Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

GayFreeVideos

Posted: July 24, 2009 | Category: Uncategorized

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

Lemon_Duck

Posted: October 7, 2019 | Category: Malware | Threat Level: 6/10
Lemon_Duck is a worm and cryptocurrency-mining Trojan that hijacks your PC's CPU for generating cryptocurrency. Lemon_Duck contains robust support for self-distribution, and, in particular, can infect removable devices and travel throughout vulnerable networks laterally. Isolate compromised systems and have a trusted anti-malware product remove Lemon_Duck safely in all circumstances. A threat that's been mining its way through Asia is turning its sights further abroad, as the cyber-security industry is confirming its presence on multiple, enterprise-grade networks over the world. In many...

Microsoft Security Essentials Alert Virus

Posted: August 21, 2012 | Category: Fake Warning Messages
Microsoft Security Essentials Alert Virus The Microsoft Security Essentials Alert Virus is a ransomware Trojan that imitates the pop-up alerts of Microsoft Security Essentials to encourage you to pay an illegal fine through one of several methods. Because Microsoft Security Essentials Alert Virus may block other programs to prevent you from removing Microsoft Security Essentials Alert Virus and its pop-up, SpywareRemove.com malware analysts recommend disabling Microsoft Security Essentials Alert Virus's startup exploits prior to any anti-malware scans that could delete Microsoft Security Essentials Alert Virus safely. Contrary to...

ContraVirus Removal Instructions

Posted: June 18, 2007 | Category: Spyware Removal
ContraVirus is an illegal and corrupt anti-spyware program! ContraVirus pretends to act like an anti-spyware program, but it’s a very dangerous program that may scare you with false alerts so you’ll buy their software. Once you click on the fake message, you’ll be taken to ContraVirus’s website. ContraVirus may not really clean your computer, but may actually impair your computer, stealing your money. You have many options for detecting and removing ContraVirus. The most extreme is reformatting your PC, possibly costing you all of your data and definitely...

Bad Image Virus

Posted: February 1, 2012 | Category: Fake Warning Messages
The Bad Image Virus, also known by the name 'Bad Image error,' is a symptom of infection by a Trojan or rogue security program that pretends to be a legitimate warning message from Windows. Although legitimate Bad Image pop-ups are indicative of damage to an application's files that should be repaired by reinstalling the program in question, fraudulent Bad Image pop-ups don't offer legitimate information about your PC and may be used to market scamware or confuse you about the state of your computer's health. Because the Bad Image Virus is likely to occur in a Trojan infection scenario,...

UDS:DangerousObject.Multi.Generic

Posted: June 26, 2013 | Category: Malware | Threat Level: 6/10
UDS:DangerousObject.Multi.Generic is a malware infection, which is often detected simultaneously in multiple locations on an infected computer system. The most often reported location UDS:DangerousObject.Multi.Generic sets itself is Documents and Settings, usually as a part of C drive. UDS:DangerousObject.Multi.Generic is difficult to detect and remove from the corrupted PC by many security tools. The detection of UDS:DangerousObject.Multi.Generic is only available for adding to exclusions, ignoring, browsing to location including it, or threat description could be produced. PC users are...

Dr Games Ads

Posted: November 16, 2015 | Category: Adware | Threat Level: 2/10
Dr Games is an ad-oriented Web plugin, closely associated with a gaming platform. In the past, the site could be found at dr-games.com. Later the domain switched to gogy.com. This gaming site contains numerous online games, and some of them have a desktop version as well. If you agree to download any game or other software from gogy.com, the adware also may sneak in. If you can notice the symptoms of the ad-supported extension but didn't install it manually, then it may have evaded your attention hidden in the executable files of third-party freeware. Dr Games doesn't contain harmful...

Virus.Win32.Neshta.a

Posted: February 1, 2011 | Category: Viruses | Threat Level: 8/10
Virus.Win32.Neshta.a is a malicious computer virus which steals information from unwary PC users. The virus is quite complex and has the ability to disable safe mode by infecting the registry. Virus.Win32.Neshta.a is designed to destroy data files on the computer, this will result in the improper running of the computer, and failure to access the system. Virus.Win32.Neshta.a may also produce a list of security infections to delude the computer user into thinking that the PC is under threat. Virus.Win32.Neshta.a is also designed to allow a hacker remote access to a targeted computer system...

How to Kill Spyware Processes

Posted: June 5, 2006 | Category: Tutorials
Every program has its own executable code (for example, the .exe file). A process (or task) is a program that is being executed. When you start a program, the executable code will load into the computer's memory. This code is the process. If a process is closed or terminated, the resources used by that program will not run. To see all the processes running on your computer, you can use the Windows Task Manager, a built-in Windows utility. The Windows Task Manager allows you to terminate almost all processes, however, there are some programs that have invisible processes running in the...

DRV Ransomware

Posted: February 3, 2020 | Category: Ransomware
The DRV Ransomware is a low-quality file-locker that came to life thanks to the use of the HiddenTear project, an open-source piece of ransomware that has several flaws that were left by its original creator intentionally. The good news is that the imperfections left by the HiddenTear's author mean that most variants of this file-locker will be decryptable for free – this also is the case with the DRV Ransomware so that its victims should be able to get their files back by using the free HiddenTear decryptor that can be found online. Although the availability of free decryption software...

Btos Ransomware

Posted: January 31, 2020 | Category: Ransomware
The Btos Ransomware is the newest file-locker to be identified as a member of the STOP Ransomware family. Unfortunately, the STOP Ransomware and its recent variants are impossible to decrypt via free utilities, and their victims may often need to resort to data recovery options with a questionable success rate. To ensure that you will not have your files encrypted by the Btos Ransomware is to invest in a reputable antivirus tool, as well as to learn how to be more careful while browsing the Web. If it is too late to take preventive measures, and the Btos Ransomware has already completed its...

Nodera Ransomware

Posted: January 30, 2020 | Category: Ransomware
Cybercriminals have different strategies to create threats that have a great chance to evade the scanners of anti-virus products. One of the common strategies is to use a non-typical programming language – this is the exact plan that the authors of the Nodera Ransomware have adopted. Instead of relying on the typical .NET, Python, or C# project, they have opted to create a file-encryption Trojan via Node.js, a framework for the JavaScript programming language. While Node.js is used to build Web applications frequently, it also can be configured and used for desktop applications. The...

Npsg Ransomware

Posted: January 30, 2020 | Category: Ransomware
The threatening STOP Ransomware is still one of the most active ransomware families in the wild, and, unfortunately, cybercriminals have used it to create over 200 different variations of the threat. One of the latest variants of this file-locker is the Npsg Ransomware – this threat is impossible to decrypt via free means, and its victims may have to rely on alternative data recovery techniques that may not always yield satisfying results. The authors of the Npsg Ransomware may opt to use different tricks to propagate the harmful program – in some cases, they may spread it via phishing...

$$$ Ransomware

Posted: January 29, 2020 | Category: Ransomware
File-encryption Trojans are the number one threats being utilized by cybercriminals in the past few years, and it is very important that you take the necessary measures to protect your data from threats like the $$$ Ransomware and similar file-lockers. Usually, proper protection from ransomware attacks requires several layers of security – you need to learn how to browse the Web in a safe manner, and you also need to invest in the services of a reputable anti-malware application. Last but not least, you also may want to consider using trustworthy data backup services that will provide you...

EnCiPhErEd Ransomware

Posted: January 29, 2020 | Category: Ransomware
Ransomware operators usually attempt to sell a decryption service that can only be paid via cryptocurrency – a secure and anonymous payment method, which will protect the identity of the cybercriminals. However, there are some file-lockers that offer their victims more unorthodox payment solution – such is the case with the EnCiPhErEd Ransomware, a file-encryption Trojan that asks its victims to pay via an SMS message. There is no precise information about the tricks used to spread the EnCiPhErEd Ransomware online, but it is safe to assume that its operators rely on some of the most...

CryptoPatronum Ransomware

Posted: January 28, 2020 | Category: Ransomware
The CryptoPatronum Ransomware is a new file-locker project that is being spread online under the disguise of a game crack or a fake software update/installer. It is recommended to take the required measures to unsafe files away from your computer by investing in a reputable anti-virus tool, as well as following the latest safe Web browsing practices. Do not forget that falling victim to a ransomware attack is not that unlikely if you are not careful – these attacks can be very devastating due to their ability to cause potentially irreversible damage to your file system. The CryptoPatronum...

2NEW Ransomware

Posted: January 28, 2020 | Category: Ransomware
2NEW Ransomware is not a new ransomware by any means since it borrows most of its code from one of the most popular ransomware families in the past few years – the Dharma Ransomware. Unfortunately, the fact that we are talking about a well-known file-locker is not good new necessarily – just about all new variants of the Dharma Ransomware are impossible to decrypt via free means, and this means that their victims may not be able to recover from the attack fully. The 2NEW Ransomware may be spread via various tricks that cybercriminals use to propagate their threatening application...

AlphaBetaCrypt Ransomware

Posted: January 27, 2020 | Category: Ransomware
The AlphaBetaCrypt Ransomware is a file-encryption Trojan designed to lock up the files of its victims and then offer them to purchase a key in exchange for a hefty ransom payment. Unfortunately, ransomware attacks have been very common in the past few years, and they are still one of the most profitable hacking tools in the arsenal of cybercriminals. The AlphaBetaCrypt Ransomware is no exception, and it is capable of executing a swift file-encryption attack that can render the majority of your files inaccessible perfectly. The file types that the AlphaBetaCrypt Ransomware targets are...

Reha Ransomware

Posted: January 24, 2020 | Category: Ransomware
File-lockers are still the most popular tool in the arsenal of cybercriminals – these threats are easy to create relatively thanks to the countless illicit ransomware-as-a-service platforms that enable cyber crooks to create a threatening file-encryption Trojan swiftly, without needing any background in programming. One of the most active and harmful ransomware families is called the STOP Ransomware, and it contains exactly 200 unique variants currently. All of these 200 threats execute the same file-encryption attack, and the primary differences between them concern the file extension they...

Topi Ransomware

Posted: January 24, 2020 | Category: Ransomware
The Topi Ransomware is another file-locker that is being spread online via various tricks. Its authors may propagate it via corrupted email attachments, pirated content, fake downloads, and other dubious digital content types. To avoid running unsafe files like this one on your computer, you should follow the latest safe Web browsing practices and, in addition to this, consider activating a reputable anti-virus product that will monitor the activity on your computer, and stop threats like the Topi Ransomware before they get a chance to cause damage. The Topi Ransomware attack can be very...

OnyxLocker Ransomware

Posted: January 23, 2020 | Category: Ransomware
The OnyxLocker Ransomware is a file-encryption Trojan that is being spread online from what is likely to be a Russian-speaking malware author. This threat is designed to execute a destructive attack whose main targets are the files of its victims. The OnyxLocker Ransomware is able to encrypt documents, images, videos, archives, spreadsheets, and other file types that are likely to contain important data. Victims of the OnyxLocker Ransomware should be able to recognize this particular attack easily because of the '.кристина' extension that will be added to the end of the names of their...

Nosu Ransomware

Posted: January 21, 2020 | Category: Ransomware
The Nosu Ransomware is a file-encryption Trojan that may use various tricks to get to your computer. Its operators may try to disguise it as an important file attachment that comes along with a phishing email or, in other cases, the Nosu Ransomware might pose as a crack for your favorite game or a piece of software you use. To make sure that your computer is protected against threats like the Nosu Ransomware, you should be more careful with the files you download from the Internet – especially if the file comes via an email, or you found it on a torrent tracker. Users who fail to stop the...

TRSomware Ransomware

Posted: January 21, 2020 | Category: Ransomware
The TRSomware Ransomware is a working file-locker that may be spread online via fake downloads, fake updates, decoy documents, fraudulent email attachments, and an illicit game or software crack. It is likely that the TRSomware Ransomware will be used against Turkish-speaking users since its authors have included a ransom note written in Turkish – there are no translations available. However, there is not enough data about TRSomware Ransomware's activity to determine if its attacks are limited to a specific region. Victims of the TRSomware Ransomware should be able to recognize this...

Devos Ransomware

Posted: January 21, 2020 | Category: Ransomware
The Devos Ransomware is a cyber-threat, which serves only one purpose – to encrypt the data of its victims, and then ask them for money by promising to provide them with a decryption tool as soon as they pay the ransom fee. This threat is associated with a well-known ransomware family that has been around for over two years – the Phobos Ransomware . Unfortunately, just like its predecessor, the Devos Ransomware's encryption is impossible to decipher for free. To make sure that your files are safe from threats like this one, you should invest in a reputable anti-virus product, keep...
1 2 3 4 5 6 7 8 9 10 11 337