Remove Matrix Ransomware – Restore .CHE808 Files

Remove Matrix Ransomware – Restore .CHE808 Files

A new Matrix ransomware strain has been identified in an ongoing attack processing files with the .CHE808 or .CHE80 extension. Its modular framework allows the hackers to create custom threats against specific targets. We anticipate that newer versions will be...Read more The post Remove Matrix Ransomware – Restore .CHE808 Files ... Read More
.gamma CrySiS Ransomware – Remove + Restore Files

.gamma CrySiS Ransomware – Remove + Restore Files

Security researchers have detected a new iteration of the CrySiS Ransomware which processes victim files with the .gamma extension. This new version follows the well-known behavior patterns and can cause many dangers to the infected hosts. It is based on...Read more The post .gamma CrySiS Ransomware – Remove + Restore ... Read More
Remove Rektware Ransomware – Restore Encrypted Data

Remove Rektware Ransomware – Restore Encrypted Data

The Rektware ransomware is a new virus threat that is currently being developed by a an unknown hacker or criminal collective. Unlike other ransomware it will add a randomly-named extension to the victim files. We suspect that future updates will...Read more The post Remove Rektware Ransomware – Restore Encrypted Data ... Read More
Remove ViroBotnet Ransomware and Restore .enc Files

Remove ViroBotnet Ransomware and Restore .enc Files

ViroBotnet ransomware is a new ransomware that modifies the target systems and encrypts user data with a strong algorithm, the resulting files will be marked with the .enc extension. At the moment the captured samples are an intermediate release, we...Read more The post Remove ViroBotnet Ransomware and Restore .enc Files ... Read More
2 Billion Bluetooth Devices Still Affected by the Blueborne Vulnerability

2 Billion Bluetooth Devices Still Affected by the Blueborne Vulnerability

Following last year’s disclosure of the BlueBorne vulnerability security experts note that about 2 billion Bluetooth devices are still affected by it. BlueBorne is a collection of bugs that allow the hackers to intrude into them. Many of these devices...Read more The post 2 Billion Bluetooth Devices Still Affected by ... Read More
Remove BondUpdater Trojan — Restore Your Computer From Infections

Remove BondUpdater Trojan — Restore Your Computer From Infections

The BondUpdater Trojan is a dangerous weapon used against high-profile targets utilizing an unique infection mechanism. It is believed that the criminals behind it are highly experienced and are connected to a state-sponsored actor. Our article gives an overview of...Read more The post Remove BondUpdater Trojan — Restore Your Computer ... Read More
Cold Boot Attack from 2008 Still Affects PCs and Macs

Cold Boot Attack from 2008 Still Affects PCs and Macs

Computer criminals are constantly looking our for ways to infect computer systems at large. A recent security audit has revealed that hackers are using a 2008 cold boot attack which is still found in modern computers from all major vendors....Read more The post Cold Boot Attack from 2008 Still Affects ... Read More
Remove Matrix Ransomware and Restore .ITLOCK Files

Remove Matrix Ransomware and Restore .ITLOCK Files

Security reports indicate that a new iteration of the Matrix ransomware has been identified processing the victim files with the .ITLOCK extension. Our article provides an overview of the virus operations and it also may be helpful in attempting to...Read more The post Remove Matrix Ransomware and Restore .ITLOCK Files ... Read More
CobInt Trojan Removal Instructions — Restore Your Computer From Infections

CobInt Trojan Removal Instructions — Restore Your Computer From Infections

The CobInt Trojan is a newly devised malware that has been identified in several ongoing attacks. It is an upgraded version of a previous weapon that has the potential of infecting whole networks of computers. A dangerous characteristic of it...Read more The post CobInt Trojan Removal Instructions — Restore Your ... Read More
Whiplr Messenger Places Uses at Risk with Insecure Account Verification

Whiplr Messenger Places Uses at Risk with Insecure Account Verification

The Whiplr messenger has been found to utilize an insecure account verification procedure by requesting plain-text usernames and password combinations. This allows malicious users to easily hijack the information using various methods. The Whiplr Messenger Uses an Insecure Account Verification...Read more The post Whiplr Messenger Places Uses at Risk with ... Read More
Loading...