Recomendations

configapk

Leave a Comment on configapk

What is configapk ConfigAPK stands for Android application package, or android.autoinstalls.config. It’s a Samsung file related to automatic installations during the initial setup of the device. After you set up the device, […]

READ MORE

Recomendations

Avast SafePrice

Leave a Comment on Avast SafePrice

What is Avast SafePrice Avast SafePrice is a legitimate online shopping helper tool developed by anti-virus vendor Avast. However, despite it being legitimate, users sometimes refer to it as a virus or adware. Avast […]

READ MORE

Recomendations

Trojan:BAT/Killav removal

Leave a Comment on Trojan:BAT/Killav removal

Trojan:BAT/Killav Vulnerable computer systems and applications: Windows OS. Description: Trojan:BAT/Killav is a malicious software code, also known as a trojan. This trojan enters computers when users download a self-extracting RAR archive. Along […]

READ MORE

Recomendations

Remove Zuponcic

Leave a Comment on Remove Zuponcic

Zuponcic Vulnerable computer systems and applications: Websites and their content management systems (CMS). Description: The malicious code (embedded in the .htaccess file) responds only to certain User-agent fields and only to those […]

READ MORE

Recomendations

Zeus virus removal

Leave a Comment on Zeus virus removal

Zeus Vulnerable computer systems and applications: Windows operating systems. Description: Zeus malware (also known as Trojan.Zbot) is a malicious software code, also known as a Trojan, which often enters users’ devices without […]

READ MORE

Recomendations

Zeroaccess removal

Leave a Comment on Zeroaccess removal

Zeroaccess Vulnerable computer systems and applications: Windows operating systems. Description: Zeroaccess is a higher-level malicious software code, also known as a Trojan. It can hide in the system, preventing anti-virus programs from […]

READ MORE

Recomendations

About Webshell

Leave a Comment on About Webshell

Webshell Description: Webshell is a tool that gives access to SSH servers using a regular browser. These tools are usually created in JavaScript/Ajax or JavaScript/WebSockets, and consist of two parts: User side […]

READ MORE

Recomendations

What is Ws.Reputation.1

Leave a Comment on What is Ws.Reputation.1

Ws.Reputation.1 Description: Ws.Reputation.1 a detection name used by Symantec to identify potentially malicious files. The detection is based on the reputation of the file and therefore does not indicate a specific threat […]

READ MORE

Recomendations

Remove Worm.Wapomi

Leave a Comment on Remove Worm.Wapomi

Worm.Wapomi Vulnerable computer systems and applications: Windows OS. Description: Worm.Wapomi is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]

READ MORE

Recomendations

What is Worm.IRCBot

Leave a Comment on What is Worm.IRCBot

Worm.IRCBot Vulnerable computer systems and applications: Windows OS. Description: Worm.IRCBot is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]

READ MORE

Recomendations

configapk

Leave a Comment on configapk

What is configapk ConfigAPK stands for Android application package, or android.autoinstalls.config. It’s a Samsung file related to automatic installations during the initial setup of the device. After you set up the device, […]

READ MORE

News

EasyJet discloses cyber-attack that exposed details of 9 million customers

Leave a Comment on EasyJet discloses cyber-attack that exposed details of 9 million customers

British low-cost airline easyJet has disclosed a security incident that potentially exposed information of 9 million customers.

READ MORE

Recomendations

Avast SafePrice

Leave a Comment on Avast SafePrice

What is Avast SafePrice Avast SafePrice is a legitimate online shopping helper tool developed by anti-virus vendor Avast. However, despite it being legitimate, users sometimes refer to it as a virus or adware. Avast […]

READ MORE

News

Four Chinese hackers charged over Equifax cyber attack

Leave a Comment on Four Chinese hackers charged over Equifax cyber attack

Four Chinese military hackers have been charged by US prosecutors for the 2017 Equifax cyber attack.

READ MORE

News

HHS suffers a cyber-attack, foreign actor suspected to be responsible

Leave a Comment on HHS suffers a cyber-attack, foreign actor suspected to be responsible

The US Department of Health and Human Services (HHS) has reportedly suffered a cyber-attack while the agency is putting all efforts into addressing the coronavirus outbreak.

READ MORE

Malware / News

Coronavirus ransomware spreads with data stealer trojan Kpot

Leave a Comment on Coronavirus ransomware spreads with data stealer trojan Kpot

A new Coronavirus (COVID-19) themed ransomware is spreading together with a ‘stealer’ trojan Kpot.

READ MORE