Recomendations

Trojan:BAT/Killav removal

Leave a Comment on Trojan:BAT/Killav removal

Trojan:BAT/Killav Vulnerable computer systems and applications: Windows OS. Description: Trojan:BAT/Killav is a malicious software code, also known as a trojan. This trojan enters computers when users download a self-extracting RAR archive. Along […]

READ MORE

Recomendations

Remove Zuponcic

Leave a Comment on Remove Zuponcic

Zuponcic Vulnerable computer systems and applications: Websites and their content management systems (CMS). Description: The malicious code (embedded in the .htaccess file) responds only to certain User-agent fields and only to those […]

READ MORE

Recomendations

Zeus virus removal

Leave a Comment on Zeus virus removal

Zeus Vulnerable computer systems and applications: Windows operating systems. Description: Zeus malware (also known as Trojan.Zbot) is a malicious software code, also known as a Trojan, which often enters users’ devices without […]

READ MORE

Recomendations

Zeroaccess removal

Leave a Comment on Zeroaccess removal

Zeroaccess Vulnerable computer systems and applications: Windows operating systems. Description: Zeroaccess is a higher-level malicious software code, also known as a Trojan. It can hide in the system, preventing anti-virus programs from […]

READ MORE

Recomendations

About Webshell

Leave a Comment on About Webshell

Webshell Description: Webshell is a tool that gives access to SSH servers using a regular browser. These tools are usually created in JavaScript/Ajax or JavaScript/WebSockets, and consist of two parts: User side […]

READ MORE

Recomendations

What is Ws.Reputation.1

Leave a Comment on What is Ws.Reputation.1

Ws.Reputation.1 Description: Ws.Reputation.1 a detection name used by Symantec to identify potentially malicious files. The detection is based on the reputation of the file and therefore does not indicate a specific threat […]

READ MORE

Recomendations

Remove Worm.Wapomi

Leave a Comment on Remove Worm.Wapomi

Worm.Wapomi Vulnerable computer systems and applications: Windows OS. Description: Worm.Wapomi is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]

READ MORE

Recomendations

What is Worm.IRCBot

Leave a Comment on What is Worm.IRCBot

Worm.IRCBot Vulnerable computer systems and applications: Windows OS. Description: Worm.IRCBot is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]

READ MORE

Recomendations

Delete Worm.Feebs

Leave a Comment on Delete Worm.Feebs

Worm.Feebs Vulnerable computer systems and applications: Windows OS. Description: Worm.Feebs is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]

READ MORE

Recomendations

How to remove Worm.Dorkbot

Leave a Comment on How to remove Worm.Dorkbot

Worm.Dorkbot Vulnerable computer systems and applications: Windows OS. Description: Worm.Dorkbot is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]

READ MORE

News

New scam accuses consumers of money laundering and terrorism, FTC warns

Leave a Comment on New scam accuses consumers of money laundering and terrorism, FTC warns

US Federal Trade Commission (FTC) has issued a warning of scammers pretending to be the FTC and accusing people of laundering money and terrorism.

READ MORE

Malware

Critical Firefox Update Scam

Leave a Comment on Critical Firefox Update Scam

What is the Critical Firefox Update Scam? Critical Firefox Update Scam is a scam that initiates the install of malicious applications and a fake alert that typically pop-ups on the screen when […]

READ MORE

News

What is Citadel malware

Leave a Comment on What is Citadel malware

Citadel trojan, based on the Zeus virus and first spotted in 2011, is a data-stealing malware. Citadel malware was used to harvest login credentials, and its sophisticated evasion techniques allowed the malware […]

READ MORE

News

How to stay safe when connected to Wi-Fi

Leave a Comment on How to stay safe when connected to Wi-Fi

Find out how to safely use public WiFi and configure your private WiFi settings to avoid hacker attacks.

READ MORE

News

What is a botnet?

Leave a Comment on What is a botnet?

Botnets (computer zombies) are networks of infected computers, often used to perform malicious activity, such as a DDoS (Distributed Denial-of-Service) attack.

READ MORE