Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

GayFreeVideos

Posted: July 24, 2009 | Category: Uncategorized

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

Microsoft Security Essentials Alert Virus

Posted: August 21, 2012 | Category: Fake Warning Messages
Microsoft Security Essentials Alert Virus The Microsoft Security Essentials Alert Virus is a ransomware Trojan that imitates the pop-up alerts of Microsoft Security Essentials to encourage you to pay an illegal fine through one of several methods. Because Microsoft Security Essentials Alert Virus may block other programs to prevent you from removing Microsoft Security Essentials Alert Virus and its pop-up, SpywareRemove.com malware analysts recommend disabling Microsoft Security Essentials Alert Virus's startup exploits prior to any anti-malware scans that could delete Microsoft Security Essentials Alert Virus safely. Contrary to...

Dr Games Ads

Posted: November 16, 2015 | Category: Adware | Threat Level: 2/10
Dr Games is an ad-oriented Web plugin, closely associated with a gaming platform. In the past, the site could be found at dr-games.com. Later the domain switched to gogy.com. This gaming site contains numerous online games, and some of them have a desktop version as well. If you agree to download any game or other software from gogy.com, the adware also may sneak in. If you can notice the symptoms of the ad-supported extension but didn't install it manually, then it may have evaded your attention hidden in the executable files of third-party freeware. Dr Games doesn't contain harmful...

Virus.Win32.Neshta.a

Posted: February 1, 2011 | Category: Viruses | Threat Level: 8/10
Virus.Win32.Neshta.a is a malicious computer virus which steals information from unwary PC users. The virus is quite complex and has the ability to disable safe mode by infecting the registry. Virus.Win32.Neshta.a is designed to destroy data files on the computer, this will result in the improper running of the computer, and failure to access the system. Virus.Win32.Neshta.a may also produce a list of security infections to delude the computer user into thinking that the PC is under threat. Virus.Win32.Neshta.a is also designed to allow a hacker remote access to a targeted computer system...

W32/Child-Porn.PROXY/Server

Posted: December 28, 2011 | Category: Viruses | Threat Level: 8/10
W32/Child-Porn.PROXY/Server is a computer virus under a phantom name. Usually the rogue anti-spyware program known as Security Central is known for mentioning the W32/Child-Porn.PROXY/Server parasite under its bogus alert notifications or fake system scan results. Although W32/Child-Porn.PROXY/Server is commonly listed as a false positive due to its association with a fake security program, it is still a viable threat to a PC. W32/Child-Porn.PROXY/Server may load onto a system where it can cause the performance to be degraded to the point that the infected PC can no longer perform various...

Bad Image Virus

Posted: February 1, 2012 | Category: Fake Warning Messages
The Bad Image Virus, also known by the name 'Bad Image error,' is a symptom of infection by a Trojan or rogue security program that pretends to be a legitimate warning message from Windows. Although legitimate Bad Image pop-ups are indicative of damage to an application's files that should be repaired by reinstalling the program in question, fraudulent Bad Image pop-ups don't offer legitimate information about your PC and may be used to market scamware or confuse you about the state of your computer's health. Because the Bad Image Virus is likely to occur in a Trojan infection scenario,...

UDS:DangerousObject.Multi.Generic

Posted: June 26, 2013 | Category: Malware | Threat Level: 6/10
UDS:DangerousObject.Multi.Generic is a malware infection, which is often detected simultaneously in multiple locations on an infected computer system. The most often reported location UDS:DangerousObject.Multi.Generic sets itself is Documents and Settings, usually as a part of C drive. UDS:DangerousObject.Multi.Generic is difficult to detect and remove from the corrupted PC by many security tools. The detection of UDS:DangerousObject.Multi.Generic is only available for adding to exclusions, ignoring, browsing to location including it, or threat description could be produced. PC users are...

Wizvera Veraport

Posted: April 11, 2016 | Category: Desktop Utilities

How to Find Spyware with File Search Tool

Posted: June 6, 2006 | Category: Tutorials
Spyware can infect your computer and compromise your privacy, security and computer performance. Spyware is constanly changing and can infect your computer without you even being aware of it. Spyware can install onto your computer and gain access to sentitive information like your passwords, credi card numbers and emails. Spyware is very difficult to detect and remove so trying to uninstall it can prove to be a huge undertaking. If you suspect that your computer is infected with spyware, the best advice is to remove the spyware IMMEDIATELY before it exposes your computer to other...

Nosu Ransomware

Posted: January 21, 2020 | Category: Ransomware
The Nosu Ransomware is a file-encryption Trojan that may use various tricks to get to your computer. Its operators may try to disguise it as an important file attachment that comes along with a phishing email or, in other cases, the Nosu Ransomware might pose as a crack for your favorite game or a piece of software you use. To make sure that your computer is protected against threats like the Nosu Ransomware, you should be more careful with the files you download from the Internet – especially if the file comes via an email, or you found it on a torrent tracker. Users who fail to stop the...

TRSomware Ransomware

Posted: January 21, 2020 | Category: Ransomware
The TRSomware Ransomware is a working file-locker that may be spread online via fake downloads, fake updates, decoy documents, fraudulent email attachments, and an illicit game or software crack. It is likely that the TRSomware Ransomware will be used against Turkish-speaking users since its authors have included a ransom note written in Turkish – there are no translations available. However, there is not enough data about TRSomware Ransomware's activity to determine if its attacks are limited to a specific region. Victims of the TRSomware Ransomware should be able to recognize this...

Devos Ransomware

Posted: January 21, 2020 | Category: Ransomware
The Devos Ransomware is a cyber-threat, which serves only one purpose – to encrypt the data of its victims, and then ask them for money by promising to provide them with a decryption tool as soon as they pay the ransom fee. This threat is associated with a well-known ransomware family that has been around for over two years – the Phobos Ransomware . Unfortunately, just like its predecessor, the Devos Ransomware's encryption is impossible to decipher for free. To make sure that your files are safe from threats like this one, you should invest in a reputable anti-virus product, keep...

Kodc Ransomware

Posted: January 20, 2020 | Category: Ransomware
The STOP Ransomware's reign over the file-locker field continues in 2020 – the cybercriminals behind the infamous file-encryption Trojan project have released a new variant named Kodc Ransomware. This threat is able to encrypt a long list of file types, therefore ensuring that its victims will have plenty of reasons to consider paying the ransom fee that the attackers ask for. Just like other file-lockers, the Kodc Ransomware works by encrypting a large portion of files and then dropping an extortion note that tells victims that they will need to pay for a decryption service. The Kodc...

RagnarokCry Ransomware

Posted: January 20, 2020 | Category: Ransomware
The RagnarokCry Ransomware is a relatively unpopular file-locker that was detected in the wild by anti-virus products recently. This threat does not seem to be based on any of the popular ransomware families, and it is possible that its authors might have developed it from scratch. While many projects of this sort are somewhat dysfunctional, the same cannot be said about the RagnarokCry Ransomware – it features a fully functional file-encryption mechanism, which guarantees that computers infected by this program will end with encrypted data on them. The purpose of the RagnarokCry...

Picocode Ransomware

Posted: January 17, 2020 | Category: Ransomware
The Picocode Ransomware is a new file-locker that is being spread online via fake download pages, phishing emails, pirated software, and other dubious digital content. Users who fall victim to the Picocode Ransomware attack may lose the ability to access their important files since their contents would be encrypted by the Picocode Ransomware's destructive file-encryption algorithm. Unfortunately, there is little users can do if the Picocode Ransomware has taken their files hostage- their only viable and safe data recovery option would be to restore the lost files from a recent backup. All...

Adhubllka Ransomware

Posted: January 16, 2020 | Category: Ransomware
The Adhubllka Ransomware s a file-locker that may be spread online via file types – its authors may choose to disguise it as a fake software update or download, a game crack or even as an important email attachment. The infection vectors they use are very diverse, and this is why it is important to adopt an all-in-one security solution that can keep you safe from the Adhubllka Ransomware and similar cyber-threats. Naturally, the best way to secure your computer is to invest in the services of a reputable anti-virus product that will scan all connections and files for harmful traits. Using...

5ss5c Ransomware

Posted: January 15, 2020 | Category: Ransomware
The Satan Ransomware is one of 2019's less popular ransomware families. However, it is still being used by some cybercriminals since it allows them to craft a file-encryption Trojan that has the ability to encrypt a wide variety of file formats quickly, and then extort their owner for money. One of the newest variants of the Satan Ransomware goes by the name '5ss5c Ransomware,' and it appears to have some interesting properties. If the 5ss5c Ransomware manages to penetrate a computer's defenses, it will launch a devastating attack whose end-goal is to encrypt the contents of commonly...

Horsedeal Ransomware

Posted: January 15, 2020 | Category: Ransomware
The Horsedeal Ransomware is a cyber-threat that does not have any unique features that would make it stand out among other file-lockers. However, it is still capable of causing a lot of damage to unprotected computer systems by encrypting the files stored on their hard drives. Of course, the authors of the Horsedeal Ransomware have not created this ransomware just to cause trouble – they also offer their victim a decryption service that can only be taken advantage of after paying a ransom fee. Threatening programs like the Horsedeal Ransomware are often spread via various malware...

'beatifulgirls@youknowmynameisbob.online' Ransomware

Posted: January 14, 2020 | Category: Ransomware
File-encryption Trojans are one of the most harmful cyber threats that you may encounter while browsing the Web. The purpose of these threatening applications is to encrypt your important files and then offer to provide you with an expensive data decryption tool. Cybersecurity researchers came across a new file-locker sample recently, and it has been given the name 'beatifulgirls@youknowmynameisbob.online' Ransomware because of the email its authors use for contact. The threat appears to use the same ransom note and file-encryption algorithm that another ransomware used in 2019 – the...

Ako Ransomware

Posted: January 13, 2020 | Category: Ransomware
The Ako Ransomware (also known as the MedusaReborn Ransomware) is a reworked version of the Medusa Ransomware that showed remarkable activity in the last months of 2019. This new threat is not compatible with free decryption tools, and the only reliable way to undo the damage it does is to restore the locked files from a recent backup. If you are a victim of the Ako Ransomware and you do not have a reserve copy of your important data, then recovering from this attack can be a very challenging task. The Ako Ransomware's attack starts by generating a unique victim ID for the infected...

Quimera Ransomware

Posted: January 10, 2020 | Category: Ransomware
The Quimera Ransomware is a file-locker that seems to be closely related to the Pashka Ransomware, whose attacks were reported earlier this week. Unlike its predecessor, the Quimera Ransomware will not apply any changes to the names of the files it locks, and users might find it difficult to distinguish between encrypted and non-encrypted files. The only way to confirm whether a file has been encrypted is to try to open it and see if it works. The purpose of the Quimera Ransomware is to encrypt as many files as possible, and this is why it is programmed to target a long list of file formats...

BitPyLock Ransomware

Posted: January 10, 2020 | Category: Ransomware
The BitPyLock Ransomware is a file-locker that may specialize in targeting company networks, therefore ensuring that it will encrypt the contents of valuable files that the companies will want to restore at any cost. The BitPyLock Ransomware is not unique in terms of functionality, and it behaves just like other popular file-lockers – it encrypts the contents of popular file formats, modifies the names of the locked files, and ends the attack by creating a ransom note for the victim to find. All files that the BitPyLock Ransomware locks will have the '.bitpy' extension added to their...

DarkCrypt Ransomware

Posted: January 9, 2020 | Category: Ransomware
The DarkCrypt Ransomware is a file-encryption Trojan whose purpose is to cause damage to the victim's data and then extort them for money by offering to provide them with a data recovery solution. It seems that the threat appears to mimic the behavior of the infamous WannaCry Ransomware infection, but the good news is that both of them are not related in any way – the DarkCrypt Ransomware is far less threatening. The DarkCrypt Ransomware may be spread via fake downloads, torrent trackers, pirated media/software, or even fake email attachments. If the users end up launching the harmful...

Somik1 Ransomware

Posted: January 9, 2020 | Category: Ransomware
The Somik1 Ransomware is a low-quality file-locker that shares the same file-encryption algorithm as the infamous HiddenTear project – an open-source ransomware application whose author developed it for educational purposes. Unfortunately, it did not take long for cybercriminals to hijack HiddenTear's code and use it to craft easy-to-create file-lockers that could be used to extort their victims for money. Victims of the Somik1 Ransomware may be able to rely on a free decryption tool to help them recover from the Somik1 Ransomware's attack – the free HiddenTear decryptor should be able to...
1 2 3 4 5 6 7 8 9 10 11 337