Author Archives: Max Lehmann - Page 97

Venis Ransomware

Even though Venis Ransomware is not as popular as quite a few of its counterparts, you should keep in mind that it is still extremely dangerous to have it fully up and running on your operating system. Just like any other malicious program of this category the one in question could lock your personal data without any warning or authorization. It goes without saying that such functionality could have devastating outcomes. If you ever happen to find this devious piece of software fully active on your computer, do not hesitate to execute its thorough removal as it is your best bet to limit the potential data loss; make sure to use the detailed instructions that we present below to terminate it without encountering any major problems. In this report, we provide further information regarding the malicious functionality of this ransomware along with a few virtual security tips that should allow you to avoid this or any other devious and dangerous programs. Read more »

Search.newtab-mediasearch.com

Search.newtab-mediasearch.com

According to our cyber security specialists, Search.newtab-mediasearch.com is a malicious search engine that was also classified as a browser hijacker due to the method used to disseminate it. Therefore, we recommend that you remove it from your computer entirely because not only will it hijack your browser’s homepage address, but subject you to questionable promotional links if you were to use it. Furthermore, it can collect some information about you and use it for marketing and advertising purposes. There is no doubt that this search engine is illegitimate, but if you want to know more about its inner workings, we invite you to read this article in its entirety. Read more »

Jack.Pot Ransomware

Jack.Pot Ransomware

Jack.Pot Ransomware is a malicious infection that is still in its developmental stage. It means that the program does not spread actively, and only a handful of users have been infected with it so far. Nevertheless, you should know more about the infection, in the case, it eventually grows into something bigger.

Since the program does not seem to be completed yet, it is hard to tell whether it will be possible to decrypt the affected files. However, it is always possible to restore the affected files by transferring healthy copies of the files from your backup drive. Therefore, there is always a way out of this situation, and the most important thing is to not panic. Read more »

InspiringBackgrounds

InspiringBackgrounds

InspiringBackgrounds is a new browser extension that may seem useful to you but it is definitely not without risk. As a matter of fact, our malware researchers at anti-spyware-101.com say that this questionable extension is none other than a newcomer from the notorious Mindspark family created by Mindspark Interactive Network, Inc. We have seen the emergence of dozens of similar potentially unreliable tools in the past months and years. Of course, we do not claim that this is a major attack and you need to unplug your computer and barricade your windows right away. In fact, our malware experts have concluded that, just like all other tools coming from this family, this infection is also a potentially unwanted program, or PUP in short. In this sense it is, of course, possible that keeping or using this browser extension could lead to system security vulnerabilities. If it is important for you to use a safe computer, we suggest that you remove InspiringBackgrounds as soon as possible. In order to learn more about the potential risks, please continue reading our article. Read more »

Screenlocker Cuzimvirus

Screenlocker Cuzimvirus

Sometimes programs look more dangerous than they really are, and Screenlocker Cuzimvirus is one of such applications. Our security experts say that this program is a Trojan that tries to look like a genuine ransomware application. However, the program does not work properly. While that is a shame for its creators, it is a piece of good news for us because it means we will be able to remove Screenlocker Cuzimvirus without much difficulty. Read more »

Safestsearches.com

Safestsearches.com

Safestsearches.com is a browser hijacker that may use Bing search engine to show results injected with suspicious pop-ups, sponsored links, and other annoying advertisements. In fact, such content may appear to be dangerous as well since it could come from potentially harmful websites. Further in the article, we will explain to you more about such ads and the risks they could carry. Also, we urge to read the part related to the browser hijackers distribution as it may help you realize how Safestsearches.com appeared on the browser or how to keep away from this kind of software in the future. As the application might be unsafe to use, our researchers recommend its removal. If you wish to eliminate the program too, slide below the article and use the provided instructions. Read more »

iSpy Keylogger

iSpy Keylogger

iSpy Keylogger is a malicious keylogger Trojan that can be acquired by almost anyone who wants to indulge in criminal activities. This type of malicious software is created primarily to spy on the unsuspecting computer users and then steal your data for financial purposes. You may not even know that you have this infection on-board, so it is important that you run regular system scans to see whether your computer is safe and clean. If this keylogger happens to be installed on your computer, you need to remove iSpy Keylogger immediately. Otherwise, the infection will cause all sorts of damage. Read more »

Dnav.com

Dnav.com

Dnav.com looks like a search engine, and it provides search results; however, it does that by redirecting you to Bing.com search engine, and that is quite strange. Did you know that you would be redirected to Bing when using this search tool? The information representing this search tool informs that it uses Google, Yahoo, and Bing services to provide users with search results. On top of that, the interface includes a tag that says “Results by Bing,” which, of course, should make it clear that this suspicious search provider does not produce its own results. Here is a question for you: Why do you need a search tool like that? Would it not be more convenient just to employ Bing as your default search provider or to open on startup? The reality is that the search results shown to you are meant to distract you from something else, and that is what we discuss in this report. We also discuss the best way to delete Dnav.com from your web browsers. Read more »

Trickbot Virus

Anti-Spyware-101.com research team warns about a new threat, Trickbot Virus. This is a banking Trojan that is likely to have been created by the same people who stood behind the already dismantled Dyre Trojan, also known as Dyreza Trojan. The loaders of both of these infections are practically identical, and they serve the same purpose. The differences between these infections are in the programming language (the new version was created using C++, and Dyre was created using C language) and programming interfaces (the new version uses Microsoft CryptoAPI). Other than that, both Trojans are very similar, which is why it is believed that they were developed by the same group of cyber criminals. As mentioned already, the new version of the infection is identified as a banking Trojan and, needless to say, it targets online banking accounts. Although, at the moment, this infection is localized in Australia, we do not dismiss the possibility that it will cross-over at some point in the future. Regardless of where you live, check if you need to remove Trickbot Virus, and implement security software to ensure protection against this malware. Read more »

search2016-ping.com

search2016-ping.com

search2016-ping.com may look like a regular search engine, but it is not one that you would want, and there is nothing regular about it. In fact, it is irregular because it is a browser hijacker and we recommend that you remove it if it has secretly replaced your browser’s homepage. Indeed, it is distributed in a highly malicious manner and is set to feature questionable and even malicious promotional links in its search results, and that may prove detrimental for your computer. The sooner you get rid of it, the better. However, before you do that, please read this whole article. Read more »