Threats
'Amazon 30th Anniversary Celebration' Scam
The 'Amazon 30th Anniversary Celebration' Scam is a fraudulent scheme, which surfaced for the first time near the end of March 2021. The scam appears to target primarily Indian users, but it is possible that it may... Read more
Anatsa Android Malware Uses Fake Delivery Notifications to Infect Victims
The Anatsa Malware is a banking Trojan targeting Android devices. It is believed to be linked to the criminals behind the Cabassous Malware, also called FluBot, but it is the more dangerous out of the two families.... Read more
Remove GoNNaCry Ransomware
Ransomware attacks continue to be the #1 threat to computer users. Malware of this type has the ability to cause long-lasting damage to the files of its victims. This way, even if the malicious program is removed, the... Read more
Remove ProManagerRecord
If you have recently noticed that your default search engine has been changed without your permission, you should check your computer to see if ProManagerRecord is installed on it. This program is categorized as a... Read more
Remove Kakstitotako.com Notifications and Pop-Ups
Ever visited a website only to find that you've been subscribed to more annoying browser notifications than you can handle? That's right, it's called the browser notifications scam. While this scam doesn't pose any... Read more
Remove Search.weheartcoloring.com
Search.weheartcoloring.com is a deceptive search engine that is promoted through the use of software known as adware or Potentially Unwanted Programs (PUPs.) This software is often installed without anyone's knowledge... Read more
SmsSpy Android Malware Goes After Japan-based Users
High-profile threat actors have been gradually paying more and more attention to mobile devices. One of the Advanced Persistent Threat (APT) actors specializing in attacks against Android mobile devices is Roaming... Read more
KilllSomeOne Malware Uses DLL Side-loading to Deliver Malicious Implants
Cybersecurity experts have identified a new piece of malware dubbed KilllSomeOne. It was employed in attacks against government-affiliated entities and organizations in Myanmar. Delving deep into the infrastructure... Read more
'APPLE SECURITY BREACH' Pop-Up Scam
Intrusive and scary-sounding pop-ups are the main tool in the arsenal of online scammers. They abuse these fraudulent messages to leave potential victims under the impression that their device has been compromised by... Read more
'Jagmocutiong.com' Pop-Up Scam
The 'Jagmocutiong.com' Pop-Up Scam is a dangerous online scheme, which relies on fear-mongering messages and strategies to trick users into downloading shady apps. It appears that most screenshots from... Read more
Remove ActiveOrigin
ActiveOrigin is an intrusive Mac application, which users are looking for online since they have no idea how it got to their computer. Since this software is categorized as a Potentially Unwanted Program (PUP) and it... Read more
Remove ActionHow
ActionHow is an intrusive Mac application that may be installed without the user's approval. It uses a deceptive installation method in order to trick the user into believing it is being installed for legitimate... Read more
TeaBot Android Malware Focuses on Stealing Financial Data
Android malware is becoming a more and more common occurrence since the majority of people are relying on their mobile devices for all kinds of payments, communication, and two-factor authentication. This gives... Read more
Remove Yajoza Ransomware
The Yajoza Ransomware is a dangerous file-encryption Trojan, which is usually delivered to victims with the help of fake downloads, deceptive advertisements and websites, or pirated media and software. Once running,... Read more
Remove Reminews.com Notifications and Pop-Ups
Reminews.com is a misleading website designed to hijack your browser notifications through the use of misleading pop-ups, alerts, and messages. Once it gets access to your browser notifications, the Web page will... Read more
Remove Pcqq Ransomware
Pcqq ransomware locks files and adds the '.pcqq' extension to their name. It then leaves a ransom note extorting the victim for money. The threat may be spread through pirated downloads, malicious ads, malicious email... Read more
Remove TypicalOperation
Mac users need to be careful when downloading software, as some developers are using PUPs, or Potentially Unwanted Programs, to deliver their products. These programs may not have malicious intent but could cause... Read more
Snip3 Loader Empowers Large-scale RAT Attack Campaigns
Snip3 is a hacking tool that cybercriminals use to load additional payloads on the compromised computer, as well as to help conceal the malicious files from the security scanners and firewalls. The good news is that... Read more