After adding a Wi-Fi worm module to hack wireless networks earlier this year, the operators of the Emotet malware are now using stolen attachments to help increase the authenticity of the spam emails they use to infect users’ systems…

When it was first discovered all the way back in 2014, Emotet was originally a banking trojan. However, now it has evolved into a malware botnet which is used by attackers to download other malware families such as Trickbot and the QakBot trojan.

Email client

Learn More @ Tech Radar

All in all, Chromebook virus protection may not be necessary yet, but there is plenty of malware going around that could ruin your Chromebook experience…

Chromebooks are supposed to come with sufficient, built-in security. But is that really true? Can you use a Chromebook without having to think twice about general cybersecurity and anti-malware protection in particular? Or do you need Chromebook antivirus? Let’s have a look first at which security features are pre-packed in ChromeOS.

Continue Reading @ Malwarebytes Labs

European managed security services company Orange Cyberdefense today reveals the findings of its inaugural Security Navigator, which shows a 23 percent decline in the number of recorded malware incidents in 2019…

The total number of security events have, however, increased. The company analysed 263,109 events from data obtained from its 10 CyberSOCs and 16 SOCs. Out of these events it identified 11.17 percent as verified security incidents. This represents a 34.4 percent increase over the previous year’s rate of 8.31 percent.

declining graph

Continue Reading @ BetaNews

Remove Facebook Voice Message Virus (Improved Instructions) by 2-Spyware

Facebook voice message virus – a malicious campaign that can relate in the installation of a Trojan horse if the misleading voice message is played by the victim…

Even though the message itself might not always directly launch the installation of malware, it might reroute the user to some type of potentially dangerous website where cyber threats such as trojans, ransomware viruses, cryptocurrency miners, browser hijackers, or adware are distributed.

Messenger voice message virus

Source: Remove Facebook voice message virus (Improved Instructions) – Virus Removal Guide

Norton Power Eraser – A Tool To Help You Eliminate Deeply Embedded Malware

Norton Power Eraser was recently updated and I thought I would at least post some information on this security application.

This application has the ability to “aggressively” detect and remove malware that can impersonate legitimate applications, such as fake antivirus software. These applications often are described as scamware, rogueware, scareware, etc…

When using an application such as this, make sure you have some knowledge of the Windows OS above and beyond the basic level so that you don’t end up doing more harm than good. Here is a tutorial to get you started and to understand more – Click Here for Tutorial

Norton Power Eraser v4.0 Beta screenshot 1 / 2

Source: NortonLifeLock Rescue Tools – Norton Power Eraser


Thank You for visiting
What’s On My PC

Malwarebytes AdwCleaner

Malwarebytes AdwCleaner is one of those security software options (that is FREE and Portable) that you want to remember or keep on your PC (or flash drive) in the event your computer is running noticeably slow; or strange messages start showing up; or you notice your browser’s homepage has mysteriously changed. Typically when these signs begin to appear it is a sign that a variant of malware may be present.

Here at “What’s On My PC” I run Malwarebytes AdwCleaner on a regular basis, for peace of mind. Keep in mind (be careful) this type of software is designed to aggressively pick out items that it knows to be bad or believes to be bad that may be compromising your computer.

Following a scan you are given option to delete those items and once that decision is made, the computer will typically reboot. I have included this software in my tech toolbox when assisting others and have had great success in restoring a PC to normal operation. Just know what you are deleting (getting rid of) in the end.

Source: Malwarebytes Adwcleaner

Website Powered by WordPress.com.

Up ↑