Soft2Secure

Archive for 2016

Viceice removal: remove viceice.com search from Chrome, Firefox and IE

Viceice removal: remove viceice.com search from Chrome, Firefox and IE

Viceice exemplifies a subgroup of offending software that focuses on wreaking havoc with its victims’ Internet navigation. Specifically, if the aforementioned sample finds itself inside a Windows computer, both the default browser and other popular browsers running on the system will get out of hand. The homepage URL, new tab page and quite likely the […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

ParetoLogic PC Health Advisor review

ParetoLogic PC Health Advisor review

ParetoLogic PC Health Advisor is an all-in-one computer optimization and maintenance suite you can rely on for smooth system performance and malware protection. When a computer begins acting up or even slows down to a crawl, the fix may take a variety of things to look at and address, but the main possible causes are […]

Read more →

Posted in: Software

Leave a Comment (0) →

Related Search by Innovate Direct virus ads removal

Related Search by Innovate Direct virus ads removal

As innocuous as they mostly are, freeware applications may cause problems indirectly because computer users often install potentially unwanted programs (PUPs) along the way and don’t even know it. The app called Innovate Direct exercises this sort of a drive-by propagation, where its stub installer stealthily accompanies simplistic media players, file downloaders and the like. […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Medstar hospital under ransomware attack

Medstar hospital under ransomware attack

Healthcare providers are being increasingly targeted by cybercriminals. A series of recent attacks against U.S. hospitals have shown just how vulnerable these types of organizations are in the face of ransomware, a type of aggressive computer malware that encrypts data and extorts a ransom for recovery. Servers of the MedStar healthcare company suffered a compromise […]

Read more →

Posted in: News

Leave a Comment (0) →

Remove Petya ransomware and decrypt files

Remove Petya ransomware and decrypt files

The word “Petya” is the transliterated informal for Pyotr, a popular Russian name. A lot of its recent implications, however, have to do with a big computer security issue. Cybercriminals who are most likely operating from the above-mentioned state have devised a highly destructive piece of malicious code and named it the “Petya ransomware”. Not […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt My Files: Cerber virus removal and decryption

Decrypt My Files: Cerber virus removal and decryption

Every ransomware attack is accompanied by a number of distinct indicators of compromise, which are unique for different strains of file encrypting threats. First and foremost, these include the crypto key exchange workflow, the extensions added to victims’ files, and things like ransom notes that instruct infected users on data recovery. If the latter IOC […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Uninstall Quick Swipe virus from Android

Uninstall Quick Swipe virus from Android

When downloading apps for the Android mobile platform, the last thing users want is get a piece of nagging code that constantly interrupts device usage. Most of these issues occur as a result of software downloads from unofficial resources – in the case of Android, it’s anything other than Google Play. The application called Quick […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove and decrypt RSA-4096 ransomware virus

Remove and decrypt RSA-4096 ransomware virus

The use of RSA-4096 public-key encryption is not restricted to legitimate purposes such as the protection of classified governmental or military documents. This extremely strong cryptosystem has also become a dangerous instrument in extortionists’ hands. Ransomware plagues like TeslaCrypt demonstrate how technologies preventing data leakage can turn into an inalienable part of cybercrime infrastructure. The […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 8 of 10 «...678910