HackTool:Win32/Keygen - What Is It and How Dangerous?
HackTool:Win32/Keygen is the detection handle assigned to a potentially malicious file by the Microsoft Windows Defender software. HackTool:Win32/Keygen is not the name of the actual threat, the container, or the... Read more
Memento Ransomware Gang Resorts to WinRAR if the Encryption Fails
Ransomware gangs often experiment with new attack methods, or extortion techniques. The Memento Ransomware organization is one of the latest groups to introduce a relatively novel attack technique. Their malware... Read more
Remove UltraEngine
Potentially Unwanted Programs (PUPs) are compatible with not just Windows – there are plenty of those for Mac as well. One of the latest PUPs for Apple's operating system is called UltraEngine, and it might cause some... Read more
Remove PDFFreeSearch
PDFFreeSearch is a dubious add-on for Google Chrome and Mozilla Firefox. Its description says that it is a very useful tool for discovering PDF files online. However, in reality, it does nothing to enhance your... Read more
WordPress Websites Hit by Fake Ransomware
Researchers working with Sucuri spotted an unusual and slightly funny malicious campaign. A number of WordPress pages have been hit with what only visually looks like ransomware. The WordPress owner is met with an... Read more
Ransomware Threatens to Assimilate Other Cybercrime
Security research firm Sophos released an interesting and worrying report in early November 2021. The five-second takeaway from the threat report published by Sophos is that ransomware is starting to behave like a... Read more
Remove Chichi Ransomware
The Chichi Ransomware is a dangerous file-locker that may cause massive issues if it infects your device. The malware is able to lock you out of your files, and then extort you for money. The criminals will mark the... Read more
Remove Grakate Stealer
Rentable malware is certainly not a new concept. Many malware developers prefer to rent out their software to the highest bidders instead of using it by themselves. This not only makes it easy for them to monetize... Read more
'linux_avp' Malware Used to Plant Web Skimmers
The 'linux_avp' Malware is a very specific malicious implant that has been discovered on e-commerce servers. The primary goal of the malicious threat is to modify the contents of specific e-commerce files in order to... Read more
Remove ExtendedRotator
ExtendedRotator is an intrusive application for Macs. Its installation often happens without the user's permission or approval, and ExtendedRotator could bring annoying changes to their Web browsers. The goal of this... Read more
Remove Fast-datings.top Notifications and Pop-Ups
Fast-datings.top is a fraudulent page that wants to hijack your browser notifications. Of course, it does not reveal its intentions directly. Instead, the page tells visitors that the website can play a video, but... Read more
HP Printer Does Not Work
Printers are arguably the most commonly used computer peripherals, apart from keyboards and mice. Due to the sheer number of printers in use, they are also the source of some of the most commonly encountered computer... Read more