CYBERHUB WILL BE UPDATING OFTEN! : 2019 :
Signed in as:
filler@godaddy.com
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.
Here I will show you a small demonstration of how PC virus works and how to protect yourself from being attacked by these virus.
- RawbieTheRawbit
Not to be confused with adware, malvertising is the use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users’ computers. For example, a cybercriminal might pay to place an ad on a legitimate website. When a user clicks on the ad, code in the ad either redirects them to a malicious website or installs malware on their computer.
In some cases, the malware embedded in an ad might execute automatically without any action from the user, a technique referred to as a “drive-by download.”
Worms have been around even longer than computer viruses, all the way back to mainframe days. Email brought them into fashion in the late 1990s, and for nearly a decade, computer security pros were besieged by malicious worms that arrived as message attachments.
One person would open a wormed email and the entire company would be infected in short order.
Malware programs that encrypt your data and hold it as hostage waiting for a cryptocurrency pay off has been a huge percentage of the malware for the last few years, and the percentage is still growing.
Ransomware has often crippled companies, hospitals, police departments, and even entire cities.
If you're lucky, the only malware program you've come in contact with is adware, which attempts to expose the compromised end-user to unwanted, potentially malicious advertising.
A common adware program might redirect a user's browser searches to look-alike web pages that contain other product promotions.
Spyware is most often used by people who want to check on the computer activities of loved ones. Of course, in targeted attacks, criminals can use spyware to log the keystrokes of victims and gain access to passwords or intellectual property.
Adware and spyware programs are usually the easiest to remove, often because they aren't nearly as nefarious in their intentions as other types of malware. Find the malicious executable and prevent it from being executed — you're done.
If you're lucky, you can find malicious executables using a program like Microsoft's Autoruns, Microsoft’s Process Explorer, or Silent Runners.
If the malware program is stealthy, you'll have to remove the hiding component from memory first (if possible), then work on extricating the rest of the program.
Often, I'll boot Microsoft Windows into Safe Mode or through another method, remove the suspected stealth component (sometimes by just renaming it), and run a good antivirus scanner a few times to clean up the remainders after the stealth part is removed.
Cyborg Ransomware
CryptoMix Clop Ransomware
B0r0nt0k Ransomware
Yatron Ransomware
Astaroth
GoBrut
Jokeroo
Gandcrab Ransomware
Trojan Glupteba
Kuik Adware
Magniber Ransomware
Thanatos Ransomware
Trojan Panda Banker / Zeus Panda
WannaCry
SOURCE: https://tweaklibrary.com/cyber-threat-latest-computer-virus/
1. ILOVEYOU
2. Code Red
3. Melissa
4. Sasser
5. Zeus
6. Conficker
7. Stuxnet
8. Mydoom
9. CyrptoLocker
10.Flashback
This is a detailed breakdown on how to remove any virus from a computer and repair your Windows Installation.
Recommended Anti-Virus - Webroot SecureAnywhere https://www.christitus.com/webroot
Download: https://www.reddit.com/r/TronScript/Manual: https://github.com/bmrf/tron/blob/mas...
Are there differences between antivirus and anti-malware software? If so, which of the two should you use?
Are all the things people call "computer viruses" actually viruses?
Copyright © CyberHub - All Rights Reserved. 2019-2020