Category: All

All You Need to Know About Cerber Ransomware

What is Cerber ransomware? Cerber is one of the most active kinds of ransomware. It encrypts the files of its victims and demands money in exchange for giving access to their files back. It works even if you are not connected to the Internet, so you can’t stop it by unplugging your PC. Just like ...

This image was designed by Creativeart, can be found at https://www.freepik.com/free-photo/doctor-reviewing-a-tablet_926688.htm

Cyber Threats That are Lurking in Hospital Environment

Healthcare technologies are saving and enhancing patients’ lives with wearable devices that can monitor patients’ health and apply medication according to values of the patient, such as insulin pumps, pacemakers and so on. Also, it provides storage for Electronic Health Records, which is used to see patients’ history very quickly and evaluate patients’ condition effectively ...

New Wave of Browser Hijackers

New Phishing Campaign A new phishing campaign that was redirecting users to a browser hijacker has been discovered recently. The attackers used fake alert messages to trick the users into thinking they are infected with malware. After that, scared users called the number that was shown in the notifications asking for technical support to help ...

Designed by Freepik hrehttps://www.freepik.com/free-vector/human-skull-drawing_756290.htm https://www.freevector.com/pray-for-japan#

TRITON: The Malware That Could Have Killed Hundreds

In December 2017, a Middle Eastern oil and gas petrochemical plant was attacked by malware named TRITON, also known as TRISIS or HatMan. It targeted the plant’s Safety Instrumented System that is a part of Industrial Control Systems. ICS vs SIS Industrial Control Systems (ICS) are computer-based devices that are used by engineers to monitor ...

New Banking Malware Found on Google Play

New Target – Users From Brazil Malware authors have always used different apps to disguise Banking Trojans and place them on Google Play Store. Security researchers have found a new strain of malware targeting banking apps on Android devices. This time a new malware banking family is targeting users from Brazil. It is distributed through ...

What is GoldenEye Ransomware?

GoldenEye has often been referred to as the king of ransomware, because it is considered as probably the worst ransomware ever created. GoldenEye is a variant of the notorious Petya ransomware that also takes advantage of the same EternalBlue exploit to spread from one device to another. It encrypts the entire hard disk drive and ...

What is Citadel Malware?

Citadel is a toolkit for distributing malware and managing botnets making it super easy to produce ransomware and infect systems one after another with pay-per-install programs. Citadel was designed to steal personal information, including banking and financial information from its victims. The Citadel Trojan, based on the Zeus source code, constructs a botnet consisting of ...

What is Alpha Crypt Virus?

Alpha Crypt is a file-encrypting ransomware program that targets all version of Windows. It is a variant of Tesla Crypt ransomware. It was first released at the end of April 2015. Alpha Crypt usually targets different video games. Some of the targets are: RPG Maker, Call of Duty, Dragon Age, StarCraft, MineCraft, World of Warcraft, ...

What Is Spyware?

Spyware is a piece of software that aims to gather information about a person or an organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge. How Does It Work? While the term spyware suggests software that monitors ...

How to Remove AndroRAT?

AndroRAT – What Is It And How To Remove It? AndroRAT is a contraction of Android and RAT (Remote Access Tool). It is a piece of malware we have seen a lot lately. At first it was created as a proof of concept. However, this malware has gradually become more evolved over the years. It ...

Dark Web

Dark Web And All You Need To Know About It

What is Dark Web? The Dark Web is a term that refers specifically to websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. Websites on the so-called Dark Web hide their identity using the Tor encryption tool. Tor renders your IP address ...

Remove Stuxnet Virus

What Is Stuxnet Virus And How Does It Work?

What Is Stuxnet Virus?   Stuxnet Virus is a rootkit exploit that targets supervisory control and data acquisition (SCADA) systems. SCADA systems are used widely for industrial control systems, such as power, water and sewage plants, as well as in telecommunications and oil and gas refining. When Stuxnet Virus was first discovered, its purpose wasn’t fully ...

GDPR-Zemana

GDPR And All You Need To Know About It

What Is GDPR? GDPR stands for General Data Protection Regulation; it is going to regulate personal data of EU citizens, which means collecting or processing any information that we can use to identify a person. GDPR will enable: – strengthening the rights of individuals over their own data – making organizations accountable – ensuring equal protection ...

How To Prevent a Smurf Attack

What is a Smurf Attack? A Smurf attack is a type of denial of service attack in which a system is flooded with spoofed ping messages. This creates high computer network traffic on the victim’s network, overwhelming the target. The intended result is to slow down the target’s system to the point that it is ...

Surprise Your Mother With Online Protection For This Mother’s Day!

Internet data shows that men use security software more than women because they are more aware of the dangers of online world. Security software companies usually have more male users than female, which means that men are protected online more than women. Zemana team wants to try and change this by increasing the number of ...

SvcHost.exe remover

How To Remove Svchost.exe Virus?

What Is SvcHost.exe? Generally, svchost.exe is a non-malicious program required for Windows. It is a process used to host one or more Windows operating system services. Because it is used as a common system process, some malware often uses a process name of “svchost.exe” to disguise itself. The original system file is located in C:\Windows\System32 ...

Cryptography

What is Cryptography?

Definition of Cryptography Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography protects data from theft or alteration. History of ...

GDPR in the Cyber Security World

What Is GDPR? We have all heard talks about GDPR. But some of you might still have questions about what it really is. In this blog post, we are going to explain shortly what GDPR is all about. Later, in our future posts, you will be able to learn more about it. General Data Protection ...

Man-in-the-middle Attack

Often, we have conversations where there’s confidential information flow between two parties. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. In other words, man-in-the-middle attacks are a common ...