The Russian anti-virus vendor Doctor Web warns Internet users about a new malicious program for Android. TheAndroid.DDoS.1.origin can carry out DDoS-attacks on various internet resources and send short messages upon a corresponding command from criminals.
As yet it is not known exactly how the virus is spread.
Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. It monitors every process and stops malicious processes before they even start. Over 6 million downloads on Majorgeeks alone!
Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.
IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.
RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.
After legal threats from the music industry the UK Pirate Party saw no other option than to shut down their Pirate Bay proxy service. However, as is usually the case with censorship, the Internet has found a way to route around it. Responding to the UK situation Pirate parties in Argentina and Luxembourg have decided to start fresh Pirate Bay proxies.
D7 is a tool for PC technicians to aid in many tasks and provide a uniform procedure for technicians to follow. It has many capabilities and many uses.
Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.
Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".
The recent discovery of an Android SMS spam botnet by Cloudmark, which is detected by Symantec as Android.Pikspam, has gained media attention. While delivering spam by botnets is nothing new, mobile technology has opened up new attack vectors to cybercriminals who are using the proven attack techniques of social engineering and spam with success on mobile devices.
Tor helps keep you safe online. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous() Privacy Pack. An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE).
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.
A rudimentary, SMS-based botnet is ensnaring Android users into its web with a series of text messages offering free downloads for popular, paid gaming applications, according to Cloudmark researcher Andrew Conway.
A federal judge in Los Angeles also ordered 36-year-old Christopher Chaney, from Florida, to pay a total of $76,000 to Johansson, Christina Aguilera and Renee Olstead, who were among dozens of other people he hacked.
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.
Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".
Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.
Protector Plus - Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system secure.