Threats
You Don't Want An Attack From FIASKO Ransomware
A new ransomware strain belonging to the Phobos ransomware family was recently spotted in the wild. The new version is called the FIASKO ransomware. FIASKO encrypts the majority of files on the target system, leaving... Read more
Avoid The "SIDDHIVINAYAK" Email Scam
"SIDDHIVINAYAK" is the name attached to a recent email scam that is used to distribute the Agent Tesla remote access trojan malware. The email is very simple, to the point where it's confusing why people would fall... Read more
DARKY LOCK Ransomware
DARKY LOCK ransomware is the name of a newly discovered strain of file-encrypting malware. According to researchers, the new variant is a member of the Babuk family of ransomware clones. DARKY LOCK will perform as... Read more
Quick Site Hijacks Browser Settings
Quick Site is the name of a browser extension that claims to offer some useful functionality. In reality, it behaves like a browser hijacker that changes your browser's settings without explicit permission and forces... Read more
How to Avoid Updatepcmc.xyz Ads
Updatepcmc dot xyz is a misleading website that uses a simple trick to scare users. Landing on Updatepcmc dot xyz, you will be faced with a barrage of warning text and images. The page will display pictures, styled to... Read more
Hhwq Ransomware
The family of ransomware clones based on Djvu ransomware code received its newest member this week. The new ransomware variant is called the Hhwq ransomware. Hhwq encrypts files on the targeted system, scrambling... Read more
What is The Colors Scale PUP?
Colors Scale is the name of a browser extension that claims to have useful functions that will allow the user to change the color properties and the contrast of web pages but has a few additions that go along with... Read more
What is RoundEmporium Adware?
RoundEmporium is the name of an ad-supported application, also referred to simply as adware. It belongs to the wider family of adware known as AdLoad and can affect Mac computers. Ad-supported software works by... Read more
Yalohol Ransomware
A new member of the Spora ransomware family joins the ranks of Spore variants. The new clone is called the Yalohol ransomware. Yalohol behaves as all ransomware does - it will encrypt files on the infected system,... Read more
ActivateOptimization Adware
ActivateOptimization is a piece of adware that is part of the AdLoad family of adware variants that work on Macs. ActivateOptimization will exhibit a number of features that make it part browser hijacker, part adware.... Read more
Lilith Ransomware
Lilith is the name of a newly discovered strain of ransomware. The new release does not seem to belong to any particular big family of ransomware variants. Lilith will encrypt files on the system that it targets,... Read more
NoMercy Stealer Scrapes Sensitive Information
NoMercy is the name of a newly discovered piece of infostealing malware. The main distribution method for the new malware is phishing campaigns containing malicious attachments, with a supplementary distribution... Read more
Device-undershield.com Uses Fake Scares to Push Redirects
Device-undershield dot com is a misleading website that will attempt to trick users and refer them to further untrustworthy websites. When you land on Device-undershield dot com, you will see a pop-up box with a... Read more
Police_Decrypt0r Ransomware
Police_Decrypt0r is the name of a new strain of ransomware. The new variant will encrypt files on the victim system, leaving them unusable. Once encrypted, files receive the new ".CRYPT" extension. In this way, a file... Read more
Pcprotect.name Uses Old, Fake Virus Scare
Pcprotect dot name is the domain name of a misleading website that uses fake but scary messages to propagate intrusive and potentially dangerous ads. Pcprotect dot name is not a page you can find in a search engine... Read more
'Unusual Sign-in Activity' Email Scam
There is yet another new scam making its way around people's inboxes. This new attempt to scam people is referred to as the "Unusual Sign-in Activity" scam. The gist of the scam is simple. Victims are sent a fake... Read more
Again Ransomware
A new ransomware strain has been spotted in the wild. The new version is called the Again ransomware and appears to be based on Babuk ransomware code. The Again ransomware will encrypt files on the system it is... Read more
HelperProtocol Adware
HelperProtocol is the latest variant of the same adware package that can show up on Macs. HelperProtocol and the hundreds of similar apps are clones belonging to the AdLoad adware family. repackaged under different... Read more