Kraken 2.0 Ransomware decrypter… https://t.co/r10PJbDajFBased on the creator's logs the ransomware has hit around 500 victims. So if anyone is affected, please use the link above to restore your files.@demonslay335 @malwrhunterteam @BleepinComputer — Leo (@leotpsc) April 30, 2018
Sept 26th, 2017 Update: Yesterday this appeared on Bleeping Computer: Avast Publishes Full List of Companies Affected by CCleaner Second-Stage Malware https://www.bleepingcomputer.com/news/security/avast-publishes-full-list-of-companies-affected-by-ccleaner-second-stage-malware/ Bleeping also put out a nice article from the 22nd, containing a nice summary if you’re just catching up on the news (because of course more has emerged since our last update, and we shouldn’t […]
Ho, Ho, Ho! d7 Premium is now was FREE, get yours NOW before we come to our senses! [Sorry, we did! OFFER HAS EXPIRED] www.d7xtech.com/getd7 < – – – – TELL YOUR FRIENDS! Merry Christmas to EVERYONE! Also, just in case you already have d7 Premium and didn’t know about our upgrade offer, we […]
For clarification on our previous post regarding the red X button: The article was about the red X because that’s what most people know, but it also applies to closing an application in any standard method not involving any actual force-terminate means. This includes the red X in the top right of the ‘window’ or form, […]
This pic describes exactly why I recommend people NEVER use the form’s X button in the event of suspected adware, spyware, MALWARE, or any other random POP-UP… DO NOT DO IT. EDIT TO CLARIFY: This article is about the red X in the top right of the ‘window’ or form, but also includes other methods such as the ALT+F4 […]
Lenovo rootkit binaries persisting via BIOS/Windows Platform Binary Table (WPBT) will make your systems vulnerable to any 3rd parties capable of intercepting your web traffic! Affected models with “patch” linked below – but I would investigate before using. I’ll be looking more into this soon. https://support.lenovo.com/us/en/product_security/lse_bios_notebook https://support.lenovo.com/us/en/product_security/lse_bios_desktop More Info: WPBT info (Microsoft, PDF download) Other Sources: […]
How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline […]
How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every […]
Where is Ransomware? Ransomware can be found everywhere. We thought that the well known file-encrypting ransomware, as known as CryptoLocker, was over and done with after law enforcement knocked out its infrastructure last year, but CryptoLocker , as well as other variations of malware, are back. Ransomware is a form of malware that will prevent […]
Join us for live tech chat, product questions, support, and technical training right here!
Customer or not, you are welcome to drop in and discuss anything ‘tech’ with us!