APSB18-29: Adobe Releases August 2018 Security Updates

Adobe released the August 2018 Security Updates (APSB18-29)which addresses key vulnerabilities in the Acrobat and Reader applications. The released collection of updates are available both to Windows and Mac OS X users. All users running these products… Continue reading APSB18-29: Adobe Releases August 2018 Security Updates

CVE-2017-7150: Mac OS X Warning Prompts Can Be Easily Bypassed

Mac OS X computers have been found vulnerable due to a report indicating that warning prompts can be easily bypassed. A demonstration has shown how this can be used by hackers in virus infections. The vulnerability is classified as a…Read more
The po… Continue reading CVE-2017-7150: Mac OS X Warning Prompts Can Be Easily Bypassed

Intel Processors Affected with Foreshadow Speculative Execution Flaws

Security experts discovered three new vulnerabilities affecting Intel processors that appear to be speculative execution flaws called Foreshadow. This is the code name under which has been assigned to the bugs, appearing to be yet another problem that … Continue reading Intel Processors Affected with Foreshadow Speculative Execution Flaws

CVE-2018-8414, CVE-2018-8373 Fixed in August 2018 Patch Tuesday

Microsoft has released their latest wave of updates in the August 2018 Patch Tuesday addressing some serious vulnerabilities. Among them are issues related to the remote code execution and weaknesses exploited by popular viruses and Trojans to gain ent… Continue reading CVE-2018-8414, CVE-2018-8373 Fixed in August 2018 Patch Tuesday

Kedi Trojan Removal — Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration…R… Continue reading Kedi Trojan Removal — Identify and Delete Active Infections

Android Man-in-the-Disk Attack Can Expose Apps & User Data

Security experts discovered a new Android infection mechanism called the Man-in-the-Disk attack. It takes advantage of a design issue found to be with the operating system itself that takes advantage of the external storage access. Abuse of this possib… Continue reading Android Man-in-the-Disk Attack Can Expose Apps & User Data

Remove PooleZoor Virus Infections – Restore .poolezoor Files

The PooleZoor Virus is a ransomware strain of the Hidden Tear family targeting English-speaking users on a global scale. The captured samples indicate an initial release which might be updated in the future with additional code. Refer to our in-depth….. Continue reading Remove PooleZoor Virus Infections – Restore .poolezoor Files

Remove Zoldon Virus — Remove Active Infections and Restore Data

Zoldon virus is a newly discovered ransomware that appears to be made entirely by its operators. It does not contain code from any of the famous ransomware families. Our article contains an analysis of its features and full removal instructions…Read … Continue reading Remove Zoldon Virus — Remove Active Infections and Restore Data

Remove CMB Dharma Virus — Remove and Restore .cmb Files

The CMB Dharma Virus is a new test release belonging to the Dharma ransomware family. It is currently being distributed in a limited sample form. Read our in-depth removal guide to learn how to delete the infections and restore encrypted…Read more
Th… Continue reading Remove CMB Dharma Virus — Remove and Restore .cmb Files

Remove the AdKoob Malware — a Facebook Stealing Hybrid Trojan/Hjacker Virus

The AdKoob malware is a hybrid Trojan and hijacker virus which has recently been discovered in a global attack campaign. It is distributed using various methods and features many modules that are executed following the infection. Our article gives a…… Continue reading Remove the AdKoob Malware — a Facebook Stealing Hybrid Trojan/Hjacker Virus