers
If your Web browser opens Chromestart5.ru whenever you start it or attempt to open a new tab automatically, then it is very likely that you installed the Chromestart5.ru browser hijacker recently. A 'browser hijacker' may sound like something threatening, but you can rest assured that these applications are harmless, and their sole purpose is to hijack a Web browser's settings so that the user will be redirected to a particular website. This dubious software trick is often utilized to...

Vega Search 123

Posted: September 8, 2016 | Category: Browser Hijackers
Vega Search 123 is the name of a dysfunctional search engine that can be found on the website http://infosearchbox.com. This Web destination is safe, and its visitors will not be exposed to any suspicious content or offers to download dubious software. However, the lack of suspicious content does not mean that Vega Search 123 is a trustworthy search engine! This page is linked to a browser hijacker that may be spread with the help of shady distribution techniques whose purpose is to get users...

Start564.ru

Posted: September 8, 2016 | Category: Browser Hijackers
Start564.ru is a low-quality search engine that delivers search results by using the Yandex.ru search engine. The homepage of Start564.ru appears to be safe, as there are no links to 3rd-party websites that may be linked to the distribution of Potentially Unwanted Programs or more suspicious content. However, this does not mean that Start564.ru is a website that should be trusted, especially if you take into consideration that this page is linked to an aggressive and annoying browser...

KawaiiLocker Ransomware

Posted: September 8, 2016 | Category: Ransomware
The KawaiiLocker Ransomware is a Trojan that encrypts your files and creates instructions on how to pay for getting them restored. PC users with the option to do so always should use a free method of salvaging the contents of their hard drive without paying this threat's ransom. Although standard anti-malware products don't provide decryption features, they can delete the KawaiiLocker Ransomware to stop it from harming any other data. Much like threat campaigns, memes, and social fads come...

Calipso.god@aol.com Ransomware

Posted: September 8, 2016 | Category: Ransomware
The 'Calipso.god@aol.com' Ransomware is a Trojan that holds your files hostage until you pay a ransom. Because the 'Calipso.god@aol.com' Ransomware uses data-enciphering attacks that may be difficult or impossible to decode, malware experts recommend protecting the contents of your PC with backups on other systems, rather than by paying its fee. This threat will conceal its program files from the user, and anti-malware tools always should be used for removing the 'Calipso.god@aol.com'...