Hacker behind UNNAMED1989/WeChat Ransomware finally arrested

The beginning of December 2018 was a tense time in China, for both online users and cybersecurity specialists because of one really persistent and widespread threat called UNNAMED1989, or also known as WeChat ransomware. This cryptovirus managed to infect over 100k computers within then matter of a few days, demanding for 110 Chinese yuan ($16 … Continued

New complex miner threatens Linux users

Cryptomining is a considerably new malware, which still is being explored by cyber specialists and crooks, unfortunately. These silent crypto viruses make perfect threats because of the sophisticated obfuscation techniques that keep them undetectable, widespread and easy dissemination, and no need for any interaction/initiation from the infected victim. Windows users are used to warnings of new miner … Continued

Fake Black Friday’s Apps Scamming Customers

Black Friday is not only a good chance to save some money and get great deals for customers but also a perfect opportunity for cyber criminals to take advantage of this madness and make some money by scamming Black Friday’s shoppers. Actually, the money that can be made this weekend by developers of malicious or … Continued

How to remove Spyhunter

SpyHunter is a security software which works on Windows operating system and provides malware removal functions. It has been in this anti-spyware business for more than 10 years saving users from all kinds of threats, such as worms, trojans, ransomware, hijackers and etc. Despite the positive evaluation and popularity amongst regular computer owners and cyber … Continued

New cryptomining virus obfuscation technique using Windows Installer

The rise of the crypto mining malware and it slowly replacing other types of computer viruses like ransomware is not that surprising after all. By using various obfuscation techniques these cryptocurrency-mining viruses manage to stay undetected by security programs, which makes them very appealing to hackers who don’t have to worry about their developed threat … Continued

How to remove Restoro

Restoro Windows Repair is an application for Windows OS, that falls under the category of utility programs. Even though it does not provide real-time virus protection, Restoro is capable of not just fixing damaged files but removing malware too, unlike many other rogue applications, that just pretend to do so. This useful and trustworthy software is liked … Continued

How to uninstall Combo Cleaner

Generally, Mac computers are and resistance to malware, however, sometimes even the best ones need help dealing with viruses and system errors. There is not a big variety of utility and antivirus products for Macs, that is why Combo Cleaner multi-tool is probably one of the most popular software that is used for such cases. This legitimate … Continued

How To Remove Reimage

Reimage Repair and Reimage for Mac is completely legitimate software that can provide an all-around protection to your computer – the main task of this software is to make your computer run smooth and solve any problems that get in the way. It can protect your system from malware, it can remove junk files and … Continued

How to disable Web Push Notifications

There’s not one person who hasn’t yet come across the web push notifications when surfing the Internet. These tiny clickable alerts are sent to your browser by the websites, which aim to directly interact with their visitors with the real-time updates and etc. This feature originally comes from the smartphone apps, but unlike the latter, … Continued

GandCrab v5 ransomware is back with new features

This fall has not only brought us rain, cold and colorful leaves, but also the notorious GandCrab ransomware back, this time even more improved and vicious. GandCrab v5 just showed up on September 24, 2018, roaming around and encrypting precious personal files all around the globe, but mainly Central Europe. After getting rather upset about … Continued

KODI add-ons spread cryptomining virus, ESET warns

These past years online streaming services almost completely took over the regular cable TVs allowing people to access their favorite shows and movies anywhere on any device, therefore with the increasing demand, various streaming services started to pop out offering comfort and entertainment in their own ways. One of them was Kodi, which today is facing … Continued

How To Remove Junk Files

To keep your computer in shape and running for years, you need to clean it once in a while – just like your room or car. The biggest problem with that digital trash is that it takes place on your hard drive and it hurts overall system performance in a long run. Moreover, you probably … Continued

IRL app – a fun app for teens or a hidden mobile malware

These past months have brought a lot of attention from and to this, at the first glance innocent-looking, a mobile application called IRL app. IRL, which stands for ‘In Real Life’, was designed to send invitations to friends to hang out in reality with each other with various theme suggestions based on interests, area, holidays … Continued

Advisorsbot malware downloader is spreading rapidly via malspam

Last week Proofpoint researchers presented a malware discovery dubbed , which attacked banks and other finance-related companies via millions of bogus email messages (similar to Locky ransomware). The registered features, of Marap (reversed “param“) virus, were very similar to Trojan activity because after the infection it would download further modules and payloads, but what was interesting, … Continued

DeepLocker – the new Artificial Intelligence powered malware

For the past few decades, artificial intelligence (AI) has been increasingly taking over more and more tasks not only in the science/cyber world but our everyday lives as well. Logistics, medical diagnostics, statistics, economy, mathematics are now unimaginable without this machine intelligence, which at times acts like a sort of form of entertainment seeing computer trying to … Continued

Recent Posts

Security Guides

Recent Comments