Dogecoin virtual currency has suffered its first hack.

The Dogecoin is a copycat currency of the Bitcoin currency. It is not as valuable as the original, but it got some traction and people actually began to use it. However, the Dogecoin virtual currency has suffered its first hack and 21,000,000 Dogecoins worth approximately $12,800 were stolen. So far it is known that the … Read more

CryptoLocker 2.0 Not The Same As The Original CryptoLocker

CryptoLocker 2.0 Not The Same As The Original CryptoLocker The people that want to steal your money are not sleeping and now CryptoLocker 2.0 is on the loose. In my previous Articles for Ransomware I published information regarding the most fearsome menace nowadays. However, a new variant of the CryptoLocker virus  began to spread in the wild. … Read more

Washington Post Website Slow Due to Hackers Attack

The Washington Post’s website sustained third attack in the past three years, usernames and passwords were stolen and the IT specialist still evaluate the extend of the damage. However, there is still no evidence that essential information such as credit card data or home addresses has been compromised. According to this the hackers breached the servers and accessed … Read more

How to remove removal guide

How to Remove You should remove hijacker immediately. It may seem like a regular search engine, but it is not. This is a malicious program that will modify your browser settings to infect your computer. It is the so called browser hijacker virus that manipulates Internet Explorer, Mozilla Firefox or Google Chrome. The … Read more

ZeroAccess Botnet Crippled, But Not Dead

The ZeroAccess rootkit, also known as Sirefef or max++, is a Trojan horse computer malware that infects Windows operating systems. It first appeared in the summer of 2011 and at present, the ZeroAccess botnet is one of the largest known peer-to-peer botnets in existence with a population upwards of 2 million infected computers. There is … Read more

Computer Virus Using Inaudible Sound Waves to Transmit Data

  Computer Virus Using Inaudible Sound Waves to Transmit Data Do you think that if your computer is not connected to a network and you do not use USB sticks, CDs, DVDs, then you are safe against hackers and malware – you are wrong!  The story about the mysterious BadBIOS virus, a malware not using … Read more

People Doing Online Banking – Be Advised!!! Beware of Comprovante_Internet_Banking.rtf

Word documents are not to be considered safe anymore.  Brazillian Trojan integrates itself into word documents. The bad guys are using an interesting method to bypass the e-mail filtering techniques by file extension of file type. This method will also allow the malware to integrate its malicious code into a document which will surely fool … Read more

How To Avoid Cryptolocker Infection

According to the US Computer Emergency Readiness Team, this malware spreads mainly through mail messages containing unsolicited web links, in order to avoid the infection you just must not follow these links. The other measures that can be taken to avoid the cryptolocker infection are: Always keep your software up to date (especially the antivirus … Read more

How To Restore Encrypted By Cryptolocker Files

Method 1 to restore the encrypted by CryptoLocker files by hand: You can try to use the built in feature of Windows called System Restore. By default the system restore feature is automatically turned on. Windows creates shadow copy snapshots that contain older copies since the system restore was performed. These snapshots will let us … Read more