JS:Downloader-ZY removal process

JS:Downloader-ZY relates to a bunch of issues on your PC, among which Internet related events prevail. The latter, in their turn, include, but are not limited to, extended time of loading page, stealing private data such as account names followed by an attempt to access those (if unsuccessful, you may receive a message that somebody tried to access your account; if the rascals succeed in their attempt of the crack, your private data would definitely be exposed and you will need to resort to relevant account blocking and access regaining steps).

Remove W64.Viknok.B!inf trojan

The multitude of risks posed by the W64.Viknok.B!inf computer Trojan involves several critical aspects of the affected user’s cybersecurity, the privacy perils being predominant. First off, any sensitive documents stored on the victim’s hard drive are subject to quite probable theft as long as this pest is running on the PC. Through its proven capability of communicating directly with its authors’ command and control server, this infection can transmit copies of the harvested private files, which means identity theft at its worst. It’s essential to remark this is a background process that takes place behind the scenes so that the user gets barely any chance to notice and prevent it.

Remove Adware Generic_r.KF infection

Adware Generic_r.KF stands for a sample of unwanted code referring to a family of malicious apps whose objective is delivering advertisements in one’s web browser and implementing the schemes for traffic generation to dubious online resources. The ‘KF’ component of the malware signature structure denotes a specific piece of adware, while the corresponding massive family is flagged as ‘Adware Generic_r’, where the final part may vary depending on the particular pest type.

Techniques for Malware Persistence. Part 3.

Jake Williams: So, service failover is the next technique we’re going to talk about. Services failovers are all kinds of cool. We can take an existing service, a legitimate service; I think every forensics professional here knows you got to go through the service – we’re not interested in that. We’re looking at using an actual service failover. So we’re going to piggyback on an existing service, maybe even something cool like antivirus – that’s a big one that you always want to attack. I always liked to attack an antivirus.

Techniques for Malware Persistence. Part 2.

Jake Williams: How many of you guys are government employees or card-carrying members of the infamous CatCard? Yeah, it’s cool – I wouldn’t raise my hand either. So, one of the emails that we got – this is really interesting – actually involved some of the CatCard reader software installed on the “Golden Images” all around some US Government organizations. And so, what turns out is when you put your card in, then it launches the program to handle it. Program.exe then not only executes at some time in the future, but at some time that we can social-engineer in the future. Maybe we social-engineer the user of the machine that we’ve left program.exe on, say: “Hey, do something that would require you to insert your CatCard at this point.” Or maybe they’ll just insert their CatCard to log on – and then again we’re right back in business: when it launches, their credentials can be stolen.

Wipe the Drive Dude! Techniques for Malware Persistence

Jake Williams: Hi! I’m Jake Williams. I’m a Principal Forensic Analyst for CSRgroup; I’m a SANS Forensics 610 Instructor – that’s, not surprisingly, malware. I’m doing research right now on cloud forensics, and I like to break poorly written software because…who doesn’t?

Remove Minerd.exe process to prevent resource overuse

Operating system overwhelmed by a single process called Minerd.exe? PC growing insufferably slow due to this activity? Learn what this executable is, how it may be abused by cyber crooks, and how to get rid of it for the sake of normal computer usage experience.

How to remove Nengine.dll error popup

This guide is meant to shed light on the issue of nengine.dll error popping up after Windows startup and at random as the computer is working. You will learn the reasons for this unwanted activity, the additional problems that might occur along the way if the bug is left unattended, and the effective fix applicable for this scenario.

Updated Web Site to Correct Browser Issues

Corrected some graphics issues on our web site when viewing pages using the older Internet Explorer browsers. Everything should display correctly for Firefox, Apple Safari 3, IE 6 and 7 Browsers. If you see any other graphic issues on this web site, please let us know.

ScaryBear Software Launches Updated Web Site

ScaryBear Software launches an updated web site with a simplified interface to make it easier for customers to find and review applications.