If you have ever checked the process details in the Task Manager in Windows (you can launch Task Manager using the hotkey Ctrl+Shit+Esc), you will […]
Read moreTag: Malware
How to Stop Download of Malware in Windows PC
Malware infection is one of the those nuisances that gives you instant headache that even Advil cannot cure. And to be honest, malware infection takes […]
Read moreDetect DNS Hijacking in Routers with F-Secure Router Checker
DNS (domain name server) is a special server dedicated to translate the domain names into IPv4 or IPv6 addresses. So if you enter trishtech.com in […]
Read moreShortcut Scanner : Find & Remove Malicious Shortcuts in Windows
Some of the researchers working for Phrozen Software have found out an easy way to create deceptive shortcuts that malicious programs can use to make […]
Read moreKaspersky System Checker Detects Malware and System Problems
Kaspersky System Checker is a free tool for Windows users that helps diagnose the possible hardware and software related issues as well as detect the […]
Read moreWhat is Gooligan and How to Check if You are Affected?
Simply put, Gooligan is a bad news for all the Android users. Discovered by the security researchers at CheckPoint Security Labs (the makers of the […]
Read moreBlackFog Privacy Improves System Privacy and Protects from Malware
The moment your computer connects to the internet, it becomes susceptible to a myriad of attacks like malware infection, hacking or others. On top of […]
Read moreMBRFilter Protects Disk MBR from Being Overwritten
The master boot record (MBR) is the first sector of the hard disk that contains some basic information about how to interpret the data stored […]
Read moreKeep Ransomware in Check with Ransomware Hunter for Android
Ransomware is a special breed of malware that infects your computers and mobile devices in order to lock them and encrypt your documents. After this […]
Read moreWhat is Tordow Trojan and How to Protect Your Android Smartphone from Tordow
We have already published about a recent discovery of the Quadrooter family of vulnerabilities by the researchers at the Lookout labs. To summarize, Quadrooter is […]
Read more