Ransomware Decryption Tool


Berikut ini beberapa informasi berkaitan dengan Decryption Tool untuk WannaCrypt/WannaCry maupun Ransomware lainnya:

  • bleepingcomputer.com | With the Success of WannaCry, Imitations are Quickly In Development
  • thehackernews.com | WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom
  • nomoreransom.org |DECRYPTION TOOLS
  • bankinfosecurity.com | WannaCry Ransomware: Tools Decrypt for Free
  • #avast.com | Free Ransomware Decryption Tools

Baca lebih lanjut


Ghost Push possesses Android devices; only version 6.0 is safe

scmagazine.com | Bradley Barth | October 17, 2016

“I ain’t afraid of no Ghost Push?” Better think again if you’re an Android user with a device operating on anything lower than version 6.

Baca lebih lanjut

Ransomware: Cerber

20161005-cerber-1-125x100Berikut ini beberapa artikel terkait Cerber Ransomware yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:


  • vaksin.com | Cerber 3: Ransomware yang sadar marketing
  • bleepingcomputer.com | Cerber Ransomware switches to a Random Extension and Ends Database Processes
  • pcrisk.com | Cerber ransomware removal instructions
  • bleepingcomputer.com | Cerber Ransomware switches to .CERBER3 Extension for Encrypted Files
  • bugsfighter.com | How to remove Cerber3 ransomware and decrypt .cerber3 files
  • keonesoftware | Cerber3 ransomware removal: how to decrypt .cerber3 virus files
  • malwarefixes.com |  Remove Cerber3 Ransomware and Decrypt Files
  • bleepingcomputer.com | Check Point releases working Decryptor for the Cerber Ransomware

Baca lebih lanjut

Android malware spreading through Google’s AdSense network


Neowin.net | Justin Luna | Aug 16, 2016

A group of security researchers have recently discovered a new strain of malware targeting the Android operating system by Google, which also uses its advertising network AdSense to spread itself.

Baca lebih lanjut

Is Zepto ransomware the new Locky?

zeptoPaul Ducklin | 05 JUL 2016 | nakedsecurity.sophos.com | Graham Chantry, Fraser Howard and Benjamin Humphrey of SophosLabs 

Beware the latest arrival on the ransomware scene: Zepto. It’s very similar to the well-known Locky malware, and the consequences of an attack are the same: your files end up scrambled, at which point the crooks offer to sell you the decryption key.

Baca lebih lanjut

In China, fears that Pokemon GO may aid locating military bases


Reuters.com | PAUL CARSTEN | Fri Jul 15, 2016 7:11am EDT

Not everyone loves Pokemon GO, the mobile game that has become an instant hit around the world since a limited release just a week ago.

Baca lebih lanjut

DroidJack Uses Side-Load…It’s Super Effective! Backdoored Pokemon GO Android App Found


Proofpoint.com | Thursday, July 7, 2016 – 18:30


Pokemon GO is the first Pokemon game sanctioned by Nintendo for iOS and Android devices. The augmented reality game was first released in Australia and New Zealand on July 4th and users in other regions quickly clamored for versions for their devices. It was released on July 6th in the US, but the rest of the world will remain tempted to find a copy outside legitimate channels. To that end, a number of publications have provided tutorials for “side-loading” the application on Android. However, as with any apps installed outside of official app stores, users may get more than they bargained for.

Baca lebih lanjut