KnowledgeBase

Archive for KnowledgeBase

AFP email scams: beware of fake Australian Federal Police subpoena viruses

AFP email scams: beware of fake Australian Federal Police subpoena viruses

In pursuit of effective ways to serve malicious software to Windows computers, cybercrooks often bank on different types of social engineering. In one of the recent hoaxes, the criminals have been sending emails with rogue subpoenas allegedly on behalf of the Australian Federal Police. This scam, obviously, targets Australians and tries to infect their machines […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Orderconfirmation@esab.co.uk rogue emails spread Locky ransomware

Orderconfirmation@esab.co.uk rogue emails spread Locky ransomware

Security analysts have been noting a considerable volume of malware-tainted spam sent out from orderconfirmation@esab.co.uk. The emails titled “Order Confirmation-[random number string]” are disguised as if they were hailing from ESAB, a well-known manufacturer of industrial equipment. That’s not true, though. The menacing part of this phish is all about the .docm attachment that installs […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt .crypted file virus: Nemucod ransomware trojan removal

Decrypt .crypted file virus: Nemucod ransomware trojan removal

In the ongoing battle with crypto ransomware, the security industry is still lagging behind. What experts are mostly trying to do is revert the damage after the attack rather than prevent the predicament. In the case of the so-called Nemucod family of ransom Trojans, the contamination is usually beyond the reach of conventional antimalware. Delivered […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Hitler Ransomware: remove virus and restore locked personal files

Hitler Ransomware: remove virus and restore locked personal files

Although the Windows infection dubbed the Hitler-Ransomware isn’t currently in active real-world rotation, a couple of its characteristics are quite disturbing and make the sample a more hazardous threat than the commonplace ransom Trojans. The malicious specimen that researchers were able to spot and analyze appears to be buggy. It causes the compromised OS to […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Searchboro virus in Chrome, Firefox and IE

Remove Searchboro virus in Chrome, Firefox and IE

Searchboro.com and the underlying browser extension demonstrate the worst practices of browser hijacking. Windows users infected with this adware strain experience an abrupt interference with their custom online settings. Most of the time, it simply takes some attentiveness to avoid this sample as it propagates via software bundles where the default installation already includes the […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Youndoo virus (Youndoo.com search engine) in Chrome, Firefox and IE

Remove Youndoo virus (Youndoo.com search engine) in Chrome, Firefox and IE

It doesn’t take a genius to grasp the business model behind hijackers like Youndoo.com. These PUAs (potentially unwanted applications) take control of their victims’ web browsers in order to ensure that certain portions of web traffic are being continuously obtained from all the infected Windows computers. There are tons of interested parties whose wet dream […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Nuesearch virus from Chrome, Firefox, IE

Remove Nuesearch virus from Chrome, Firefox, IE

The fact that the Nuesearch browser adware is served to computers through a technically legitimate scheme is a lame excuse for its unscrupulous distributors. By incorporating its loader into the setup clients for third-party solutions where this inclusion is deliberately blurred, the ne’er-do-wells spread their hijacker to PCs whose owners have no idea that the […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Trotux virus from Chrome, Firefox and IE

Remove Trotux virus from Chrome, Firefox and IE

Not every computer application that’s bundled with other software is malicious. For instance, millions of Windows users are regularly encountering Adobe Flash Player updates, where third-party products are included in the default installation routine. There is an offending facet of such packaging, though. Trotux is a potentially unwanted browser extension distributed along with some freeware […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 21 of 36 «...101920212223...»