Article on the subject of "malicious files"
-
How to prevent a Windows 10 computer from sending files to Microsoft
by default, windows 10's built-in antivirus engine will automatically send suspicious file samples from your computer to microsoft.
-
Microsoft urgently warns about a phishing campaign that uses malicious Excel macros to hack PCs
security team with microsoft's security intelligence has issued an urgent warning about a massive fraud campaign.
-
The malicious video file causes users to lose control of the device 'storming' in the Android world
during this time, you should be more careful before accessing or playing any new strange videos that appear on your smartphone, especially videos downloaded from the internet or received via strange email.
-
How to open the infected PowerPoint file, causing hackers to invade the computer?
previously, we knew that simply opening an ms word file could help bad guys invade your computer through a critical vulnerability in microsoft office.
-
The browser is too smart, hackers turn to embed zero-day Flash malicious code into Microsoft Office files
when unable to bypass the flash browser, attackers are switching to office files, most recently hackers targeting diplomats in the middle east.
-
Campaign to distribute spyware aimed at macOS in Vietnam
security experts discovered a campaign to distribute spyware with compelling content emails and attach a malicious text file to the mac of a number of vietnamese organizations and businesses.
-
How to Detect and Avoid Malicious EXE Files on Windows
cybercriminals often use malicious exe files to spread malware, ransomware, or spyware. that's why you should be able to recognize and avoid potentially harmful files to protect your device from infection.
-
Microsoft shook hands with VirusTotal in resolving malicious code issues that affected MSI files
microsoft and the chronicle's virustotal team have teamed up to develop tools to make warnings faster and more accurate for modified msi files to turn into malicious java code repositories.
-
Detecting malicious viruses in the application has more than 100 million downloads
the google play store removed the camscanner pdf application running android operating system by cc intelligence corporation in china after discovering that it recently spread a malicious virus.
-
The browser is too smart, hackers turn to embed zero-day Flash malicious code into Microsoft Office files
when unable to bypass the flash browser, attackers are switching to office files, most recently hackers targeting diplomats in the middle east.
-
Microsoft has just patched a critical security hole in Windows 10 discovered in 2018
in patch tuesday released august 2020, microsoft patched a vulnerability that allowed hackers to turn msi files into java files that could spread malicious code on windows 10. and more importantly, malicious files. this harm retains the legal digital signature.
-
Warning: The new Facebook virus, a malicious code that is spreading rapidly through Messenger
from yesterday (december 18, 2017), a new type of malicious code has appeared and raged in vietnam. this malicious code is not too sophisticated but is spreading very fast through facebook messenger because it is sent from the friends in the friend list.
-
Video becomes a tool of malicious code
on november 14, security firm mcafee announced that it had discovered the w32 / realor computer worm specializing in infection and hiding in standard video files of real media format. by embedding or linking malicious code
-
Warning: New malicious code is infecting about 500,000 router devices
cisco researchers have released a warning warning about a malicious malicious code called vpnfilter, which is spread by a group of hackers spreading more than 500,000 home or small companies' devices across the globe. world.
-
Fileless malware - Achilles heel of traditional antivirus software
by the definition of being unified and widely recognized by many industry-leading security experts, the malware fileless is the type of malicious code that does not write malicious executable files to the file system.
-
CertUtil.exe allows an attacker to download malicious code and bypass antivirus software
is legitimate software but certutil is used to install malware on the victim's computer.
-
Most Android anti-virus software cannot detect malicious APK files
apk file containing malicious code is a method that hackers often use to attack android users. unlike ios, android users can download and install apps from third-party app stores or download the app's apk file and install it themselves.
-
Embed malicious code into PDF file without security error
attack on the system through malicious code embedded in pdf files whether users open with the latest version of adobe reader or foxit reader.
-
14 games on the App Store contain malicious code, iPhone users be careful
security researchers wandera recently discovered 14 games linked to a server once used to control malware golduck that made the android world chaotic last year.
-
After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
the 'blackmail' malicious code called petya, which appeared under the new version of petrraprap, is similar in effect to the wannacry malicious code, causing the computer system of many multinational companies to be shattered. according to the initial record, these first countries infected with
-
Malicious code is growing up
security firm mcafee warns that malicious code is currently on the way to prepare to reach a new level of complexity and professionalism. not only the malicious code and adware are now becoming a professionally distributed service
-
Halloween helps hackers penetrate computers
sophos has just discovered a halloween spam campaign that will attack and direct victims to malicious websites that have 'dangerous' files. spam emails can be easily identified with
-
Signs that your computer is infected with malware
malware, also known as malware, is harmful files, they often come from installing pirated software or you unintentionally download them from the internet. to detect malicious code on your computer, you need to carefully check everything on your computer.
-
How to prevent malicious blackmail JPG code via Facebook Messenger
locky ransomware is a blackmail malicious code in jpg format on facebook. this type of malicious code will restrict access to or use of some folders and files. if accidentally infected with this type, facebook users will be required to use the money to retrieve the account and data
-
A series of malicious applications that collect user data, delete immediately if you are installing
security experts at mcafee have discovered a new type of malicious code that has entered the google play store through 60 different applications, called goldoson.
-
A malicious extension 'occupies' Chrome and Firefox browsers appears, preventing users from uninstalling
malwarebytes, the famous security company, has discovered a malicious extension that appears in chrome and firefox browsers. if the user installs it, it is difficult to remove.