Search Results for "ransomware"

  1. Remove Yoyodiy ransomware and recover encrypted files
    Users hit by the average ransomware threat are in a serious quandary due to the deep-level impact incurred as a result of these attacks. Cybercriminals have become quite professional at utilizing cryptography for malicious purposes, as is the case with the new ransom Trojan called Yoyodiy. It bypass…
  2. Remove Ykcol virus ransomware and recover .ykcol files
    New version releases are a common thing in the ransomware underground. The prolific Locky strain is no exception. Less than a month since the previous iteration called Lukitus surfaced, the architects of this massive campaign have come up with an update. The brand new edition appends the .ykcol exte…
  3. Decrypt .arena files virus and remove Arena ransomware
    When a blackmail Trojan hits a computer, things get out of hand. The depth of impact depends on how professionally designed a specific strain is, including cryptographic strength and the way the infection handles encryption keys. The new Arena version of the CrySiS/Dharma ransomware is one of the ra…
  4. Remove Lukitus ransomware and decrypt .lukitus extension files
    Although the Locky ransomware family is no longer dominating the online extortion business, it is still in game. A recent proof of its longevity is the emergence of a new variant that adds the .lukitus extension to encrypted files and drops rescue notes named lukitus-[random].htm and lukitus-[random…
  5. .CESAR ransomware: virus removal and files decryption
    The word ‘CrySiS’ may seem like an awful misspelling, but it makes perfect sense in the context of cybersecurity. Said term designates one of the oldest and largest known families of file-encrypting malware. Also known as Dharma, this underground workshop of digital pests has given rise to dozen…
  6. Gryphon Decrypter: ransomware removal and .gryphon files recovery
    Cybercriminals are well motivated as long as their misdemeanor brings them a pretty penny. This seems to be the case with the new Gryphon ransomware. Having landed on a targeted host, it denies accessibility of the victim’s important files, appends them with the .gryphon extension and holds them f…
  7. Cry36 decryptor: how to remove Nemezis ransomware
    When a ransom Trojan gains a foothold on one’s computer, things get out of hand as the infection intelligently spots the most valuable files and scrambles them using cryptography. This classic assault workflow fully applies to the Cry36 virus representing one of the most widespread ransomware line…
  8. Remove Reyptson ransomware and decrypt .reyptson virus files
    Ransom Trojan rarely deviate from the well-trodden extortion route. The new sample called Reyptson is one of the very few that leverage offbeat tactics when deploying its infection chain. It performs some extra reconnaissance on a contaminated computer, harvesting the victim’s email credentials in…
  9. LeakerLocker ransomware breaks new ground with its tactics
    Most of the extortion taking place online revolves around two things: applying crypto and locking the screen. The brand new Android ransomware called LeakerLocker utilizes one of above components and adds a unique one to the mix. It locks the home screen of an infected Android device and threatens t…
  10. Decrypt CRBR Encryptor ransomware and remove virus
    According to recent reports on computer threat landscape, the Cerber ransomware family is the dominating one in its niche of cybercrime. It holds the top position owing to a number of characteristics. First off, the distribution channels have been consistently well-thought-out. Secondly, its code bo…
Page 4 of 17 «...23456...»