
Ninite Software Review
Imagine that you have just reinstalled Windows and you have to deal with tons of programs to setup on your PC. For this you have to visit each website individually and download a version compatible for your Windows PC. This…
Imagine that you have just reinstalled Windows and you have to deal with tons of programs to setup on your PC. For this you have to visit each website individually and download a version compatible for your Windows PC. This…
Users have reported that their Internet Explorer, Chrome, and Firefox web browsers have been affected by a browser hijacker. The hijacker has been reported to be associated with an object, detected as “bloodhound.php”. Its main activities may be focused on…
Developed by ParetoLogic, this application is focused on user privacy. It has DOD file shredding and other features that are oriented in permanently wiping the data from your emails, browsing history and cache. Since today, privacy is often brought up,…
A new browser hijacker, associated with the website Safe-Web(.)tk has been reported to affect users on a massive scale. The indirect cyber-threat may be encountered on widely used web browsers, such as Google Chrome, Internet Explorer or Mozilla Firefox. The…
A new downloader type of Trojan has been reported to cause unauthorized downloads on user PCs infecting them with malware. The Trojan.Downloader may use obfuscators to conceal itself from most widespread antivirus software’s real-time protection. You may encounter this Trojan…
The latest in Android ransomware, called “Simple Locker” is essentially a lockscreen type of malware that affects all types of devices. The malware may infect users via spam e-mails offering new applications which are in fact the malicious files themselves.…
One of the most famous programs in data recovery, Disk Drill, is here with a new version. The software is user-friendly and light. Various software review blogs have described it as “extremely good” in recovering photos as well as documents, but…
A new file recovery program has entered the software market – File Recover Plus by eSupport.com. File Recover is the lightest file recovery software that we have ever encountered. We have tested how the program performs in a simulated environment,…
This article is to help you remove Cerber ransomware and decrypt encrypted files for free. Cerber ransomware is a dangerous crypto infection that infects computer systems with the goal to encrypt valuable personal files. Then it demands the user to…
A new ransomware, observed to be a variant of CryptoWall, has been reported to infect users on a massive scale all over the world. The most notorious ransomware, CryptoWall, detected as “Cryptodefense” by Symantec researchers, has been reported to have…
Yet another browser hijacker based on Google Custom Search results has been spotted on the cyber-security radar by researchers. It sets the host Search.So-V(dot)com as a home page of your Google Chrome, Mozilla Firefox, Internet Explorer and other web browsers.…
A new browser hijacker has been reported to set the web page Searchingworld(.)biz as a home page and a new tab page of affected users’ PCs. The hijacker may assume a form of a usefully looking browser extension or a…
Web Searcher is yet another potentially unwanted program that installs via bundling and introduces pop-up advertisements on your computer while you are browsing. The program is considered risky primarily because it may collect user information and transfer users to dangerous…
A Trojan that is known as Banprox.Infostealer has been identified by Symantec threat response team to infect personal computers on various locations all over the world. The Trojan is very specific in it’s actions, redirecting the web traffic of the…
New web links have been detected to have several associations with massive referral spam campaigns. They are believed to be related to a domain known as Veerotech(.)com or Veerotech(.)net and may advertise a variety of suspicious third-party websites. The domain…
The usage of smartphones and tablets has become more and more commonly met nowadays. Along with that, the Android devices have become the most used mobile OS in the world, taking above 85% percent of the mobile market. This is…
A new type of Trojan has been reported to utilize an old devastating method that corrupts Windows and restarts the computer. The Trojan is known as Disakil (Symantec), and it is not very widespread. However, this particular Trojan horse may…
A suspicious web browser, known as Sheild+ has been reported by cyber-security researchers to be installed involuntarily to user PCs. This potentially unwanted program is strongly believed to advertise heavily, slow down the user PC and mostly to collect different…
A potentially unwanted application known to mask itself behind randomly named or “plugin.exe” executables has been reported to have rapid increase in spread. The program is detected as PUA.Yontoo, Adware.Yontoo.Shop Essentials and several other names. By the looks of it,…
A dangerous web domain has been reported to be associated with several malware families. It is called ad(.)directrev(.)com and is confirmed to affect thousands of computers per hour at the moment of writing this. Expert researchers such as Trend Micro…