News - Page 2 category archyve:


If you thought that only desktop computers and mobile devices could be infected by malicious viruses, better think again. Here comes Ploutus, a Trojan infection that affects ATMs! The point is, as long as any type of computer employs an operating system to run smoothly, that operating system can be compromised by a malicious infection. In this article, we will tell you more about the infection, and its main aims, as based on the research by FireEye. As you can probably tell, Ploutus cannot infect your computer, and perhaps that is for the best because the Trojan clearly aims to steal as much money as possible. Read more »

Beware of the link on Skype

Beware of the link on Skype

Skype users worldwide are being disturbed by links. Since getting the link is usually followed by other activities performed automatically without the user’s permission, some experts specializing in cyber security suspect that malicious software is responsible for sending links to users. Unfortunately, a malicious application (e.g. Trojan, spyware, backdoor etc.) causing this phenomenon has not been yet detected, and Skype has not made any official statements so far. Therefore, it is not surprising that a different opinion exists too. Another group of specialists, including Skype’s online support, says that this issue might be associated with the so-called password exploit. Generally speaking, hackers could have obtained users’ Skype login details. On the basis of the previous experience, people using the same password on several different websites are the first ones whose passwords cyber criminals crack. As a consequence, users who have already received the link should rush to update their Skype passwords. Read more »

Yahoo Has Been Hacked! Change Your Passwords ASAP!

In a recent message addressed to “Yahoo Users,” Yahoo has informed about a hack that happened two years ago, in late 2014. A massive data breach – which some classify as the biggest of its kind ever – was reported on 22nd of September, and, according to the information provided, around 500 million accounts were hit. Although not all hacks are discovered right away, it is surprising that it took two years for the company to detect this and inform its users. Needless to say, the damage has been done, and now is the time to take action. The company has not presented any information regarding the security problems that have emerged due to the hack, but it is possible that a lot of users have already suffered some consequences without even knowing it. Hopefully, there is time for everyone to evade big security issues. Read more »

New malware to look out for: ElGato Ransomware

Malware researchers are warning about the emergence of a new family of ransomware called ElGato Ransomware. This malware is targeting Android devices, and it can lead to the encryption of the files found on them. According to recent information, it seems that this malware offers an open source code for other cyber criminals to exploit and create their own versions of ransomware. At this moment, the ransomware is still in its development stages, and it has not started a widespread attack; however, it might be only a matter of time before Android users get hit. When they do, the ransomware might not only lock the files but also initiate other malicious activities. Continue reading to learn more. Read more »

ShinoLocker Ransomware

ShinoLocker Ransomware

An application known as ShinoLocker Ransomware has been introduced to the audience during a presentation at the Black Hat USA 2016 convention. This piece of software has been designed by a security researcher, pen-test tool developer and pentester Shota Shinogi mostly for further virtual security research and general education purposes. The tool can be obtained from its official website and is free of charge. It is fully customizable, and each user can build a unique version of ShinoLocker Ransomware. Even though it is a great tool to educate yourself and to have a deeper understanding of the inner structure and functionality of a basic ransomware application, our team advises to use it carefully especially if you are not and an advanced computer user since you might face some unwanted outcomes. In this report, we present the features of this malware simulator and present various ways that it could be used. Read more »


KMSPico is a very popular tool for illegally activating Microsoft Windows and Microsoft Office products. Due to the fact that it is an unofficial activation program that tampers with certain settings of the OS, many anti-virus and anti-malware applications detect it as a threat, but most of them do not remove it since in most cases, it is labeled as “suspicious” and left as is. Such detections are usually detections are false positives because KMSPico is not malicious. Still many users have reported that this activation tool is a Trojan and it comes bundled with browser hijackers and adware. Therefore, in this article, we will discuss how this activation tool works and whether it is safe. Read more »

Maxon Click

Although you might not know what Maxon Click is, it could be the culprit of your virtual security’s instability. This clandestine threat works from web browsers on your Android devices, but it is unlikely to be a threat to the users of Windows and other operating systems alike. According to the adware analysts here at, this suspicious infection works with to inject ads. It is likely that it uses this domain as a server hosting advertisements. In order to stop the connection to this server and disable the advertising-injecting threat, you need to learn how it works and learn what steps to take. Read this report to find this information, and, if you want to ask us questions about anything related to the removal of Maxon Click, start a discussion below. Read more »

Locky Strikes an Unlucky Hospital

A Methodist hospital in Kentucky was hit hard earlier this week when a vicious Trojan ransomware attacked their computer network. Once this malware infection infiltrated one of the computers, it quickly spread on the whole network infecting all local drives as well as unmapped network shares. Locky Ransomware, as it was named after the .locky extension it appends to files, encrypted all databases, image, video, audio, and program files with a next-to-impossible-to-crack encryption algorithm. Obviously, the hospital will not be able to use the infected computers and the encrypted files unless they comply with the demands of the cyber criminals who created this dangerous Trojan. Although the ransom fee does not seem to be too high for an institution, this hospital is working closely with the FBI to find a legal way out of this terrible situation. Nevertheless, they have not yet ruled out the possibility of paying the fee to be able to recover the files. One thing is certain, though, they will not be able to use the infected computers unless they remove Locky Ransomware. Read more »

Safer Internet Day

Safer Internet Day

I don’t know if you are big on social networks, but I have an account, and these guys ask you a random question every single day. This morning, they wanted to know what “good vibes” I have to offer to make the Internet a better place. Well, what would you know: It’s the Safer Internet Day 2016 today, and so various platforms and companies celebrate it in multiple ways. Read more »

Linux.Encoder.1 Assails Linux Web Servers

Ransomware infections have been around for a long time now with the first one recorded back in 1989. Unfortunately, ransomware is on the rise at the moment, and infections like Linux.Encoder.1, Chimera Ransomware, or Tox Ransomware find ways to attack operating systems without any warning. Linux.Encoder.1 is one of the more complex and destructive infections of its kind as it primarily targets servers, not individual machines. As recent research has revealed, this threat targets sites linked to the Linux operating system, which allows cyber criminals behind this infection to cause more damage. Read more »