Let me remind you that we also reported that Chinese hackers use McAfee antivirus for spreading the malware, and that ESET fixed a serious vulnerability in its products for Windows.
Bugs in Avast and AVG antiviruses were discovered in December 2021, received the identifiers CVE-2022-26522 and CVE-2022-26523, and affect Avast and AVG antiviruses. Since Avast acquired AVG in 2016, the problems appeared to be related to the [...]
It is suggested to use the same decoder for AtomSilo and LockFile. The researchers explain that these ransomware strains are very similar to each other, so it was possible to create a single tool for them.
The company emphasizes that the decoder may not be able to cope with files with unknown and proprietary formats or without extensions at all.
It is reported that specialists managed to crack the malware using information received from the researcher RE-CERT. In the middle of this month, he wrote on Twitter that he found a way to hack AtomSilo and [...]
Under the guise of a security scanner that looks for traces of Pegasus in the system, hackers are distributing RAT Sarwent.
Let me remind you that in June 2021, the human rights organization Amnesty International, the non-profit project Forbidden Stories, as well as more than 80 journalists from a consortium of 17 media organizations in ten countries of the world published the results of a joint investigation, which was named the Pegasus project. Then the experts said that they had discovered large-scale abuse of the Pegasus spyware, created by the Israeli [...]
Researchers remind that thanks to Firebase, data can be stored in a huge number of different applications – for training, games, mail, food delivery and others, and in regions around the world, including Europe, Eastern Europe, the Middle East, Southeast Asia and Latin America.
As a result, databases can contain personal information collected by these applications, such as names, addresses, locations, and in some cases even passwords.
Many developers use the Firebase platform to build Android apps. In doing so, they [...]
Antiviruses versus malware. This competition is constant, and will exist until computers will not become fully secure, users will not stop pressing on all ads and email attachments, and malware creators will not stop making their “product” to gain profit. And in the modern computer world such a race has an enormously high speed. Analysts teams, who are maintaining the definition databases of every antivirus, must add the malware to these databases as soon as possible, so their sleep is very and very restless. Exactly because of their successful (or unsuccessful) analysis, their products are getting more or less effective against modern viruses. And one of [...]
There are many different products for Windows 10 on the market. The German AV-Test laboratory once again wondered which antivirus copes best with protecting Windows 10 devices and tested 22 comprehensive antivirus solutions for Windows 10. As a result, 16 antiviruses received the TOP PRODUCT “.
This time rating was full of surprises.
In July-August 2020, the AV-Test laboratory tested 22 security programs for [...]
A miner is a third-party program that is installed on a computer and “mines” cryptocurrency using the resources of the device. Hidden miners do this unnoticed by [...]
CCleaner is a popular Windows tool for removing temporary files in order to free up disk space. The program offers several advanced features such as updating installed applications, checking your computer, and cleaning the registry.
Potentially unwanted software is not necessarily malicious, but it can annoy users.
Reference: Typically, PUAs include applications, installation files of [...]