In this article we will examine 2 categories of protection: Anti-malware software Safe working NOTE! If you want to provide maxi protection of your PC, you should use both methods.…
29/08/2016 Posted in News
28/07/2016 Posted in News
Why Ransomware is so dangerous and how to protect your computer against such threat In our time, when almost every home in the world has a computer, internet security play very important role. Hackers and cybercriminals are developing new ways to infect computers. Almost five years ago they have created…
22/07/2016 Posted in News
In recent times, malware trends have moved towards Ransomware. Even 2 years ago a leader for monetization cybercrime were banker Trojans, merged into larger botnets. But in 2014 the so-called cryptolocker appears. The company has been highly successful and quickly gaining popularity among malware and virus creators. And now let’s…
8/07/2016 Posted in News
In the end of 2015 the internet was shaken by the serious event, lots of IT resources and security blog started to inform users about new cryptovirus – Locky. There are few reasons why this particular cryptovirus was so dangerous at the time. First of all – it was the…
17/02/2016 Posted in News
A new Locky ransomware virus appeared on the internet and encrypts a lot of important files. During the last few days, we were getting reports about Locky Ransomware virus. This malicious program encrypts your files using AES-128 and RSA-2048 ciphers and then demands a ransom fee from 0.5 to 1…
21/10/2015 Posted in News
Microsoft support complete versions of Internet Explorer 7-10 at the beginning of next year, January 12, 2016 for these older versions of the web browser will no longer go security-update and users will remain with lifelong 0day vulnerabilities. Thus, the company will leave only support their current web of Internet…
Inexhaustible imagination of the authors of malicious programs. Google Chrome recently started to tighten the screws and restrict the rights of browser extensions – for some time now they have to be inspected by specialists of the code. Therefore, instead of trying to fit into an existing browser as an…
Adobe has released an update APSB 15-27S which closes the vulnerability CVE-2015-7645. The vulnerability is under active exploitation by hackers and used by cyber group Pawn Storm (aka Sednit, APT28, Sofacy) for the organization of cyber attacks aimed at users. The very vulnerability allows attackers to successfully carry out an…
Recently, analysts have discovered another malicious program - Win32 / Spy.Odlanor, which also focused on poker players. This time it comes to customer Web sites poker PokerStars and Full Tilt Poker.
7/10/2015 Posted in News
Contaminated software fell in the App Store using a fake version of Apple Xcode, which is used to create applications and software for iOS on the Mac, according to the portal Cnet.
- [FIXED!] vc_redist.exe Trojan Miner Elimination. How to Remove vc_redist.exe?
- JavaUpdater.exe coin miner virus investigation [STEP-BY-STEP GUIDE]
- websyst.exe process in Task Manger - How to remove?
- sihost.exe Malware Uninstallation Guide.
- [FIXED!] NanoServicePack_FULL.exe Trojan Miner Elimination. How to Remove NanoServicePack_FULL.exe?
- ielowutil.exe coin miner virus investigation [STEP-BY-STEP GUIDE]
- How to remove Zme8o3l1c4.com Redirect Virus?
- [FIXED!] MicrosoftUpdater.exe Trojan Miner Elimination. How to Remove MicrosoftUpdater.exe?
- MSASCuiiL.exe coin miner virus investigation [STEP-BY-STEP GUIDE]
- Clckads.org browser virus - How to remove?