24stream
Do not believe that 24stream will stream movies because it is simply not capable of doing that. This strange extension can show videos associated with the movies you are researching, but it cannot steam full movies. Instead, you can find trailers, featurettes, clips, interviews, and similar content. Does this sound familiar? That is because that is the kind of content you can access via youtube.com, the world’s most popular video hosting website. Of course, we should not equate the PUP (potentially unwanted program) to YouTube because it does not even come close to the services provided by this giant. ...
Color Generator
Are you an amateur product designer? If you are, Color Generator is an extension that might appear to be useful. There is not much information about this add-on – which immediately raises questions and red flags – but it promises to create color pallets with HEX ID. The extension is free, and you might see no harm in installing it just to check it out. Our research team does not recommend this. It appears that this seemingly beneficial add-on is an advertising tool or a data-collector, and these are the things you do not want to be dealing with. Have you downloaded the extension already? ...
Scarab-Leen Ransomware
Scarab-Leen Ransomware is a malicious application that may replace your Desktop’s wallpaper with a red image showing a skull and a text called ransom note. As our specialists say, the malware may enter the system without the user realizing it and encipher his data while staying silently in the background. Afterward, the user should see the described picture and the text in it might demand to contact the malware’s creators and pay a ransom. Needless to say, even if the hackers say they guarantee you will get all of your files back, it would be extremely risky to pay the ransom. ...
Autismlocker Ransomware
Someone wants you to share your most private photos, and this someone is hiding behind Autismlocker Ransomware, a screen-locking infection that can attack Windows operating systems. The infection is most likely to travel hidden in software bundles and spam emails, or it could be downloaded by malware that exists on the affected system already. Once executed, the infection locks the screen and displays a strange image depicting two small children and someone in a bear costume. The image also includes a message, which informs that one needs a special code to unlock the system. ...
ComboJack Cryptojacking
ComboJack Cryptojacking is a harmful malicious application that will cause you a lot of problems if it ever slithers onto your computer and you do not remove it soon. As research conducted by our malware researchers has shown, this threat has been developed and is now used as a tool to steal money from users who transfer money online. From a technical standpoint, ComboJack Cryptojacking is a typical Trojan infection. This must be the reason why so many users do not know anything about its presence and entrance. When they detect it, it is usually too late – ComboJack Cryptojacking has already stolen money from them. ...
Uselessdisk Ransomware
You are in trouble if Uselessdisk Ransomware has slithered in. When this malicious infection attacks, its locks your computer, and the only thing you can see is a message in black background urging you to pay money for decryption cervices. This is why this threat is classified as ransomware. According to the message, you can get your operating system back to normal only if you transfer 300 USD in Bitcoins to the 1GZCw453MzQr8V2VAgJpRmKBYRDUJ8kzco Bitcoin wallet. It would be a huge mistake if you made the payment. Why? ...
Donut Ransomware
Donut Ransomware is a computer infection that expects you to pay a ransom fee to restore your encrypted files. It joins a mass of other programs of the same profile, and we can clearly see that this application is not prevalent enough to have caused a lot of waves on the Internet. Nevertheless, it is still a dangerous computer infection that should be taken seriously. Please remove Donut Ransomware from your system as soon as possible, and then look for ways to restore the files affected by the encryption. It should not be hard if you have a system backup on an external hard drive. ...
8chan Ransomware
A new ransomware infection – 8chan Ransomware – was discovered by the research team at 411-spyware.com. The infection was analyzed thoroughly, and now researchers can say with confidence that this malicious application is not completely new crypto-malware. According to them, it is very likely that 8chan Ransomware is a new version of Scarab Ransomware (you can find more about it at 411-spyware.com). Unlike its predecessor, this threat should be decryptable, specialists say. In other words, it might be possible to unlock files encrypted by this ransomware infection. ...
Google Image Downloader Chrome Extension
Google Image Downloader Chrome Extension is a plugin that only works on Google Chrome; at least at the moment of writing. If you do come across it, you should know it falls under the classification of potentially unwanted programs also called PUPs in short. The suspicious part about is its description says the add-on can help users download all wanted images at once instead of downloading them manually one by one, but in reality, it does not look like the application has such an ability. Moreover, our specialists say it is quite likely Google Image Downloader Chrome Extension could collect information about your interests or even display various pop-ups, banners, sponsored links, and other doubtful content from various third parties. ...
RSA-4096 Ransomware
If RSA-4096 Ransomware – also known as TeslaCrypt Ransomware – has invaded your operating system, your personal files must be encrypted, and a funny extension (e.g., .mp3, .xxx. or .micro) must be attached to the original names. There is no point in removing these extensions because the mess is within the file, not its name. RSA-4096 is an encryption algorithm that is used to encode the data of the file to make it unreadable. A decryptor is created along with the encryptor, and so your personal files are not completely lost. That being said, we cannot create the decryptor, and you cannot just download one online. ...