Published: January 15, 2026 Category: Reviews/Personal Data Removal Services
1. DeleteMe Review: Does It Really Protect Your Personal Data?
... power of attorney and some form of identification, which they used to authorise us to request the removals. Many data brokers insist on this requirement.
We provided a scanned ID and, following DeleteMe's guidelines, blacked out the sensitive information, such as our photo and ID number, leaving only ...
Published: September 15, 2025 Category: Removal guides
2. Rainbow Lottery Email Scam
... programs, inheritance, business proposals, purchases/invoices, refunds, shipping mishaps, blackmail attempts, expired passwords, outdated subscriptions, critical updates, undelivered messages, account issues, and so forth.
Due to how prevalent spam mail is and how well-crafted it can be – we strongly ...
Published: August 22, 2024 Category: Removal guides
3. Foreign Beneficiary Email Scam
... number. Personally identifiable information can be used for a variety of nefarious purposes, including blackmail.
However, scammers can also ask for additional information, data (like log-in credentials) to be entered into phishing websites/files, or for victims to send them money.
When requesting ...
Published: June 25, 2024 Category: News
4. Medusa Returns To Target Android Devices
... and social engineering attacks. This command allows the malware to display a black screen overlay on the victim's device. While the exact purpose remains under investigation, this functionality presents a potential threat: by obscuring the underlying screen content, the attacker can use this overlay ...
Published: May 12, 2024 Category: News
5. Black Basta Ransomware Breached Over 500 Organizations
In a joint report published by the US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), it was stated affiliates associated with the Black Basta have breached the networks of over 500 organizations worldwide.
Black Basta was first seen in any ...
Published: April 26, 2024 Category: Removal guides
6. Quote For The Attached Products Email Scam
... networking/media, messengers, chats, etc.) and ask for loans or donations from contacts/friends/followers, promote scams, and spread malware by sharing malicious files/links.
Sensitive content discovered on compromised data storage or similar platforms could be used for blackmail or other nefarious ...
Published: February 03, 2024 Category: News
7. The Emergence Of Blackwood
According to a recently published report by security firm ESET, a new sophisticated Advanced Persistent Threat (APT) group called Blackwood has emerged from the shadows.
Researchers discovered that the APT group was conducting cyberespionage campaigns against businesses and individuals. Based on what ...
Published: January 17, 2023 Category: News
8. BianLian Ransomware Decryptor Released by Avast
... the United States, Australia, and the United Kingdom. At the time security researchers from BlackBerry concluded that BianLian was a relatively new threat actor that targets a wide range of industries.
The targeting of multiple industries possibly means that the group is financially motivated. This ...
Published: November 23, 2021 Category: Removal guides
9. SharkBot Malware (Android)
... huge data losses, monetary losses, stolen identity (malicious apps might abuse communication apps).
Malware in general
AbstractEmu, PixStealer, MRAT, Ghimob, and BlackRock are some examples of Android-specific malware. In general, malicious software can have a wide variety of heinous ...
Published: August 01, 2021 Category: Removal guides
10. Vultur RAT (Android)
... etc.), decreased device performance, battery is drained quickly, decreased Internet speed, huge data losses, monetary losses, stolen identity (malicious apps might abuse communication apps).
Malware in general
TeaBot, Ghimob, MRAT, and BlackRock are some examples of malware designed ...
Published: June 26, 2021 Category: Removal guides
11. DEMON Ransomware
... and/or sold to third parties. For more details, victims are urged to contact these cyber criminals by sending an email to blackingdom@gszmail.com.
Typically, ransomware-type programs encrypt files with strong encryption algorithms, and it is impossible to recover them without the correct decryption ...
Published: March 30, 2021 Category: News
12. Sophisticated Ransomware Attack leaves 36,000 Students without Email
... Microsoft announced the flaws and the subsequent release of patches other hackers and cybercriminals were attempting to exploit these flaws to drop various forms of malware including ransomware.
Currently, it is believed that the DearCry and the Black Kingdom ransomware strains have been distributed ...
Published: March 14, 2021 Category: Removal guides
13. Black Kingdom Ransomware
What is the Black Kingdom ransomware?
Black Kingdom, also known as GAmmAWare, is a malicious program classified as ransomware. Systems infected with this malware experience data encryption and users receive ransom demands for decryption tools.
When Black Kingdom encrypts, the filenames of affected ...
Published: February 22, 2021 Category: News
14. Silver Sparrow infects nearly 30,000 Macs
Details of a new malware designed to target Macs, called Silver Sparrow, has already infected close on 30,000 separate machines. The malware was discovered by researchers from Red Canary who subsequently analyzed the malware along with Malwarebytes and VMWare Carbon Black. In a subsequent report published ...
Published: December 19, 2020 Category: Removal guides
15. CoderWare Ransomware
What is CoderWare?
CoderWare (also known as BlackKingdom) is designed to encrypt victims' files, modify their filenames, and generate ransom messages. It renames encrypted files by appending ".DEMON" as the file extension. For example, "1.jpg" is renamed to "1.jpg.DEMON", "2.jpg" to "2.jpg.DEMON", ...
Published: May 21, 2020 Category: Removal guides
16. CovidWorldCry Ransomware
... maintain backups on remotes server such as Cloud and/or unplugged storage devices. Some examples of other ransomware-type programs are Covm, BANG and Black Kingdom.
How did ransomware infect my computer?
Most cyber criminals distribute ransomware and other malicious software via spam campaigns, fake ...
Published: May 21, 2020 Category: Removal guides
17. Covm Ransomware
... from a backup. Note that unaffected files can be protected by uninstalling the ransomware, however, those file already compromised remain encrypted even after removal.
Ransomware examples
More examples of malware that is classified as ransomware include Koti, BANG and Black Kingdom. Generally, software ...
Published: May 20, 2020 Category: Removal guides
18. BANG Ransomware
... data:
Black Kingdom, Solider, and Cov19 are some examples of other ransomware infections. Malicious programs within this classification typically encrypt data and demand ransom payments for decryption tools/software.
These programs/infections have several crucial differences: the cryptographic ...
Published: May 18, 2020 Category: Removal guides
19. MassLogger Virus
... to demand loans from contacts/friends and/or to proliferate malware by sharing infectious files under the guise of the genuine owner. Should sensitive and/or compromising content be found in data storage accounts, it can be used for blackmail.
Accounts in some way connected to financial information ...
Published: May 12, 2020 Category: Removal guides
20. Zeus Sphinx Trojan
... with contacts/friends of the genuine owner of the account. Additionally, by claiming to be the owner, they can ask contacts/friends for loans (i.e., to lend them money).
Data storage accounts can be targeted for ransom/blackmail purposes, especially if they contain sensitive and/or compromising content. ...
Published: April 07, 2020 Category: News
21. Researchers Discover Massive DarkHotel Operation
... pandemic?”
The speculation is not purely without merit. On March 23, 2020, Reuters reported on an attack conducted against the World Health Organisation (WHO) which has been linked to DarkHotel. Alexander Urbelis, a cybersecurity expert and attorney with the New York-based Blackstone Law Group, informed ...
Published: November 21, 2018 Category: News
22. Beware Black Friday
The day after Thanksgiving in the United States has become known as Black Friday and has become defined by mad shopping for discounted products. The term may have originated in Philadelphia in the 1960s, where it was used to describe the heavy and disruptive pedestrian and vehicle traffic that would ...
Published: June 28, 2018 Category: News
23. New DDoS Techniques Detected
Security researchers are seeing an increase in the Distributed Denial of Service (DDoS) attacks which abuse the Universal Plug and Play (UPnP) features of home routers. This new technique makes it harder to detect such attacks and it makes them harder to mitigate as an added bonus for attackers. Researchers ...
Published: December 30, 2014 Category: News
24. News Archive December 2014
... popular anti-malware solutions, it is still a threat that should be remembered every time you open an unsolicited email attachment or visit a website that could be compromised by popular drive-by download exploit kits such as Blackhole.
But now there is yet another reason to fear Citadel as a new variant ...