Monthly Archives: August 2016 - Page 7

DiskPower

DiskPower

DiskPower is a program that should look for duplicate files on user’s computer. According to our researchers at Anti-spyware-101.com, the application is rather primitive, and it might also work in an unwanted manner. For that reason, it was categorized as a potentially unwanted program (PUP). The problem is that the software might not only search for duplicates, but also display suspicious pop-ups or other content with third-party ads. The advertising could appear on your screen, and since the software can auto-start with Windows, it might be hard to escape these ads. If you find it annoying, we would advise you to delete the application with our removal instructions available at the end of the article. By doing so, you might protect the system from possibly dangerous content. Read more »

Search.funsocialtabsearch.com

Search.funsocialtabsearch.com

Search.funsocialtabsearch.com is a browser hijacker that will enter your computer when you expect it the least. This type of security threat usually changes your default settings and redirects you to unfamiliar websites that may prove to be dangerous. It is very often that users do not realize how dangerous browser hijackers can be. They usually look like your ordinary search engines, and users end up ignoring them. However, if this program changed your browser’s settings, you have to remove Search.funsocialtabsearch.com from your computer. The longer it remains in your system, the more damage it may cause, especially if the program gets exploited by cyber criminals. Read more »

Cerber2 Ransomware

Cerber2 Ransomware

It is high time we talk about a new ransomware called Cerber2 Ransomware. It is an updated version of Cerber Ransomware, so it is just as dangerous. We suggest that you remove it from your computer as soon as you can. However, once it has infected your PC and encrypted the files on it is unlikely that you will be able to decrypt them using a third-party decryption tool. You should not pay the ransom the cyber criminals ask you to pay because you might not receive the decryption key. Furthermore, they ask for a large sum of money, and your files may not be worth it. Also, if you do not pay within seven days, then the ransom will increase twofold. There is a lot more to say about this infection, so please continue reading to find out more. Read more »

Hitler Ransomware

Hitler Ransomware

If a scary window with the image of Hitler pops up on your screen, Hitler Ransomware must have invaded your operating system. This malicious threat does not work in the exact same way as CrypMIC Ransomware, CTB-Faker Ransomware, and other well-known infections because it does not encrypt files; however, it can be dangerous, and deleting it is crucial. Anti-Spyware-101.com analysts warn that you should not restart your PC under any circumstances because this might lead to the elimination of your personal files! You can learn more about this by reading the report. Overall, it appears that this particular ransomware infection can be disabled in an easy manner. If you are interested in the removal of Hitler Ransomware, and we are sure that you are, please continue reading. Read more »

CrypMIC Ransomware

CrypMIC Ransomware

Some users mistake CrypMIC Ransomware for an older infection named CryptXXX Ransomware, and this is a mistake that is very easy to make. Both of these infections are spread in the same way, using the Neutrino exploit kit. They use nearly identical messages via TXT and HTML files. Moreover, they demand the same things. Of course, the older infection is the original one, and it appears that the new one is only copycatting it to trick you. In any case, regardless of which of these two infections you encounter, you are at risk because both of them can encrypt your most sensitive, personal files and demand a ransom in return for their release. Unfortunately, it is naive to think that the cyber crooks behind this ransomware (any of them) will help you out. Once you pay the ransom, cyber criminals get what they want, and they more likely than not to move on to the next thing. Although you might be provided with an allegedly functioning decryptor, it is unlikely to decrypt your files. Despite this, you should not delete CrypMIC Ransomware and the corrupted versions of your personal files just yet. Read more »

Safesurfs.net

Safesurfs.net

Safesurfs.net can show up in your browsers silently, i.e., without your permission or knowledge. This questionable search page can change the Target lines of your browser shortcuts and start up as your new home page every time you open any one of your major browsers, including Mozilla Firefox, Internet Explorer, and Google Chrome. Unfortunately, contrary to its name, this search page can actually put your virtual security at risk. In fact, our malware specialists at anti-spyware-101.com have classified this infection as a browser hijacker. This malware can expose you to unreliable websites through content it may display on your screen. Therefore, we advise you to remove Safesurfs.net from your computer as soon as possible because the longer your keep it there, the more chances it has to harm your privacy and your system. It is also important to mention that this browser hijacker may not even be the only threat you are facing right now. For the details, please read on. Read more »

SOSO DESK

SOSO DESK

SOSO DESK’s promotional slogan states that it is “A free & small device manager.” However, our research has shown that it is a potentially unwanted program that you might want to remove because it will not provide you with a service that can improve your computing experience. Its primary function is to search for files on your PC which is hardly a unique service, but we are more concerned with the fact that it can secretly install malicious programs. Such an action is, of course, unacceptable and even though this particular application is not a malicious we do not recommend using it. Read more »

Search.yourmediatabsearch.com

Search.yourmediatabsearch.com

Have you been forced into installing Search.yourmediatabsearch.com? This search tool is linked to the YourMediaTab extension allegedly powered by Stepitapp, which follows in the footsteps of Imali Media and SaferBrowser. If you want the extension, you will have to accept the search tool as well, which is why it is classified as a browser hijacker. This is exactly how users are introduced to Search.funsocialtabsearch.com, Search.socialnewpagessearch.com, and other Imali Media and SaferBrowser hijackers. Of course, it is also possible that they will corrupt your browsers (Chrome or Firefox) without your permission, but it is most likely that you will know about the installation of this suspicious search tool. Now, the fact that you are responsible for letting it in does not change the fact that you should remove Search.funsocialtabsearch.com from your browsers. If you need help erasing this hijacker, you should continue reading. Read more »

Wizesearch.com

Wizesearch.com

If your browser’s homepage has been changed to Wizesearch.com, then rest assured that your PC has been infected with a browser hijacker, and you should remove it. It only appears as if it is a legitimate search engine but the fact that it is distributed in a dishonest manner makes it an infection. Not only that, but it is set to redirect web traffic and subject you to promotional links of unverified legitimacy. It is part of a web monetization campaign, and its primary objective is to generate adverting revenue for its developers and their advertising partners. To find out more about this seemingly reliable yet malicious search engine, please read this whole article. Read more »

Cryakl Ransomware

Cryakl Ransomware

Security experts at Anti-spyware-101.com have recently come across an application called Cryakl Ransomware. They advise that you remove it as soon as you notice its presence. It is configured to encrypt files stored on your computer’s hard drive and then offer you to purchase the decryption key needed to decrypt them. The encryption method used ensures that the files are unusable, and it uses a strong hybrid encryption with a long key. Therefore, it will take time before computer security researchers develop a free decryption tool if they develop it at all. Read more »