News

Four New Hacking Groups targeting Critical Infrastructure

The threat posed to critical infrastructure via cyber-attacks has long been a major concern for security researchers. Recent developments have seen ransomware gangs actively targeting critical infrastructure. The HelloKitty ransomware variant might be best known for its attack upon CD Projekt Red, but the ransomware’s operators have proved equally capable of going after power plants. The bad news for organizations within the critical infrastructure sector does not end with HelloKitty. In a report published by Dragos, researchers uncovered the activities of four new and distinct hacking groups targeting critical infrastructure. The discovery of these four groups seemingly accounted for a 36% increase in known groups tracked by the security firm that specializes in targeting industrial control systems (ICS). Dragos previously released details of 11 other groups known for targeting the US power grid. Further, the se...

Silver Sparrow infects nearly 30,000 Macs

Details of a new malware designed to target Mac...

The scale of the SolarWinds Attack now Apparent

Over the past week or so investigations into th...

Egregor Affiliates arrested in Ukraine

In terms of law enforcement striking back at cy...

Top Removal Guides

* Will Damage Your Computer. You Should Move It To The Trash. POP-UP (Mac)

"* will damage your computer. You should move it to the Trash." is a message that can appear within a pop-up window ...

Silver Sparrow Malware (Mac)

Silver Sparrow is the name of a malicious program targeting Mac OS operating systems. There are two versions of this...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

Games Search Browser Hijacker

In most cases, apps like Games Search hijack browsers by changing their settings. They are used to promote fake search engines. Games Search promotes the games-search.net address. It is known that it can read browsing-related data and might be capable of accessing other, sensitive information too. Typically, users do not download and install browser hijackers on purpose. They agree to install them without knowing about it. For this reason, Games Search and other apps of this kind are called potentially unwanted applications (PUAs). Most browser hijackers change the address of a default search engine, homepage, and (or) new tab to make sure that users would visit a certain address each time they open the browser (or a new browser window), new tab, and (or) enter search queries into the URL bar. Games Search changes those settings/addresses to games-search.net - the address of a fake search engine that sho...

K9-PCFixer Unwanted Application

K9-PCFixer is a piece of untrustworthy soft...

Customer Complaint Report Email Virus

It is common for cybercriminals to use emai...

Top Antispyware

Malwarebytes 4.0

There are two versions of Malwarebytes 4.0 - Free and Premium. Although the Free version is capable of removing existing malware, the Premium del...

SUPERAntiSpyware

  Overview: The User Interface of SUPERAntiSpyware is somewhat dated, however, it is minimalistic and straightforward to use. The main win...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Appearance of Combo Cleaner: Antivirus and System Optimizer: Today, security researchers see a rise in adware targeted at Mac computers. While...

ESET Internet Security 2021 Edition

Cost Every security firm that offers an antivirus solution with different price points performs a tightrope act in balancing features versus cos...

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal

Stay in touch with PCrisk