Chromium virus is a browser virus misusing the name of the legitimate Google open-source project Chromium is a legitimate project by Google. However, the application is often modified to launch malicious examples that can harm end-users. Chromium virus is a term used to describe malicious browser application that is using […]

Chromium virus


The zero-day vulnerability would allow the attackers to take over users’ machines Mozilla has rolled out a critical update – it patched a zero-day vulnerability within the browser that is actively exploited in the wild. If successfully exploited, it would allow the attackers to take over the affected machines – […]

Firefox patches critical zero-day vulnerability exploited in the wild


Apple virus is the type of malware that is illegally using the name of the tech giant Apple in fake alerts   Apple virus is the term that includes various technical support scams, adware-type threats, and malware designed to infiltrate only Mac devices. Various support scams and phishing campaigns[1] target […]

Apple virus



Regin malware is a Trojan developed by National Security Agency to gather intelligence information on targeted Windows machines Regin is a sophisticated APT that is capable of taking control over the host machine on all levels Regin virus is a multi-stage malware program designed to open a backdoor[1] on the […]

Regin virus


Afrodita ransomware – a new malware string that targets businesses in Croatia Afrodita ransomware is a dangerous malware form that spreads through email spam and malicious excel documents Afrodita ransomware is a notorious parasite that is spread via phishing emails and attached excel sheets.[1] The malware uses AES-256 and RSA-2048 […]

Afrodita ransomware


Zeus virus is a banking Trojan which can be included in the tech support scam Zeus trojan is malware that is designed to steal personal data, such as banking details or other credentials. However, the alert with Zeus name is nothing but a scam Zeus virus is a malicious trojan […]

Zeus Trojan



BrowserModifier is a malicious program programmed to divert users’ traffic to affiliated sites BrowserModifier is a term used to describe an aggressive type of adware and browser hijacking programs BrowserModifier is a heuristic name given to a type of potentially unwanted programs[1] that focus on browser hijacking activities on Google […]

BrowserModifier


Somik1 ransomware – a file-locking infection that adds the .somik1 or the [email protected] appendix to each encrypted file Somik1 ransomware is a virtual parasite that adds one out of two extensions to encrypted documents and drops five ransom messages. The malware was first spotted and announced by S!Ri on Twitter[1] […]

Somik1 ransomware


Startmostoriginalprogram.icu is the intruder that is designed to install potentially unwanted programs or malicious applications by tricking people Startmostoriginalprogram.icu – Mac virus that shows fake messages about needed updates or installations to make people eager to allow the suggested content. This is an adware-type program pretending to shows system errors that […]

Startmostoriginalprogram.icu



Quimera ransomware – a notorious malware form that does not mark the encrypted files Quimera ransomware is a malicious infection that can infiltrate computer systems through email spam, software cracks, and unprotected RDP configuration Quimera ransomware is recently discovered malware[1] that locks files with a unique cipher but does not […]

Quimera ransomware