Thursday, June 28, 2018

Our Live Chat is ON!

Great news everyone! 

Starting from this week, you will have a chance to communicate with us live whenever you have any questions or concerns regarding promotions, offers, learning more about our products, etc.

However, all technical related questions or issues that you might have experienced will be forwarded to our technical support team, that will be able to assist you in the best way possible, as always.

Besides live chat, you will still be able to reach us via email and our accounts on different social media networks as well.

Technical support:
Our social media accounts: Facebook, Twitter, Instagram, LinkedIn

Our users always come first and so your feedback is very important and valuable to us. Therefore, we decided to implement live chat on our website to improve mutual relationship with our users and make communication much easier!

This way you will be receiving the best service that you deserve!

Stay safe with Zemana :)

Tuesday, May 29, 2018

What you need to know about the Dark Web

What is the Dark Web?

The Dark Web is a term that refers specifically to websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. Websites on the so-called Dark Web hide their identity using the Tor encryption tool. Tor renders your IP address unidentifiable and untraceable.

Not all Dark Web sites use Tor, some use similar services. But the principle remains the same. The visitor must use the same encryption tool as the site and know where to find the site, which is crucial to type in the URL and visit the site.

Here you can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, or even software that helps you break into other people’s computers.

How to access the Dark Web?

Using the Dark Web takes some doing and a certain level of technological sophistication.

The Dark Web is made up of sites that require a specialized browser (Tor browser) and protocols to access it. You cannot simply follow a link or using a search engine, which is what the majority of us are used to doing online. On Dark Web you can't just type a URL into the average web browser and reach their intended destination.

The easy part is installing and using Tor browser. Go to and download the Tor Browser Bundle, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser.

The difficult part is knowing where to look on the Dark Web. The place is as messy and chaotic, and everyone is anonymous. There’s lots of illegal activity. Dark web sites look pretty much like any other sites, but there are significant differences. One of them is the naming structure. Instead of ending in .com or .co, dark web sites end in .onion.

Some users recommend placing tape over your laptop's webcam to prevent prying eyes watching you.

What is the Dark Web used for?

The Dark Web is generally used by people who are looking to procure drugs, weapons, and other illicit items, but it’s also gained notoriety as a haven of sorts for journalists and people who need to share information but can’t share it safely.

You can use the Dark Web for hiring hitmen and hackers, watching illegal videos or illegally selling photos.

Journalists use the Dark Web to share information and to receive sensitive information from anonymous whistleblowers – for example, the New York Times has a secure lockbox on the Dark Web that people can send files anonymously to. It is becoming a haven for those who need to share information safely.

Who uses the Dark Web?

The Dark Web is used by people who want to stay anonymous and private, for whatever reason. 

While visiting the Dark Web can include illegal activities, there are also people using the Dark Web who are legitimately in need of anonymity because their life is in danger or the information they are in possession of is too sensitive to share publicly.

Therefore, if you are on the Dark Web, you are there because you don’t want anyone to know what you are doing or where you are.

How can I access the Dark Web on an Android device?

What you need to do is download applications that will enable you to connect to Tor browser. Two most common ones are Orfox and Orbot. Orbot allows you to connect to TOR and runs in the background while Orfox is the browser that you’ll use to navigate. You can download them from Google Play.

When you connect to the Dark Web with Orbot,  you can use Orfox for browsing around.
Before you go to the Dark Web, make sure that you’ve downloaded and installed some decent antivirus software. Zemana Mobile Antivirus will protect you from all types of viruses and malware.

Friday, May 25, 2018

What is Stuxnet Virus and how does it work?

What is Stuxnet Virus?

Stuxnet worm is a rootkit exploit that targets supervisory control and data acquisition (SCADA) systems. SCADA systems are used widely for industrial control systems, such as power, water and sewage plants, as well as in telecommunications and oil and gas refining.
At the beginning, when this piece of malware was first discovered its purpose wasn't fully understood, but it was clear its design was complex, and it probably could not have been written without a team of expert programmers working over a period of several months.

How does it work?

Like most other viruses, Stuxnet spreads via the internet and on USB sticks. And the way it does this is not particularly clever or well hidden. To reach its target, Stuxnet needs to spread via USB sticks, allowing it to penetrate industrial systems disconnected from the Internet and thought to be safe from malware. However, apparent mistakes mean it also spreads via the internet.
Once Stuxnet had infected a computer, the worm could copy itself to any flash drives subsequently connected to the computer, and then spread from those flash drives to other computers.

What is so special about Stuxnet Virus?

Like the Zeus banking Trojan, Stuxnet code covered its tracks using stolen digital certificates to trick the operating system into letting Stuxnet install a rootkit. The malware could also avoid detection by traditional intrusion detection systems (IDS).
It is believed that Stuxnet was not designed for espionage, but rather to wipe out a large portion of Iran's nuclear centrifuges.
Stuxnet was designed to limit the acceleration of its spread by infecting a maximum of three computers from a single flash drive. Additionally, Stuxnet was very good at hiding on systems.

Who was Stuxnet aimed at?

Even though the Stuxnet makers included measures to limit its spread, something went wrong.
Stuxnet was aimed at a specific target list; it was designed to infiltrate heavy-duty industrial control programs that monitor and manage factories, oil pipelines, power plants and other critical installations, but somehow it spread to thousands of PCs outside Iran, in countries such as China and Germany, Kazakhstan and Indonesia.

How to remove Stuxnet from a PC?

To remove Stuxnet from your PC, try Zemana AntiMalware, which you can download it for free (it comes with 15-days free trial). It will successfully detect Stuxnet on your PC and remove it.

However, if you decide to continue using the Trial and do not wish to purchase the Premium subscription at the end of the trial, your Zemana AntiMalware program will disable premium features. All other (basic) features will remain unchanged.

Zemana AntiMalware as an Stuxnet removal tool for your PC

You have to remove Stuxnet permanently. Zemana AntiMalware will effectively detect and completely remove any piece of malware from your computer.

To do so, please follow the steps below:

STEP 1: Download and run Zemana Antimalware.
STEP 2: Once download, install the software on your PC. You can do this by double-clicking on ZAM program icon on your desktop or in your download files.
STEP 3: Press the "Scan" button.
STEP 4: When the scan is complete, click "Next".
STEP 5: Restart your computer if you are prompted to do so.

Wednesday, May 16, 2018

What you need to know about GDPR

GDPR stands for General Data Protection Regulation and it going to regulate personal data of EU citizens, which means collecting  or processing any information that can be used to identify a person.

It is supposed to :

- strengthen the rights of individuals over their own data                         
- make organizations accountable
- ensure equal protection of EU human rights

Who does GDPR applies to?

It applies to any data controller or data processor that is offering goods or services to the people in the European Union, as well as monitoring their behavior as far as their behavior takes place within the Union

The companies which are not located in EU but do business with clients or companies from EU must also comply with GDPR.

Data Controller is a company or an organization that collects and controls the data, makes the decisions about what is going to happen with it and how it is going to be used.

Data Processor is a company or an organization that works for and processes data on behalf of a data controller. A data controller decides the purpose and the manner in which the data will be processed, while data processors hold and process data, but do not have any responsibility or control over that data.

How does GDPR affect individuals?

Under GDPR Data subjects have the right to:

- Know what is going to be done with their data
- Have copies of all the data about them
- Have incorrect data corrected
- Have their data erased or forgotten
- Restrict processing
- Data portability
- Object to data being processed
- Not be subject to automated processing

What if you don't comply?

Companies that choose to ignore GDPR by not complying with it are going to pay high fines.

The companies who don't comply with core principles or data subject rights are going to pay administrative fines (20 million Euros or 4% of their annual turnover).

The companies who fail to comply data controller responsibilities are also going to pay administrative fines (10 million Euros or 2% of annual turnover).

Apart from material damage, these companies can risk losing their partners' and customers' trust.

Friday, May 11, 2018

How to prevent a Smurf attack

What is a Smurf attack?

A Smurf attack is a type of denial of service attack in which a system is flooded with spoofed ping messages. This creates high computer network traffic on the victim’s network, overwhelming the target.

The intended result is to slow down the target’s system to the point that it is inoperable, and vulnerable. The Smurf program accomplishes this by exploiting vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

How does it work?

It's possible to accidentally download the Smurf Trojan from an unverified website or via an infected email link. Usually, the program will remain dormant on a computer until activated by a remote user;
Smurf attacks target a router that interacts with a high number of devices. 

The attacker then deploys large ICMP requests to the router, causing the connected devices to respond to the ping. The spoofed IP address that is attached to these packets is forced to absorb the echoes, which is a result of connected devices responding to the ping.

Any device connected to this router that is trained to respond to the ping will be unable to recognize the spoofed IP addresses.

Hackers gain access to the systems that are connected to their original target, slowing down a larger subset of the - this would not be possible by attacking just one victim.

How to prevent a Smurf attack?

Dealing with Smurf and similar DDoS attacks requires a prevention strategy that can monitor network traffic and detect any oddities, for example packet volume, behavior and signature. The right security service can help shut down a Smurf or other DDoS attack before it begins.

Therefore, you should install an antivirus and an anti-malware protection on time to effectively prevent all types of attacks.

You can protect yourself from a Smurf attack by blocking directed broadcast traffic that is coming into the network.

You should also disable IP broadcast addressing at each network router since it is seldom used. Make sure to configure hosts and routers not to respond to ICMP echo requests.

Stay safe with Zemana :)

Thursday, May 10, 2018

Surprise your mother with online protection for this Mother's Day!

Internet data shows that men use security software more than women because they are more aware of the dangers of online world. Security software companies usually have more male users than female, which means that men are protected online more than women.

Zemana team wants to try and change this by increasing the number of women who have the necessary protection, so we prepared a new treat for our users!

Mother's Day is coming soon and one of the best things you can do for your mother this year is keep her safe online!

Some moms know a lot about online safety, some moms have technical background and some moms ask for their children's help whenever they need to use the Internet :D. What we all can agree on is that every mother is unique and special in their own way.

Help us increase the number of women, who are safe online by surprising your mother with FREE ZEMANA PROTECTION this year on Mother's Day!

All you have to do is send us a photo of you and your mother with Zemana elements.

Some ideas you can use to make the photo:

- You can take a photo of you and your mom wearing Zemana T-shirts
- You can take a photo of you and your mom scanning your PC with one of Zemana products
- You can take a photo of you and your mom scanning your phone with Zemana Mobile Antivirus...

These are just some of the ideas, we are sure you will come up with even more interesting ones! Good luck!

You can send your photos to:

Deadline: May 13, 2018

Stay safe with Zemana :)

Wednesday, May 9, 2018

How to Remove Svchost.exe Virus?

What is SvcHost.exe?

Generally, svchost.exe is a non-malicious program required for Windows. It is a process used to host one or more Windows operating system services.

Because svchost.exe is used as a common system process, some malware often uses a process name of “svchost.exe” to disguise itself. The original system file svchost.exe is located in C:\Windows\System32 folder. Any file named “svchost.exe” located in other folder can be considered as malware.

How does it work?

Because svchost.exe is a common process in the Task Manager, malware programs sometimes mask themselves by running under the same process name of svchost.exe. Other times, a malware program may run, or inject, its service into an already running svchost.exe process. In either case, this masking action can make it difficult to detect and remove these malware programs.

What is so special about SvcHost.exe?

Even though svchost.exe is a common process in the Task Manager and malware programs sometimes masquerade themselves by running under its name, sometimes a malware program may run into an already running clean svchost.exe process. This corrupts the original process and turns it into a virus.

The Svchost.exe may often duplicate or copy their executable to the Windows system folders and later alter the registry to run this file every time you start your system.

To remove this process, you need to delete its segments or components. However, if you remove a genuine svchost.exe process from your machine, your machine may crash down instantly. Therefore, you need to install an antivirus or an antimalware software on time (it would be the best to have both), because they are prepared to remedy such circumstances.

How did I get infected with SvcHost.exe?

The Svchost.exe virus can be distributed in several ways. Malicious websites, or legitimate websites that have been hacked, can infect your machine through exploit kits that use vulnerabilities on your computer to install this Trojan without your permission or knowledge.

Another way of spreading this malware is spam email containing infected attachments or links to malicious websites. Usually, you would receive an email telling you that a shipping company failed at delivering a package for you.

If you open the attached file (or click on a link embedded inside the email) your computer gets infected with the Svchost.exe virus.

How to remove SvcHost.exe from a PC?

One of the best SvcHost.exe remover is Zemana AntiMalware and you can download it for free (it comes with 15-days free trial). It will detect spyware on your PC and remove it.

However, if you decide to continue using the Trial and do not wish to purchase the Premium subscription at the end of the trial, your Zemana AntiMalware program will disable premium features. All other (basic) features will remain unchanged.

Zemana AntiMalware as a SvcHost.exe removal tool for your PC

Manually removing SvcHost.exe can be quite complicated and you might not remove it completely. Therefore, you might need the help of an antivirus or anti-malware software.

Please follow the steps below to remove it completely with our Zemana AntiMalware:

STEP 1: Download and run Zemana Antimalware.
STEP 2: Once download, install the software on your PC. You can do this by double-clicking on ZAM program icon on your desktop or in your download files.

STEP 3: Press the "Scan" button.

STEP 4: When the scan is complete, click "Next".
STEP 5: Restart your computer if you are prompted to do so.

Stay safe with Zemana :)