New malware to look out for: ElGato Ransomware

Malware researchers are warning about the emergence of a new family of ransomware called ElGato Ransomware. This malware is targeting Android devices, and it can lead to the encryption of the files found on them. According to recent information, it seems that this malware offers an open source code for other cyber criminals to exploit and create their own versions of ransomware. At this moment, the ransomware is still in its development stages, and it has not started a widespread attack; however, it might be only a matter of time before Android users get hit. When they do, the ransomware might not only lock the files but also initiate other malicious activities. Continue reading to learn more. Read more »

Switch2Search

Switch2Search

Switch2Search is a browser plugin that is supposed to “enhance your social search experience and your new tab background.” It might sound like a fun and useful extension, but our researchers at Anti-spyware-101.com want to warn users that it could be potentially harmful as well. The application allows the user to switch between search engines and change the background from provided images gallery. However, the plugin may also display third-party advertising content while you search the Internet. Users might even encounter ads that have links to malicious web pages. Needless, to say that if you want to keep the system protected, it is better to stay away from such content. Therefore, we advise users to erase the application as it might show you such ads. Additionally, we prepared deletion instructions that are available below the text. Read more »

Search-shield.com

Search-shield.com

Search-shield.com is a questionable search engine that might be distributed through pop-up advertisements. It is crucial to mention that such pop-ups could appear with a help of unreliable software, such as adware, browser hijackers, and so on. The application might set Search-shield.com as the user’s default search engine or homepage. If you noticed such changes, you should replace the website with a trustworthy one because using the search tool may cause you trouble. Despite the fact that the application looks like Bing, you might receive slightly different results from the ones that you should get on bing.com. It looks like the software could modify gathered results by placing additional third-party ads. These ads might be dangerous to the system, but to learn more, you should read the rest of the article. Also, there is a removal guide below the text that users could use if they decide to delete the application. Read more »

Search.searchlen.com

Search.searchlen.com

Once again, we have another newly released browser hijacker that comes from the SaferBrowser family of browser hijackers. Like its predecessors, Search.searchlen.com is a malicious search engine that you ought to remove as soon as possible. According to our malware researchers, it is set to hijack your browser’s homepage address and search provider settings. The purpose of this is to redirect web traffic and subject you to promotional links presented in this hijacker’s search results. As a result, the developers and their clients make money, but you run the risk of your computer becoming infected with malware, and there is no way to validate the legitimacy of the promotions. Read more »

Search.yourpackagesnow.com

Search.yourpackagesnow.com

Search.yourpackagesnow.com is not a program that you want to find active on your operating system. This is so because the devious application in question has been classified as yet another browser hijacker that you should remove without second thoughts if it is ever found up and running on your personal computer. It is critical to do so since the hijacker in question is capable of making fundamental changes to your web browser's default settings which in consequence can make your overall online experience into a miserable one, to say the least. While such functionality is its most prominent feature, you must also be notified about the dangers regarding it; having it active on your PC might be harmful as your operating system could be exposed to devious web content. To surf the web the way you are used to and to maintain a fully secure system at all times, you need to conduct a complete removal of Search.yourpackagesnow.com as soon as possible. Read more »

DiskPower

DiskPower

DiskPower is a program that should look for duplicate files on user’s computer. According to our researchers at Anti-spyware-101.com, the application is rather primitive, and it might also work in an unwanted manner. For that reason, it was categorized as a potentially unwanted program (PUP). The problem is that the software might not only search for duplicates, but also display suspicious pop-ups or other content with third-party ads. The advertising could appear on your screen, and since the software can auto-start with Windows, it might be hard to escape these ads. If you find it annoying, we would advise you to delete the application with our removal instructions available at the end of the article. By doing so, you might protect the system from possibly dangerous content. Read more »

Search.funsocialtabsearch.com

Search.funsocialtabsearch.com

Search.funsocialtabsearch.com is a browser hijacker that will enter your computer when you expect it the least. This type of security threat usually changes your default settings and redirects you to unfamiliar websites that may prove to be dangerous. It is very often that users do not realize how dangerous browser hijackers can be. They usually look like your ordinary search engines, and users end up ignoring them. However, if this program changed your browser’s settings, you have to remove Search.funsocialtabsearch.com from your computer. The longer it remains in your system, the more damage it may cause, especially if the program gets exploited by cyber criminals. Read more »

Cerber2 Ransomware

Cerber2 Ransomware

It is high time we talk about a new ransomware called Cerber2 Ransomware. It is an updated version of Cerber Ransomware, so it is just as dangerous. We suggest that you remove it from your computer as soon as you can. However, once it has infected your PC and encrypted the files on it is unlikely that you will be able to decrypt them using a third-party decryption tool. You should not pay the ransom the cyber criminals ask you to pay because you might not receive the decryption key. Furthermore, they ask for a large sum of money, and your files may not be worth it. Also, if you do not pay within seven days, then the ransom will increase twofold. There is a lot more to say about this infection, so please continue reading to find out more. Read more »

Hitler Ransomware

Hitler Ransomware

If a scary window with the image of Hitler pops up on your screen, Hitler Ransomware must have invaded your operating system. This malicious threat does not work in the exact same way as CrypMIC Ransomware, CTB-Faker Ransomware, and other well-known infections because it does not encrypt files; however, it can be dangerous, and deleting it is crucial. Anti-Spyware-101.com analysts warn that you should not restart your PC under any circumstances because this might lead to the elimination of your personal files! You can learn more about this by reading the report. Overall, it appears that this particular ransomware infection can be disabled in an easy manner. If you are interested in the removal of Hitler Ransomware, and we are sure that you are, please continue reading. Read more »

CrypMIC Ransomware

CrypMIC Ransomware

Some users mistake CrypMIC Ransomware for an older infection named CryptXXX Ransomware, and this is a mistake that is very easy to make. Both of these infections are spread in the same way, using the Neutrino exploit kit. They use nearly identical messages via TXT and HTML files. Moreover, they demand the same things. Of course, the older infection is the original one, and it appears that the new one is only copycatting it to trick you. In any case, regardless of which of these two infections you encounter, you are at risk because both of them can encrypt your most sensitive, personal files and demand a ransom in return for their release. Unfortunately, it is naive to think that the cyber crooks behind this ransomware (any of them) will help you out. Once you pay the ransom, cyber criminals get what they want, and they more likely than not to move on to the next thing. Although you might be provided with an allegedly functioning decryptor, it is unlikely to decrypt your files. Despite this, you should not delete CrypMIC Ransomware and the corrupted versions of your personal files just yet. Read more »