MusicBox Live Redirect Removal — How To Restore Your Browser

The article will help you to remove MusicBox Live fully. Follow the browser hijacker removal instructions given at the end of the article. The MusicBox Live redirect is a recently discovered browser plugin that can be used for hijacker purposes….Read… Continue reading MusicBox Live Redirect Removal — How To Restore Your Browser

CryptoLite Virus Removal – Restore .encrypted Files

The CryptoLite Virus is a test release ransomware targeting users on a global scale. The currently released samples of it are probably test versions that may be updated in further iterations. Refer to our in-depth article for a technical analysis…Rea… Continue reading CryptoLite Virus Removal – Restore .encrypted Files

Google Chrome Mitigates Spectre Vulnerability Via Site Isolation

The recent rise of Spectre vulnerabilities that allows malicious code to hijack sensitive data is being addressed in the latest version Google Chrome. The latest security blog from the browser’s blog gives insight on Chrome’s ability to mit… Continue reading Google Chrome Mitigates Spectre Vulnerability Via Site Isolation

Facebook Gave Mail.Ru Extended Access to User Data

Following the latest Facebook privacy data scandal, it has been revealed that the company gave extended access to user data to 61 companies, including Mail.Ru. This is one of the biggest online services in the world used by many Russian-speaking…Read… Continue reading Facebook Gave Mail.Ru Extended Access to User Data

Dark Web Sales Offer Military Tech & Airport Security Information

The latest Dark Web sales that have been uncovered by experts reveal that hackers have gained access to very sensitive data. The latest reports reveal that among the sold goods there are secret military technology materials, operating manuals and even…. Continue reading Dark Web Sales Offer Military Tech & Airport Security Information

Scarab-Recovery Virus (Scarab Ransomware) – Remove and Restore .Recovery Files

Scarab-Recovery Virus is a newly discovered release of the Scarab ransomware family. It is possible that future versions of it are going to feature updated code that add newer functions. Read our complete Scarab-Recovery Virus removal guide to learn mo… Continue reading Scarab-Recovery Virus (Scarab Ransomware) – Remove and Restore .Recovery Files

Hide ‘N Seek IoT Botnet Updated with Database Infection Mechanisms

A new attack campaign utilizing updated instances of the Hide ‘N Seek IoT botnet are currently attacking users worldwide. The security analysis of the captured samples showcase that the updated code a wide range of databases servers support. This… Continue reading Hide ‘N Seek IoT Botnet Updated with Database Infection Mechanisms

CVE-2018-3693: New Spectre 1.1 Vulnerability Emerges

The latest variant of the Spectre series of bugs have been discovered — the newest addition is the Spectre 1.1 vulnerability which is tracked under the CVE-2018-3693 security advisory. Like previous iterations it leverages a flaw that can create … Continue reading CVE-2018-3693: New Spectre 1.1 Vulnerability Emerges

Remove PoisonFang Virus – Restore Encrypted Files

The PoisonFang virus is a new ransomware that contains many advanced components that can cause widespread damage on the infected hosts. The security analysis shows that it bears no code from any of the other famous families. Our article shows…Read mo… Continue reading Remove PoisonFang Virus – Restore Encrypted Files

Arch Linux AUR Repository Found to Contain Malware

The Arch Linux user-maintained software repository called AUR has been found to host malware. The discovery was made after a change in one of the package installation instructions was made. This is yet another incident that showcases that Linux users….. Continue reading Arch Linux AUR Repository Found to Contain Malware