Go to Top

Remove PRISM Virus (Ukash Virus Removal)

PRISM is a malicious program categorized as a ransomware. When it infects computers, they become blocked because the user is accused of committing crimes such as copyright infringement. The ransomware does this in the name of U.S. law enforcement organizations. Nevertheless, everything is just a scam created by frauds whose goal is to gain money.

PRISM virus

Read more +

Remove Policajny Zbor Slovenskej Republiky Virus

Policajny Zbor Slovenskej Republiky virus is a ransomware originating from Urausy family. The malware will try to deceive the users. Once the malicious program infects the PC it will block the computer and display a notification which is supposedly sent by Slovakian police, but that is completely not true. The people behind this project are frauds, and their only goal is to collect money from unsuspecting victims. The notification displayed by this ransomware state that the user has committed some sort of crimes e.g. illegal distribution of copyrighted data or distribution of pornography. As a result, user must pay a fine of €100.

Policajny Zbor Slovenskej Republiky virus

Read more +

Remove Antivirus Security Pro from Your PC

The Antivirus Security Pro program is fake antivirus software. It belongs to the Rogue.WinWebSec family, which is a group of various rogue anti-spyware programs. The fake software performs bogus computer scans and claim that your system is infected with various malware. Moreover, the Antivirus Security Pro disables all the legitimate antivirus software found in the PC. The program is distributed using two methods. It can infiltrate the PC while you are visiting corrupted webpages. The other method is a more sophisticated one. The users are offered to perform an online virus scan. After the scan is completed, the user is presented with results which show that the PC is infected with all kinds of malicious programs. In order to solve those problems, one is suggested to download Antivirus Security Pro program.

Antivirus Security Pro

Read more +

“Browse to Save” Removal (Uninstall Guide)

“Browse to Save” is an unwanted application which is used for promoting various services and products. It is classified as an adware. As soon as the program is installed it starts displaying pop-ups, ads and coupons while the user is browsing the internet. In the long run, the activities of the app become very irritating.

In addition to the boxed ads, the “Browse to Save” adware displays underlined keywords. Once the user clicks on one of them, an advertisement will appear in the computer screen. All the promotional material associated with the adware will carry the name of the program or the logo.

Read more +

Remove GARDA Virus (Ukash Scam Removal)

GARDA virus acts as ransomware. Once the computer is infected the malware demands the user to pay a certain amount of money. Furthermore, the virus will block the PC, supposedly until payment is made. This malicious program is distributed using drive-by-downloads, corrupted links, emails or various other ways.


When the GARDA virus infects your PC, a notification appears claiming that you should pay a fine of 100 euros. To make the warning message look more authentic the criminals added logos of The Irish Coat of Arms and Guardians of the Peace. Both of them are local law enforcement organizations. Furthermore, the malware hijacks your webcam, as a result the notification is displaying what is happening in your room. The warning message accuses users of visiting banned webpages, visiting websites which contain child pornography, illicit information exchange or storage of pirated data. According to the criminals paying the fine is the only solution if they want to avoid these allegations. So users are provided with instructions on how to make the payment. Due to the fact that a lot of victims are scared after the mentioned allegations, the scam is often successful.

Read more +

Apple iOS Hacked with a Battery Charger

Recent study revealed that you should be careful even when you are about to charge your iPhone because your device might get infected. This dangerous breach was discovered by scientists from Georgia Institute of Technology. During the research,  they noticed that a MACTANS charger has the capabilities to infect iOS devices with a Trojan. This information was presented during Black Hat security conference.

The infection process is quite simple. The iOS device is infected as soon as it is plugged in for charging into the MACTANS device. The Trojans which infects the apple device could present all sorts of malicious traits. For example, the virus might gather personal data or it might take over the control of the smartphone. The MACTANS device is created on BeagleBorad and has ARM processor, and it is using Linux software.

Read more +

BrotherSoft Search and Toolbar Removal (Uninstall Guide)

BrotherSoft Search virus (a.k.a. BrotherSoft Toolbar virus) is a widely spread browser hijacker. Just like the other hijackers, it changes default search engine, homepage and other browser settings. Furthermore, the application might cause serious security problems in the future because the search engine promotes sponsored links which are often associated with malware distributing webpages.

BrotherSoft Search

Moreover, the BrotherSoft virus will perform redirections to search.brothersoft.com and other associated webpages, as soon as the browser is infected. The users are redirected to the mentioned webpages when they type search keywords directly to the browser address bar. The websites, which users are redirected to, are used for the spread of other software, which is also bundled with malware. As a result, the developers behind BrotherSoft generate income. So the company uses similar tactics as a well-known domain download.com. The CNET owned webpage also distributes freeware packed together with unwanted programs.

Read more +

Hackers’ code used to control Toyota and Ford test cars

Last Friday, in Las Vegas, two investigators performed a remarkable act. They showed the audience how to break in the car‘s computer system and gain control of the brakes or steering wheel. They tested two cars: 2010 Ford Escape and 2010 Toyota Prius. Moreover, now they revealed the details of the tests to wide public.

Those two researchers are Chirs Valasek, who is director of security intelligence at IOActive, and Charlie Miller, working at Twitter as a security engineer. So as mentioned before, these two men released a report concerning the breaches in the car computer system, which thoroughly describes all the data, tools and code used to perform those actions. Nevertheless, the details concerning the investigation were sent to car manufacturers several weeks before the conference. This was done in order to protect the data from reaching criminals first. Researchers explained that they made the report available for the public in order to get everyone‘s attention towards car computer system safety.

Read more +

Summary Black Hat 2013

Internet safety

During the conferences at Black Hat,  a number of cases were reported when a lot of damage was done to the infrastructure of the internet. What is more, the damage done by those attacks is usually hard to fix. For example, the BREACH attack which is associated with the CRIME TLS attack, made it possible to read encrypted texts. This happened because the security model of SSL was broken, which is a widely used protocol developed to protect sensitive information. Despite the fact that similar attacks occurred in the past, this is a more dangerous attack because this one is easier to conduct and it is more practical. United States Computer Emergency Readiness Team (US-CERT) admitted that they don‘t have a practical solution to solve this issue. Unfortunately, that is not all. An investigator named Paul Stone discovered a new method enabling the hackers to get the source code of any page the user is visiting. This is done using the JavaScript-based timing attacks. As a result, personal data such as user ID might be lost. Moreover, by implementing the latter technique a hacker can recreate everything that is in a given iframe on a targeted website. Another security expert called this attack crazy, because there is no way it could be stopped and fixed.

Read more +