Soft2Secure

Medstar hospital under ransomware attack

Medstar hospital under ransomware attack

Healthcare providers are being increasingly targeted by cybercriminals. A series of recent attacks against U.S. hospitals have shown just how vulnerable these types of organizations are in the face of ransomware, a type of aggressive computer malware that encrypts data and extorts a ransom for recovery. Servers of the MedStar healthcare company suffered a compromise […]

Read more →

Posted in: News

Leave a Comment (0) →

Remove Petya ransomware and decrypt files

Remove Petya ransomware and decrypt files

The word “Petya” is the transliterated informal for Pyotr, a popular Russian name. A lot of its recent implications, however, have to do with a big computer security issue. Cybercriminals who are most likely operating from the above-mentioned state have devised a highly destructive piece of malicious code and named it the “Petya ransomware”. Not […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt My Files: Cerber virus removal and decryption

Decrypt My Files: Cerber virus removal and decryption

Every ransomware attack is accompanied by a number of distinct indicators of compromise, which are unique for different strains of file encrypting threats. First and foremost, these include the crypto key exchange workflow, the extensions added to victims’ files, and things like ransom notes that instruct infected users on data recovery. If the latter IOC […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Uninstall Quick Swipe virus from Android

Uninstall Quick Swipe virus from Android

When downloading apps for the Android mobile platform, the last thing users want is get a piece of nagging code that constantly interrupts device usage. Most of these issues occur as a result of software downloads from unofficial resources – in the case of Android, it’s anything other than Google Play. The application called Quick […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove and decrypt RSA-4096 ransomware virus

Remove and decrypt RSA-4096 ransomware virus

The use of RSA-4096 public-key encryption is not restricted to legitimate purposes such as the protection of classified governmental or military documents. This extremely strong cryptosystem has also become a dangerous instrument in extortionists’ hands. Ransomware plagues like TeslaCrypt demonstrate how technologies preventing data leakage can turn into an inalienable part of cybercrime infrastructure. The […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Locky ransomware virus (.locky files) decrypter and removal

Locky ransomware virus (.locky files) decrypter and removal

Operators of the Locky ransomware fraud appear to be exercising their extortion skills in several ways. They deposit their payload onto computers through a technique similar to the one leveraged by distributors of the Dridex banking Trojan. The virus tweaks filenames along with encrypting files themselves, thus considerably aggravating the recovery routine. And of course […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Torrents Time plugin removal in Chrome, Firefox and IE

Torrents Time plugin removal in Chrome, Firefox and IE

With the browser plugin called Torrents Time, computer users are able to stream torrents right inside their browser. This lightweight applet supports both Windows and Mac OS X, and it’s compatible with Mozilla Firefox, Google Chrome, Internet Explorer and Safari. On the one hand, people no longer have to install the client proper, which is […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

T9000 malware: how to detect and remove the virus

T9000 malware: how to detect and remove the virus

A new cyber threat dubbed T9000 is targeting individual users and organizations through tactics featuring a high level of obfuscation. Some researchers consider this backdoor to be a tool meant exclusively for industrial espionage, but the patterns of its propagation prove a much broader attack surface. It was found to surveil victims’ Skype conversations and […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 20 of 34 «...101819202122...»