Beware of Spora – a professionally designed ransomware

Spora is a recent addition to the ransomware family that Quick Heal Lab has come across.  It is…

The Remote Desktop Protocol Vulnerability – ‘CVE-2012-0002’ is not dead yet!

On March 13, 2012, Microsoft disclosed the details of a ‘critical vulnerability’ called Remote Desktop Protocol Vulnerability –…

Ransoc – An unusual ransomware that threatens to expose your personal information

Mostly a ransomware encrypts your files and demands money in exchange for a key that can decrypt the…

Ransoc_ransomware

Alert! A Fake Flash Player Website is Spreading Locky Ransomware

The Locky ransomware, like all other ransomware, encrypts user data and demands a hefty ransom in exchange for…

5 Compelling Reasons Not to Pay Ransom to Hackers

Unless you’ve been living under a rock, you would know what a ransomware is and why are computer…

5-compelling-reasons-not-pay-ransomware-attack

Alert! Ransomware is Being Spread through the Ammyy Admin Website

This is a precautionary advisory for users who frequently visit the website of the popular remote desktop sharing…

Be Careful of the KMSPico Activator – It could be a Ransomware!

If you are using KMSPico Activator for activating your Windows or MS Office, then you could be risking…

How to Recover Files After a Ransomware Attack?

What if you know your data is securely backed up when a ransomware strikes and you don’t have…

Recover data after a ransomware attack

Ransomware Getting Delivered Using Script Files

The ransomware threat has significantly grown over time. Each day, a new variant gets added to the ransomware…

Troldesh Ransomware brute-forcing its way into systems

Ransomware creators deploy more than just one way to trap their victims. These include malicious email attachments, infected…