Quantcast

Ransomware Chronicle

This is a comprehensive report on ransomware-related events covering a time frame of May 2016 – May 2017. The incidents herein are visually broken down into categories, including new ransomware, updates of existing strains, decryptors released, and other noteworthy news. Security researchers and users...

Remove OSIRIS ransomware and decrypt .osiris extension files

A brand-new iteration of the deleterious Locky ransomware is out. Expert reports about the update started to appear on December 5, which is almost a fortnight after the ZZZZZ precursor surfaced. The latest tweak means that the files affected by Locky will now have the .osiris extension appended to them,...

Bitdefender 2017 Black Friday Up to 60% off

Privacy-PC is officially opening the Christmas shopping season with a fantastic deal. With the featured promotion in store for our esteemed visitors, Black Friday 2016 couldn’t possibly get any more secure. Ready? Here we go! Get up to 60% off on the award-winning Bitdefender products for Windows, Mac OS...

Remove Thor ransomware and decrypt .thor extension files

As the recent Thor ransomware release has demonstrated, the threat actors in charge are adding a fair degree of incoherence to the average time span between different variants of the Locky crypto epidemic. Whereas the timing used to be on the order of three months, it took the bad guys as little as one day...

Recuva review: Piriform Recuva Free&Professional download

0/$24.95 Recovering various types of deleted data is fast, easy and effective with Recuva by Piriform. Usability:  Features:  Efficiency:  Support:  Overall:  Download Recuva, a lightweight freeware applet by Piriform, is one of the world’s most effective solutions aimed at...

HitmanPro.Alert 3.5 with CryptoGuard review

$24.95 HitmanPro.Alert 3.5 with CryptoGuard bridges the security gap in 0day and ransomware attack scenarios. Usability:  Features:  Efficiency:  Support:  Overall:  Download While the world’s largest antimalware labs are at their wit’s end trying to contrive a solution...

Cerber ransomware: virus removal and file recovery

Cybercriminals keep on devising intricate instruments in pursuit of a more efficient online extortion. Compared to the myriads of crypto ransomware floating around the worldwide web these days, the one named Cerber appears to be more advanced as it accommodates a few out-of-the-ordinary properties....

Locky ransomware: virus removal and decryption advice

The victims of ransom Trojans incur a great deal of damage because the thing at stake is their personal data. The indicators of compromise when it comes to ransomware are rather straightforward. These malicious programs don’t conceal the impact that they impair to users, displaying step-by-step tutorials...

Zepto extension virus: files restoration and ransomware removal

Crypto ransomware programs come and go, but the idea of online extortion stays and perseveres with its progress. Having vanished from the antimalware radars for a while, the sample called Locky recently reappeared with a number of new features. Researchers consider the latest spike in its propagation to be...

Surprise, Hackers Use TeamViewer to Spread Ransomware

Security analysts mostly deal with ransomware attacks deployed through exploits, booby-trapped email attachments, or Microsoft Office loopholes occurring when users are tricked into enabling macros. A series of recent onslaughts, however, stand out from the crowd because the offenders have been taking...

Best Security Software 2016 – Privacy PC Awards

Security suites are bound to meet the ever-evolving challenges of cybercrime otherwise they simply lose topicality. The gauntlet thrown down by malicious software has come to pose a much more serious risk than a year ago, which not all vendors are able to genuinely address in their new product line for...

Remove TeslaCrypt ransomware and recover encrypted .vvv/.ccc files

Neither TeslaCrypt nor its copycat AlphaCrypt ransomware is new on the cybercrime arena. In fact, this infection first surfaced in early spring 2015, and it has undergone eight updates over the course of the year. The rather frequent iterations haven’t introduced substantial changes to the trojan’s code...

Reason Core Security review

$24.95 Reason Core Security is all about simplicity combined with solid protection against malware. Usability:  Features:  Efficiency:  Support:  Overall:  Download For a security solution to be efficient, it does not necessarily have to be heavyweight and feature-abundant....

Remove Ads by DNS Unlocker adware

The controversial story of DNS Unlocker software got a kick-off into the public realm with a thread created on VIDCreek.tv online sharing community. In early June 2015, the site admin announced a project purportedly intended for bypassing filters which restrict user access to a variety of Internet resources...

Remove CryptoWall 3.0 ransomware and mitigate the file damage

While the individuals behind CryptoWall 3.0 virus remain pinned to the “most wanted” cybercriminals list, their infamous product has been up and running for months on end. Anyone who is unfortunate enough to fall victim to this nasty hoax isn’t very likely to know what RSA-2048 even means before the...

Best Security Software 2015

Looking back at 2014, the progress in technology used for antivirus protection, online security and user privacy defense is to the fore. In the framework of increasingly tight competition within the industry and the vendors’ approaches that have to rapidly advance in order to meet the more serious...

How to remove Vosteran Search from infected web browser

What makes it easy to tell a reputable web service enhancement from a potentially unwanted one is its mode of installation and whether or not it clearly asks for user authorization to amend browsing settings in one way or another. Based on these indisputable criteria, the add-on called Vosteran (or Vosteran...

Remove Omiga Plus (isearch.omiga-plus.com) adware

Omiga Plus by Taiwan shui Mu Chih Ching Technology, Inc. is a desktop maintenance application that merges the useful with the intrusive. What’s handy about it is the feature of organizing the desktop in a way that allows quick and easy access to its items, accommodating intuitive layout in grids, the...

How to remove Speedial Search homepage hijacker

The last few years’ adware propagation boom is particularly troubling, because not only do these nasty little cyber threats take the essential web browsing choices away from their victims – they compromise user privacy as well. All of these risks turn out to be there when it comes to the analysis of the...

How to remove Sweet Page adware

Ambiguity in the nature of Sweet Page consists in its denoting both a rather harmless web page and a highly annoying application. It reflects the widespread cybercrime tendency that exists on the frontier between the acceptable and illegitimate, namely adware propagation. A campaign like this starts with...

How to remove Trovi Search virus

Circumventing user authorization while making changes to the way a computer system is configured is a feature that makes apps like Trovi Search an unwanted entity. Falling victim to this adware is a matter of installing a third-party program and paying little or no attention to the details of the setup...

Remove search.conduit.com hijacker: Conduit Search removal for Chrome, Firefox, Explorer browsers.

Installing some browser extensions might turn out a mixed blessing, because along with the benefits and increased web surfing convenience users may run into the problem of excessive intrusiveness. Ambiguous experience of this sort is exemplified by the Conduit Toolbar. Whereas, on the one hand, it is a...

Best Security Software 2014

Having bidden farewell to the year of 2013, we would love to share our impressions, observations and perspectives with regard to the state of security software industry’s achievements within the respective time span and predict the trends for the year we’re already in. Our interest in this...

Piriform CCleaner review

Free Without exaggeration, CCleaner is an excellent system optimization tool. Usability:  Features:  Efficiency:  Support:  Overall:  Download Maintaining a healthy computer is not restricted to only keeping malicious software away; it’s a matter of troubleshooting a...

Remove Qone8.com (Start.qone8.com) Hijacker / Browser Redirect

Qone8.com obtrusively meddles with one’s online surfing by hijacking the web browser on the affected computer. Ultimately, this activity leads to your default homepage getting modified (to start.qone8.com) and your web search provider changed in a forcible fashion (to search.qone8.com). Moreover, no matter...

SUPERAntiSpyware Licenses Giveaway for Halloween!

Not only is Halloween a scary and mystical holiday, it’s all about lots of fun and gifts, too! Following the tradition, we at Privacy PC are happy to announce a major giveaway of security software licenses to our readers, courtesy of SUPERAntiSpyware. Winner of the Privacy PC Bronze Award in the...

CyberGhost 5 VPN review

Free Whether you are a free or paid user, CyberGhost VPN provides online anonymity and privacy while featuring ease of use and intuitiveness. Usability:  Features:  Efficiency:  Support:  Overall:  Download Whereas browsing online anonymously used to be perceived as the...

CryptoLocker Virus: “Your Personal Files Are Encrypted!”. How-To-Remove Guide

September 2013 turned out fruitful and lucrative for one of the cybercrime syndicates out there, but really alarming for private users and organizations on the other side of the IT security battlefield. The reason is the launch of a vicious computer infection known as CryptoLocker which in terms of severity...

Guide to remove New Zealand Police virus

The New Zealand Police virus, also known as “Nga Pirihimana o Aotearoa” or New Zealand E-crime Lab ransomware, is targeting users physically located in New Zealand and does it in a fairly vicious way. This malicious code causes the affected operating system to display a scary-looking lock screen...

The US Department of Justice MoneyPak Virus Removal Tutorial

The reputable name of the United States Department of Justice has been disgracefully exploited in cybercrime schemes since late May 2013. Scammers ventured to launch a campaign involving ransomware distribution, stating that it’s being done on behalf of the above-mentioned federal executive department....