Predator Mobile Malware Targets Android Phones screenshot

Predator Mobile Malware Targets Android Phones

Security researchers with Google's Threat Analysis Group (TAG) have recently published detailed information on a piece of mobile malware affecting Android devices. The mobile malware is named PEDATOR and was used in... Read more

May 20, 2022
Saitama Backdoor screenshot

Saitama Backdoor

Saitama backdoor is the name of a newly discovered piece of malware, coded and compiled in .Net. As the name suggests, Saitama operates like a backdoor. The malware is distributed as an executable file, named... Read more

May 20, 2022
How to Remove BlockAll PUP screenshot

How to Remove BlockAll PUP

A Chrome browser extension with the name "BlockAll" advertises itself as an ad blocker. In reality, however, it acts like adware and will display unwanted and intrusive advertising inside the user's browser. BlockAll... Read more

May 20, 2022
Sysrv-K Botnet Tries to Mine Crypto on Victim Devices screenshot

Sysrv-K Botnet Tries to Mine Crypto on Victim Devices

The Sysrv botnet has been around for a while now, but security researchers have identified a new, updated strain of the malicious tool. The new version has been dubbed Sysrv-K and it is targeting both Windows and... Read more

May 19, 2022
GlobalQueue Adware screenshot

GlobalQueue Adware

GlobalQueue is the name given to a piece of potentially unwanted software that can end up on Mac computers. GlobalQueue has some similarities it shares with browser hijackers and some it shares with adware. It can... Read more

May 19, 2022
Cryptbit Ransomware screenshot

Cryptbit Ransomware

Cryptbit ransomware is a strain of file-encrypting malware that scrambles the data inside files on the targeted system, rendering them unreadable. Once Cryptbit is deployed on a system, it will start encrypting files... Read more

May 20, 2022
VoltageTask PUP screenshot

VoltageTask PUP

VoltageTask is the name given to a piece of potentially unwanted software. It can be found installed on Mac computers. VoltageTask shares some similarities with browser hijackers. It can quietly inject ads into the... Read more

May 20, 2022
Fefg Ransomware screenshot

Fefg Ransomware

A new strain of ransomware based on Djvu ransomware code has been registered by researchers. The new variant is called the Fefg ransomware. The malware does exactly what you would expect it to - it encrypts the... Read more

May 19, 2022
World Grass Ransomware screenshot

World Grass Ransomware

World Grass, also going by the aliases EarthGress and EarthGrass, is a strain of file-encrypting malware, commonly classified as ransomware. The ransomware will encrypt files on the victim system, appending a... Read more

May 20, 2022
Juicycelebinfo.com Mixes Lures to Plant Ads in Browsers screenshot

Juicycelebinfo.com Mixes Lures to Plant Ads in Browsers

Juicycelebinfo dot com is the domain associated with a misleading website. Its chief purpose is to plant annoying pop-up ads in the browsers of visitors and generate revenue for the website owners in the process. The... Read more

May 20, 2022
Aytonus.com Scares Users with Fake Warning Messages screenshot

Aytonus.com Scares Users with Fake Warning Messages

Aytonus dot com is a malicious and misleading website that displays fake warning messages to users who land on it. The site is targeting mobile users, specifically iPhone owners, and will display a window, tailored to... Read more

May 20, 2022
BTC (Voidcrypt) Ransomware screenshot

BTC (Voidcrypt) Ransomware

Researchers have singled out a new ransomware variant. The new strain is called BTC ransomware and belongs to the wider family of Voidcrypt ransomware strains. Unlike other recent clones of the Djvu ransomware family,... Read more

May 19, 2022
1 2 3 4 5 6 7 8 9 ... 413