Alka ransomware is the cryptovirus that encrypts files and corrupts the system settings in several attack stages Alka ransomware – malware that extorts a particular fee for the alleged decryption tool that should help to unlock encoded files marked using .alka extension. It is a version of the DJVU virus that […]

Alka ransomware


Cerber ransomware is a multi-variant crypto-malware that avoids infecting users from Russia and other CIS countries Cerber virus ransom sum is inadequate Cerber ransomware is a file locking virus that was first spotted in the wild in March 2016. Operating Ransomware-as-a-service scheme, the malware became a diverse and high profile […]

Cerber virus


$$$ ransomware – a malicious infection threatening victims that the demanded price will rise if they do not make contact as soon as possible  $$$ ransomware is a notorious virus that travels with the help of suspicious emails and their malicious attachments, software cracks, malvertising, etc. $$$ ransomware is a […]

$$$ ransomware



Your Apple iPhone Is Infected By (17) Viruses – a scam that mainly targets iPhone users, although can also be encountered on other devices Your Apple iPhone Is Infected By (17) Viruses is a scam message that users may see on their iPhone, iPad, or macOS devices Your Apple iPhone […]

Your Apple iPhone is infected


Gubudakis.com – an advertising domain that employs social engineering tactics to increase its number of daily visitors Gubudakis.com – adware that can collect non-personal information related to the user’s browsing session by injecting tracking objects such as HTTP cookies, beacons, or pixels Gubudakis.com is considered to be an intrusive adware […]

Gubudakis.com


ICSPA virus is the threat that uses false law enforcement agency messages to scare people into paying the demanded amount ICSPA virus – the threat based on extortion that falls into the category of ransomware because of that. This virus is almost identical to CashU or Ukash malware because it […]

ICSPA virus



Repp ransomware – the 203rd version of Djvu ransomware that is currently undecryptable Repp ransomware, discovered by Michael Gillespie,[1] appears to be one of the newest Djvu ransomware versions that have emerged at the start of 2020. This malicious variant acts exactly the same as its other siblings and aims […]

Repp ransomware


TVEyes crashed when ransomware attacked the core server and engineering workstations Undisclosed ransomware virus attacked TVEyes, radio, and television monitoring service.[1] The media monitoring platform was down and many public relations agencies, political campaign leaders, newsroom people, and journalists lost access to a crucial tool. The infection took place on […]

Ransomware targeted TV&radio monitoring service and caused an outage


Bitrep virus is the trojan horse infection that can be set to perform tons of different malicious processes on your device  Bitrep virus is the term used for a big amount of detection names that share the same name. This is the virus that stealthily infiltrates the machine and runs […]

Bitrep virus



Search.safesidetabsearch.com is a browser hijacker that claims to protect you while browsing online Search.safesidetabsearch.com is a browser hijacker that initiates web browser changes without permission Search.safesidetabsearch.com is a web address that users can see on their Google Chrome, Mozilla Firefox, MS Edge, Safari, or is a browser after they install […]

Search.safesidetabsearch.com virus