Archives - Malware


How to clean an infected PC

Is your computer compromise? Don’t lose hope!

Friends sent you a video on Facebook? Be careful, it could be a virus!

At least tens of thousands users have already become victims to a new virus on Facebook, masquerading as messages from friends and downloads malicious code onto computers worldwide.   “Watch the video by clicking on the picture which belongs to you. ..46” – that is the message received by many surfers. The statement included the […]

What can you do to protect yourself from these viruses and others?

Beware: First ransomware for Android has been discovered!

The first ransomware running on Android devices that encrypts files has been discovered – in contrast to earlier discoveries of heretic software also on the Android platform, which prevents access to files but does not encrypt them. During the last several year, the infamous CryptLocker, which runs on Windows Operating System, has been a prolific […]

Beware: Chrome malicious plugins

Hackers buy chrome plugins in order to turn them into malware. Virus developers put their hands on legitimate and popular plugins and turn them into hacking tools, specifically because the plugins are considered legitimate, most antivirus programs do not detect their activity. So how can you identify the affected plugins and dispose them? It is […]

Kelihos: A good job for good pay!

Kelihos, is considered the HIV of all malware. This Trojan is really famous, and has been on TV and other media news reports and even has its own Wikipedia entry – http://en.wikipedia.org/wiki/Kelihos_botnet . The Kelihos family of Trojans is not only huge, but it is also impossible to conclude all its symptoms nor show all […]

‘Bancos’ goes mobile

A new ‘Bancos’ style threat is trying to get the login information to your bank and steal money from you. The threat is a Trojan that currently threatens online banking users in Europe and Asia by presenting very reliable campaigns related to official organizations. The malware is luring the victims to install and run it […]