Phishing surrounding coronavirus outbreak continues – scam emails deliver a new version of Zeus Sphinx banking trojan While some cybercriminals promise to spare infecting healthcare providers with malware during a difficult time of coronavirus outbreak,[1] others are keen to use it for personal gain. Security researchers at IBM X-Force uncovered […]
Virus
CyberGhost – a feature-packed VPN service that helps to prevent tracking CyberGhost VPN is one of the most reliable and privacy-focused Virtual Private Network services around. Based in Romania and Germany, this VPN client serves more than 10 million people worldwide. It provides a stable connection to more than 5,800 servers […]
CyberGhost
Taargo ransomware is the widespread malware that runs various processes in the background to affect virus termination and data recovery procedures Taargo ransomware is a cryptovirus that adds _aro.exe file, for example, that runs in the background of the device and manages to affect functions or program performance. This is […]
Taargo ransomware
Pluto TV review: an ad-supported program that causes advertising campaigns while being used for watching movies Pluto TV is represented as a legitimate online television service granting access to 75 live channels and streaming hundreds of popular movies and TV series. However, cyber security experts have doubts is Pluto TV safe […]
Pluto TV
#StayHome Tech – Private Internet Access VPN Considering how the recent COVID-19 pandemic has been evolving, people all over the world are being encouraged to #StayHome, no matter if they’re sick or not. These campaigns make people more present online and more involved in the world of cybersecurity due to malicious […]
Online safety issues during the quarantine: how to manage your ...
[[email protected]].LX ransomware is the cryptovirus that locks users’ files and may even damage them completely overtime LX ransomware is the threat that uses army-grade encryption algorithms to lock various files found on the targetted machine and then demands payments from victims. The ransom demand claims that criminals can recover encoded […]
[[email protected]].LX ransomware
Receiver Helper virus is adware app that sneaks into Mac computers unnoticed Receiver Helper is a potentially unwanted application goal of which is to install suspicious extensions on web browsers and display unwanted ads on all visited websites Receiver Helper is a potentially unwanted application goal of which is to […]
Receiver Helper virus
Mado ransomware is the infection created with the purpose of getting money directly from victims by locking their valuables Mado ransomware – a threat that belongs to a family of notorious crypto viruses, focusing on scaring people into paying the demanded amounts. The money-driven people behind this malware are […]
Mado ransomware
Solo84.biz is the browser pop-up scam that tricks people into subscribing to nonsense push notifications Solo84.biz is the potentially unwanted program that creates tons of pop-ups and other types of material that displays promotional content or advertisements that trigger additional redirects your phone and computer to possibly malicious and dangerous […]
Solo84.biz
A data dump containing 4,934,863 Georgian voters’ personal information was found being sold on the underground forums On Saturday, security researchers from Under the Breach discovered a listing on underground hacking forums – it contained personal information of Georgian citizens. The data dump reached 1.04 GB in size and was […]