News

Beware: YouTube Phishing Scam Surfaces

Popular YouTubers are akin to other celebrities in daily life. They have hordes of fans following their exploits with many of those fans wishing some of the stardom would rub off on them. Hackers are now exploiting this desire and leveraging famous YouTubers in a phishing scam. Phishing still remains a popular method of getting users to hand over vital information and often involves hackers trying to lure unsuspecting victims to the site to trick them into disclosing their login, password, credit card number, PIN, or simply to redirect traffic to generate click revenue. This is more often than not by hackers creating authentic looking emails or websites to act as the lure and trick victims, often including some form of social engineering to get the user, now a victim, to enter information without question. In articles published by both Kaspersky Labs and RiskIQ details how the scam operates and the eventual goal....

First Cryptocurrency Clipper Seen on Google Play Store

In what may prove to be a world first security ...

GandCrab Version 5.1 Rewrites the Rules

The malware authors behind the GandCrab ransomw...

Two Hacker Groups Responsible for 60% of Crypto Hacks

A report published by blockchain analysis firm ...

Top Removal Guides

Search.yahoo.com Redirect

Search.yahoo.com is a popular website that can be used as the browser homepage or default Internet search engine. Recently, there is a rise in ...

Mysearch.com Redirect

On initial inspection, mysearch.com may seem to be a legitimate Internet search website, however, be aware that the developers promote this sit...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

Heets Ransomware

Heets is is a malicious program that belongs to the Dharma family, these programs are categorized as ransomware. Like most computer infections of this type, it is used by cyber criminals who employ it to encrypt data and to make ransom demands. Once the files are encrypted, they are renamed by adding the ".heets" extension, an email address and a unique victim's ID. For example, if the file was named "1.jpg", then after encryption it will be named "1.jpg.id-1E857D00.[polmacpol@cock.li].heets" and so on. Heets also generates a ransom note that named "FILES ENCRYPTED.txt" and displays a ransom demanding pop-up window as well. "FILES ENCRYPTED.txt" file contains only a couple of sentences stating that all files were encrypted and two emails (polmacpol@cock.li and sevenbbvv@tutanota.com) that should be used to contact cyber criminals who developed Heets ransomware. The pop-up window contains more details. Ther...

Feed.convertowiz.com Redirect

Feed.convertowiz.com is presented as a legi...

Coloring Hero Adware (Mac)

Coloring Hero is...

VegaLocker Ransomware

VegaLocker is a ransomware-type virus that,...

Top Antispyware

SpyHunter 5

Overview: Simply put a rootkit is a program or, more often, a collection of software tools that gives the hacker remote access to and control ov...

Malwarebytes Anti-Malware

Malwarebytes Anti-malware Pro costs $24.95 for a lifetime license and includes additional features not available in the free version, such as rea...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

  Supported platforms: At time of testing, Combo Cleaner was only available for Mac computers running the Mac OSX 10.10 (Yosemite), Mac OSX 1...

Avast Internet Security

Cost Many antivirus producers are wondering what it takes to make a successful paid for suite. What needs to be included to justify the price ta...