Security News
How Malicious JavaScript (.JS) Files Endanger the Security of Your PC
The frequency of exploiting JavaScript files as an infection vector of cyber attacks has increased. Application of this technique is not a new thing,
The frequency of exploiting JavaScript files as an infection vector of cyber attacks has increased. Application of this technique is not a new thing,
The spiritual successor of the Petya and Mischa ransomware viruses is here, and it’s called Goldeneye. The name is taken from the 1995 James
342 Locky is the new version of the notorious ransomware family. The virus uses the .342 extension to mark encrypted files. As usual, the
Locked-In (NoValid) is a malware that has been recently detected to infect computer users and encrypt sensitive data. It belongs to the ransomware family.
In case that your files have the extension ‘[email protected]’ at the ends of their original names and are inaccessible by any program, you are
Several security researchers associate the .zzzzz malicious file extension with Locky ransomware. On 24th of November (Japan Standard Time), a new spam campaign that
The Globe wave continues with the new x3m version. The virus adds the .x3m extension to encrypted files. Similar to the old versions, x3m
A new infection known as the ShellLocker Ransomware Virus was detected by malware researchers and anti-virus software. The virus locks the files of the
A new version of the Globe ransomware virus uses the .blackblock extension for encrypted files. The last version of the ransomware family called Globe2
Another version of Cerber 4 has surfaced. This time, the virus employs infected Word with macro files that jumpstart the virus. The new version