category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

M@r1a Ransomware

M@r1a Ransomware is a threat that you do not want to let into your operating system because the moment it gets in, it starts encrypting files. Once files are encrypted, their data is modified, which makes them unreadable. The infection is meant to corrupt users’ files and ensure that they have no other option but to pay the ransom. Of course, you have the option of not paying the ransom at all! Even though the ransom requested by the creator of this malware is relatively small (US$50), it is still money that you are unlikely to put to good ...

17 hours 38 min ago

Tunca Ransomware

Tunca Ransomware is a malicious application that encourages its victims to infect other users. The malware encrypts some of the user’s data and then demands to pay around one hundred euros. If the user cannot pay, the hackers behind the threat offer another deal. To be more accurate they ask to infect ten other users and send proof of it. In exchange, they promise to deliver needed decryption tools free of charge. Needless to say, it would be unwise to agree with any of it, as there are no guarantees the hackers will keep up to their promises. In ...

1 days ago

SpeedTest3

SpeedTest3 is a browser extension offered for Google Chrome and Mozilla Firefox users. Looking at its title, one can think the tool is designed to test Internet speed, but the application’s description does not mention it. All it says is the add-on should track your browsing and show you third-party advertising content. Such behavior might be unwelcome, especially if you had no idea the tool is going to display ads and was hoping it will only test your Internet speed. In such case, we would advise you not to waste any time on it any longer and erase SpeedTest3 ...

1 days ago

System Firewall Has Blocked Some Features Pop-up

If you are suddenly introduced to the 'System Firewall Has Blocked Some Features' Pop-up while browsing the web, the chances are that you have visited an unreliable website or clicked a malicious link that routed you to the scam page. This page represents a misleading message that is meant to convince you that you have encountered a serious security issue. While we cannot promise that your operating system is malware-free, you should not just assume that malware exists. ...

1 days ago

Search.searchmedia.online

Was the homepage or the default search provider on your web browser modified without your permission? Was Search.searchmedia.online set as the new homepage or provider? If that is what has happened, you have a browser hijacker on your hands. Even if your browser’s settings were modified with your notice and permission, you need to evaluate the search tool carefully to decide whether or not trusting it is a good idea. According to our team of malware experts, the best thing you can do is remove Search.searchmedia.online, and if you are not sure why that is necessary, this is the ...

2 days ago

"Hacker who cracked your email and device" Sextortion Scam Terrorizes People Using Authentic Passwor

The devious ‘Hacker who cracked your email and device’ Scam has several different shapes and forms, and that is because once one hacker found a way to extort money from users, many others decided to join the party. The backbone of the scam is the actual password of the victim who is targeted. Most likely, hackers behind these scams have obtained files containing email addresses and passwords linked to them. Unfortunately, because attackers are using actual passwords, the victims believe the bogus information and follow the demands to pay humongous ransoms. In this post, you will find information about the so-called ...

2 days ago

Sicck Ransomware

Photos, family videos, work documents, file archives, and various other kinds of files might be encrypted by Sicck Ransomware if this malicious threat finds its way into your operating system. The infection, according to our researchers, is most likely to be introduced to Windows users via file attachments sent via misleading spam emails. If the infection corrupts a computer that is part of a larger network, it can scan that network to see if other vulnerable computers exist. Specifically, the infection looks for outdated systems with a Shadow Brokers SMB vulnerability. It can be exploited by the ransomware to spread ...

8 days ago

blacklist@clock.li Ransomware

Have you found the All your files have been encrypted window placed over your Desktop? If that is exactly what you have noticed recently, there is no doubt that blacklist@clock.li Ransomware is the threat that you have encountered. This infection is the newest variant of Crysis/Dharma Ransomware, so we are not surprised at all that that it acts the way it does. To be more specific, this malicious application not only opens a window that covers the entire screen, but it also locks personal files on the affected computer soon after it enters it. Cyber criminals expect that they could ...

10 days ago

GusLocker Ransomware

GusLocker Ransomware appears to be an evolving infection. After discovering one version of this malicious threat, our research team soon discovered a new one. They both function in the same way, but there are a few minuscule differences. For one, the ransom note files have unique names. Second, the extensions that are added to the corrupted files are unique as well. The original variant of the threat adds the “.GUSv2”extension, while the new one adds “.bip.” Fortunately, the infection does not change the names of the files it encrypts, and so it is easier to understand what has happened. ...

10 days ago

Outsider Ransomware

Outsider Ransomware was named this way because of the ransom note it shows. The malicious application displays the message after encrypting user’s pictures, photos, and other private data. Through it the hackers behind the malware demand to be contacted via email to get further instructions telling how to pay a ransom and get a decryption tool. What we recommend is ignoring the note as there is not knowing whether the attackers will send the decryption tools they promise. If your fear you could be tricked as well, you should delete Outsider Ransomware instead. The instructions, at the end of the ...

10 days ago

getdataback@fros.cc Ransomware

getdataback@fros.cc Ransomware is a threat that will turn your world upside down – it will lock all your files, ...

14 days ago

MyOfficeTab

There are tons of applications out there that seemingly come with nice features. MyOfficeTab is one of such applications. At ...

14 days ago

help@decrypt-files.info Ransomware

help@decrypt-files.info Ransomware is a nasty computer threat that will cause you a bunch of problems if it ever slithers ...

14 days ago

French MoWare H.F.D ransomware

When we encounter such malicious programs as French MoWare H.F.D ransomware, it sometimes seems that they target only certain users. ...

15 days ago

MyFashionTab Toolbar

MyFashionTab Toolbar is one of the potentially unwanted programs created by an unreliable company known as Mindspark Interactive Network, ...

1 months ago

mixSportTV Search Plus

Have you checked all the extensions that you have added to your Chrome browser? Don’t you know whether you ...

1 months ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation