
CleanMyPC Software Review
Created by MacPaw Inc. this neat program is aims to optimize a computer by cleaning up junk files and granting easier access to manual clean up of objects that are causing a computer to run slow. The program also has…
Created by MacPaw Inc. this neat program is aims to optimize a computer by cleaning up junk files and granting easier access to manual clean up of objects that are causing a computer to run slow. The program also has…
What Is !XTPLOCK5.0 Cryptinfo.txt Ransomware? Cyber-criminals behind the e-mail crypt302@gmx.com have begun to demand 2 BTC from users via a ransomware virus that is dubbed “!XTPLOCK5.0” based on its ransom note string. Malware researchers, like Michael Gillepsie believe that this…
A Chinese version of Locky ransomware has been detected by malware researchers to drop a _HOWDO_text.html file after it encrypts files with the AES-128 and RSA-2048 ciphers and generates a unique decryption key. The Locky ransomware variants have been spreading…
New version of Philadelphia ransomware, which was part of the Stampado variants has been released, again using the same .locked file extension. The difference in this version is that it demands .3 BTC from affected victims and features a new…
“Try to kill or delete me and I will kill your PC” – this is the message the victims of the EXOTIC virus see once their computer has been infected by it. The vulgar cyber-threat goes as far as creating…
A new form of crime has been rapidly increasing. Botnets, banking malware, legitimate malware (adware) and other bunches of malicious code that aim only for one – profit. The most profitable of those however remains to be the new form…
The virus that has been reported to use an .NCRYPT extension and leave a threatening ransom note may have already begun to infect users from different places all over the world. The crypto virus demands infected users to pay the…
Image Source: pcgamer.com A very clever scheme has been revealed that takes advantage of Gaming Websites and their currencies to launder money. What cyber-crooks have been reported to do is use online currencies as laundering means according to Trend Micro’s…
A ransomware virus, known as Deadly has been detected by malware researchers recently. The virus was reported to create several different files on the computer after which encrypt the important data in it and drop a ransom note demanding $500…
First discovered in May, Enigma ransomware targeted only Russian users. This virus, however, has been released in a new variant that may attack users on a global scale if distributed massively. The new version of Enigma ransomware uses “enigma_info.txt” file…
A crypto-virus, dubbed as APT Ransomware requesting it’s victims to pay with Coinbase or Blockchain has appeared out into the open, encrypting files and adding .dll extension after it has completed encryption. APT Ransomware 2.0 also drops a ransom note…
RESTORE-FILES!_{ID}_.txt – this is what users who have been affected by Comrade Circle ransomware see after their files have been encrypted with an added .comrade file extension to them. The Comrade Circle virus does not waste any time In explaining…
A ransomware using the .raid10, .blt, .globe, .encrypted, .mia.kokers@aol.com file extensions and believed to be a variant of JigSaw crypto viruses has been reported to cause new infections in a second, updated version. The updated version of globe uses the…
Researchers at Proofpoint have previously identified a ransomware virus, known as Hades Locker. The virus mimics the notorious Locky ransomware’s ransom note; however, researchers are still not convinced whether or not this is Locky. The researchers believe that the HadesLocker…
Online stores are not safe anymore according to recent reports by Sucuri. First detected in March 2016, the Magecart malware has begun to gain momentum in it’s activity until May when it began to target well-known and large online retailer…
A trojan horse, created by a hacking group, dubbing it FastPOS, has recently been updated with a new technique that causes infection via a bug in Windows Mailslots mechanisms. The new version of the POS malware is not only created…
A lot has happened since we released the previous part with ransomware decryption instructions. Many viruses which were initially thought to be impenetrable have been decoded and brought new hope for those who do not want to pay money to…
The notorious IoT(Internet of Things) botnet Mirai has seen a rapid rise in it’s global infection rate, malware researchers report. When the botnet first came out, nobody believed it will become this widespread, however after the hacker(s) creating it found…
JokeFromMars, also known as MarsJoke ransomware uses AES cipher to encrypt files, adding the .a19 and .ap19 file extension to them. The ransomware virus demands 0.7 or 1.1 BTC (depending on it’s variant) payment to cyber-criminals. The good news is…
The latest trend in the 21st century – IoT, common systems of devices organized to revolutionize our daily lives are becoming a playground for hackers. This becomes particularly interesting primarily for IT security professionals who are always looking forward to…