Category: Recomendations
Hikvision and Dahua surveillance cameras could pose a potential security risk
Two of the biggest surveillance camera providers Hikvision and Dahua could be a potential security risk.
configapk
What is configapk ConfigAPK stands for Android application package, or android.autoinstalls.config. It’s a Samsung file related to automatic installations during the initial setup of the device. After you set up the device, […]
Avast SafePrice
What is Avast SafePrice Avast SafePrice is a legitimate online shopping helper tool developed by anti-virus vendor Avast. However, despite it being legitimate, users sometimes refer to it as a virus or adware. Avast […]
Trojan:BAT/Killav removal
Trojan:BAT/Killav Vulnerable computer systems and applications: Windows OS. Description: Trojan:BAT/Killav is a malicious software code, also known as a trojan. This trojan enters computers when users download a self-extracting RAR archive. Along […]
Remove Zuponcic
Zuponcic Vulnerable computer systems and applications: Websites and their content management systems (CMS). Description: The malicious code (embedded in the .htaccess file) responds only to certain User-agent fields and only to those […]
Zeus virus removal
Zeus Vulnerable computer systems and applications: Windows operating systems. Description: Zeus malware (also known as Trojan.Zbot) is a malicious software code, also known as a Trojan, which often enters users’ devices without […]
Zeroaccess removal
Zeroaccess Vulnerable computer systems and applications: Windows operating systems. Description: Zeroaccess is a higher-level malicious software code, also known as a Trojan. It can hide in the system, preventing anti-virus programs from […]
About Webshell
Webshell Description: Webshell is a tool that gives access to SSH servers using a regular browser. These tools are usually created in JavaScript/Ajax or JavaScript/WebSockets, and consist of two parts: User side […]
What is Ws.Reputation.1
Ws.Reputation.1 Description: Ws.Reputation.1 a detection name used by Symantec to identify potentially malicious files. The detection is based on the reputation of the file and therefore does not indicate a specific threat […]
Remove Worm.Wapomi
Worm.Wapomi Vulnerable computer systems and applications: Windows OS. Description: Worm.Wapomi is a malicious software code, also known as a worm. Like viruses, worms can spread by themselves. They usually infect computers via […]
RECENT UPDATE
How to remove Lyli ransomware
Lyli ransomware is yet another newly released member of the notorious Djvu/STOP ransomware family. This version adds the .lyli file extension and drops the usual _readme.txt ransom note.
Npph ransomware removal
Npph ransomware is yet another file-encrypting malware from the Djvu/STOP ransomware family. The group is notorious for releasing new versions on a regular basis, with 251 versions currently known. Npph encrypts files, […]
How to delete Blm ransomware
Dharma malware family has released yet another ransomware – Blm ransomware. The malware encrypts files, adds the [blacklivesmatter@qq.com].blm extension to encrypted files and drops the FILES ENCRYPTED.txt ransom note.
Eknkfwovyzb ransomware removal
Eknkfwovyzb ransomware is malware that encrypts files. It adds the .eknkfwovyzb file extension and drops HOW TO RESTORE YOUR FILES.TXT ransom note.
Apple’s upcoming iOS 14 to allow users to opt out of ad tracking
Apple’s upcoming iOS 14 release will give users the option to opt out of ad tracking in a bid to give users more control over how their data is handled.
Google sued for $5 billion for tracking in ‘private’ mode
Google is facing a $5 billion class action lawsuit over tracking users when in ‘private’ mode.