Home | Kos-Cert
  • slider-img
  • slider-img
  • slider-img

Latest News

Hackers Hijack Ongoing Email Conversations to Insert Malicious Documents !

A group of hackers is using a sophisticated technique of hijacking ongoing email conversations to insert malicious documents that appear to be coming from a legitimate source and infect other targets participating in the same conversational thread. This type of attack relies on hackers compromising one of th…

Read More

06/10/2017

Yahoo Corrects 2013 Data Breach Announcement From One Billion To "All Users"

In a statement posted online today, Yahoo — now rebranded as Oath and part of Verizon — corrected the estimation on a security breach announced last year from the initial assessment of one billion to "all Yahoo user accounts." This announcement refers to a security breach that took plac…

Read More

06/10/2017

Mozilla to End All Firefox Support for XP and Vista in June 2018 !

Mozilla announced today plans to discontinue any support for the Firefox browser on Windows XP and Vista in June 2018. "As one of the few browsers that continues to support Windows XP and Vista, Firefox users on these platforms can expect security updates until that date," said Mozilla in a stateme…

Read More

06/10/2017

Security Bugs in Dnsmasq Affect Computers, Smartphones, Routers, IoT Devices !

Security researchers at Google have found seven security bugs in the Dnsmasq application that put an inestimable number of desktops, servers, smartphones, routers, and other IoT devices at risk of hacking. The seven vulnerabilities are sneakily dangerous because they affect Dnsmasq, a tool that provides a si…

Read More

06/10/2017

Internet Explorer Bug Leaks What Users Type in the URL Address Bar !

Microsoft's Internet Explorer browser is affected by a serious bug that allows rogue sites to detect what the user is typing in his URL address bar. This includes new URLs where the user might be navigating to, but also search terms that IE automatically handles via a Bing search. Users copy-pasting URLs…

Read More

02/10/2017

Apple Quietly Patches macOS Security Bypass Vulnerability !

Apple appears to have silently patched a vulnerability in macOS that would have allowed attackers to bypass the operating system's built-in file quarantine system and execute malicious JavaScript code. The issue was discovered by Italian security researcher Filippo Cavallarin, of security firm Segment, w…

Read More

02/10/2017

Newsletter:

True story: What happens when your phone is stolen (video) !

Film student Anthony van der Meer decided to find out what happens to stolen telephones and the data on them.   He created a 20-minute documentary …

How to remove Tech Support Scam Popups in your Browser !

What is Tech Support Scam Popups? A Tech Support Scam browser popup is when your browser displays an advertisement that pretends to be from Microsoft, …

Remove the Floxif CCleaner Trojan

What is Floxif CCleaner Trojan? Floxif is the detection for a Trojan that was bundled with a hacked version of CCleaner. Downloads of the 32-bit versio…

CCleaner Malware Incident - What You Need to Know and How to Remove

This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CClean…

Remove the Microsoft Windows Product Key Tech Support Scam

What is Microsoft Windows Product Key Tech Support Scam? The Microsoft Windows Product Key Tech Support Scam is a Trojan.Tech-Support-Scam that display…

Remove the Your Computer May Have a Virus Web Page !

What is Your Computer May Have a Virus Web Page? The Your Computer May Have a Virus Scam Popup is a web browser advertisement shown by affiliates promo…

Remove the "Novo Optimizer GPU Miner"

What is Novo Optimizer GPU Miner? The Novo Optimizer GPU Miner is a Trojan that utilizes a victim's GPU, or Graphic Processing Unit, to mine digita…

Remove the Your Windows computer is at High Risk Popup !

What is Your Windows computer is at High Risk Popup? The Your Windows computer is at High Risk Popup is a web browser advertisement shown by scammy rem…

10 Tips to Prevent Phishing Attacks

Have you ever considered that you could be a target for phishing attacks? It’s not a new issue, but it’s a rising threat. Phishing attacker…

How to remove the Windows Security Warning Popup Scam !

What is Windows Security Warning Popup Scam ? The Windows Security Warning Scam Popup is a web browser advertisement shown by scammy remote tech suppor…

Remove the Oneway Hosts File Modifying Trojan !

What is Oneway Hosts File Modifying Trojan? OneWay is a Trojan that modifies the Windows HOSTS file so that the computer is not able to reach various a…

Remove the Your Windows is infected Popup Scam !

What is Your Windows is infected Popup? The Your Windows is infected Popup is a browser based tech support scam that tries to scare visitors into think…

Remove the WindowService Trojan !

What is WindowService Trojan? The WindowService Trojan is malware program that is commonly installed by adware bundles that you download from the Inter…

The best free parental control software 2017 !

Keep your children safe online with the best free parental control software for Windows. It's hard to imagine anything less child-friendly than an …

Remove The publisher has been blocked from running software Alert ?!

What is The publisher has been blocked from running software Alert? If you are receiving errors when you try to install or run a security program that …

How to Remove Smart Registry Care ?

What is Smart Registry Care? Smart Registry Cleaner is a Registry cleaner that scans for a variety of categories that include ActiveX/COM, System Softw…

How to remove the WannaCry and Wana Decryptor Ransomware !

This section will provide a brief tutorial on how to remove WannaCry/Wana Decryptor using MalwareBytes and Emsisoft. While both can remove this infectio…

Remove the Photo.scr Monero Miner

What is Photo.scr Monero Miner? The Photo.scr Miner is a Trojan that utilizes a victim's computer processing power to mine the digital currency cal…

How to remove Fake Java Update PopUps !

What is Fake Java Update PopUp? The Fake Java Update PopUp is a web browser advertisement shown by scammers that are trying to trick you into downloadi…

Remove the "FilePlus" Potentially Unwanted Program

What is FilePlus? FilePlus is a program that allows you to download copyrighted movies, tv shows, and programs for free. What it does not tell you, tho…

Remove the MaohaWiFi Program (Uninstall Guide)

MaohaWiFi is a potentially unwanted program that is commonly bundled with free programs that you download from the Internet. This programs allows your c…

Remove AdBlocker for YouTube !

What is AdBlocker for Youtube? AdBlocker for Youtube is a potentially unwanted Google Chrome extension that states that it blocks advertisements shown …

"CryptorBit" and "HowDecrypt" Information Guide and FAQ

Table of Contents: How to get help with CryptorBit What is CryptorBit or the HowDecrypt Ransomware How to recover files encrypted by CryptorBit Ho…

How to remove Unwanted Chromium Browsers ?!

What is Chromium Browser? Chromium is a open source web browser created by Google, which Google Chrome is based on. As Chromium is open source, it can …

Remove the MSSecTeam Tech Support Scam (Removal Guide)

What is MSSecTeam Tech Support Scam? The MSSecTeam Tech Support Scam is a Trojan.Tech-Support-Scam that displays a lock screen pretending to be from Mi…

This PC Has Been Blocked Screenlocker Removal Guide !!

What is This PC Has Been Blocked Screenlocker? The This PC Has Been Blocked screen locker is a Trojan that displays a fake security screen stating that…

How to use SUPERAntiSpyware to scan and remove malware from your computer !

With viruses, worms, Trojans, and malware becoming more and more pervasive in every computer users life, it is important to have an arsenal of tools tha…

PacketTotal - A Useful Site for Analyzing PCAP Files

If you are InfoSec professional who commonly deals with intrusion detection and response or malware analysis, a new site called PacketTotal may make you…

Locky Ransomware Information, Help Guide, and FAQ!

What is the Locky Ransomware? Locky is a Windows ransomware infection that was released in the middle of February 2016. This ransomware infection will a…

Remove the BrowserMe.exe or Chrome_Font.exe Fleercivet Ad Clicker Trojan !

The "BrowserMe" or "Chrome_Font.exe" Trojan is a computer infection that only targets users of the Chrome browser. When running it w…

Top tips for protecting your Android from malware !

With the largest installed base of all operating systems, Android has certainly taken the mobile world by storm, and as the active user stats show, Andr…

How to tell if your Snapchat has been hacked, and how to get it back !

What to look out for, and what to do about it! Snapchat is one of the most popular messaging services available today. As of June 2016, more than 150 …

Padlock Screen Locker Removal Guide

The Padlock Screen locker is a Trojan that displays a picture of a locked door with a message stating that the victim's files have been deleted and …

How to Remove Antivirus 10 (Removal Guide)

Antivirus 10 is a scareware program that pretends to an anti-virus program, but in reality is just a Trojan trying to scare you into purchasing it. This…

CryptorBit and HowDecrypt Information Guide and FAQ

CryptorBit and HowDecrypt Information Guide and FAQ

CryptoLocker Ransomware Information Guide and FAQ

Info: The original CryptoLocker infection was disabled on June 2nd, 2014 when Operation Gameover took down its distribution network. Since then there ha…

How to Protect and Harden a Computer against Ransomware ?!

2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. With even the smaller ransom…

Using Wireless Technology Securely

In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great number…

PGP KEY MANUAL

PGP KEY MANUAL

Symantec Kovter Removal Tool

The Symantec Kovter Removal Tool can be used to remove the Kovter infection from your computer.  The Kovter infection is a Click Fraud Trojan as it…

Malwarebytes Anti-Exploit 1.10.1.41

Malwarebytes Anti-Exploit is a security program that protects you from zero-day exploits that target browser and application vulnerabilities. This progr…

Sophos Home

"Sophos Home" is a free Internet security product that protects Windows and Mac computers from malware and malicious web sites. Sophos Home ca…

WinPatrol

WinPatrol is a free security utility that allows you to get a closer look under the hood of Windows so that you can detect programs that should not be r…

PowerLockyDecrypter

"PowerLocky Decrypter" is a free decryption program created by Michael Gillespie for the PowerWare Locky Ransomware. Using this decryptor a vi…

Process Monitor (ProcMon)

Process Monitor, or ProcMon, is an advanced monitoring tool that allows you to see in real-time the file system, registry, and process activity occuring…

BTCWareDecrypter Download !

BTCWareDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the BTCWare ransomware. Using this decryptor, v…

RansomFree Download !

Cyberreason's RansomFree is a ransomware protection program that silently runs in the background looking for ransomware activity on a computer. If a…

"Malwarebytes Anti-Ransomware 0.9.18.807" Download !

Malwarebytes Anti-Ransomware Beta is a program that protects your computer from file encrypting ransomware programs.  This programs quietly sits in…

StrikedDecrypter

StrikedDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the Striked Ransomware. Using this de…

Mole02 Decryptor Download !

Mole02 Decryptor is a program that allows victims who have been encrypted the Mole02 Ransomware to recovery their files for free. This decryptor is very…

DCryDecrypter 1.0.0.1 Download !

DCryDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the DCry Ransomware. Using this decryptor, victims…

PC Hunter 1.51 Download

"PC Hunter" is a very powerful security utility that allows great insight into the inner workings of Windows. It is especially useful when you…

Farbar Recovery Scan Tool Download

Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mo…

AVCertClean 0.3 Download

A recent infection blocks the launch of several security software by setting their code signing certificate as untrusted. This software will search for…

VIPRE Advance Security for Home Download !

COMPANY'S DESCRIPTION: With today’s online threats, you can’t afford to settle for anything but the best. The top-rated, award-winning …

Glasswire 1.2.3100.0 Download

GlassWire is a free network monitoring tool that displays and alerts you about the network traffic originating from your computer.  This allows you…

StupidDecryptor Download

StupidDecryptor is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by various ransomware infections that are based off…

AVG Remover Download

AVG Remover allows you to completely uninstall detected AVG products from your computer.  Unfortunately, there are times when the traditional metho…

RakhniDecryptor Ransomware Decryptor Download !

RakhniDecryptor is a general purpose ransomware decryptor created by Kaspersky Labs. Instead of creating a separate decryptor for each ransomware infect…

Zemana AntiMalware Download

Zemana AntiMalware is a second opinion cloud based malware scanner that allows you to perform on demand scanning as necessary. Zemana AntiMalware does n…

RogueKillerCMD Download

RogueKillerCMD is the command line version of the RogueKiller anti-malware program and security utility. This program is designed to be used by power us…

RogueKiller Download

RogueKiller is a security tool that can be used to terminate and remove malicious processes and programs from your computer.  RogueKiller has the a…

CryptoSearch Download

CryptoSearch is a utility created by Michael Gillespie that allows you to clean up your computer of encrypted files and ransom notes from a ransomware i…

CryptON Ransomware Decryptor Download

If you are infected with the CryptON Ransomware, then you are in luck. Emsisoft was able to figure out a way to decrypt files encrypted by this ransomwa…

SUPERAntiSpyware Download

SUPERAntiSpyware is a free anti-spyware program that offers excellent detections and quick removal of common infections. As malware is constantly evolvi…

Junkware Removal Tool 8.1.0.0 Download

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your co…

Windows Repair (All In One) 3.9.25 Download

Windows Repair is a utility that contains numerous mini-fixes for Windows.  This tool will allow you to repair common issues with your computer suc…

Heimdal Free Download

Heimdal Free is a program that scans your computer for outdated and possibly vulnerable programs and automatically updates them to the latest version fo…

EMSISOFT HIJACKFREE

Emsisoft HiJackFree is a simple tool that allows detection of malicious activity and allows the user to stop them. Using tools is possible to get an ins…

Malwarebytes Anti-Malware

Malwarebytes' is an important security program for any computer user to have installed on their computer. It is light-weight, fast, and best of all,…

RKill

RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software c…

BitStakDecrypter Download

BitStak Decrypter is a free decryption program created by Michael Gillespie for the BitStak Ransomware. Using this decryptor a victim of the BitStak Ran…

HEIMDAL FREE

FREE HEIMDAL security software tool applied in 20 most used software applications in the world. Performs these functions: Scans your computer every 2…

ComboFix

ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In…

AdwCleaner

AdwCleaner is a program that searches for and deletes Adware, Toolbars, Potentially Unwanted Programs (PUP), and browser Hijackers from your computer. &…

Newsletter:

Mission

National Unit “KOS-CERT” will have a key role in maintaining the networks security and electronic communications services of the Republic of Kosovo. The purpose and mission is to help the community to cope effectively with the challenges of cyber security, coordination of actions in order to solve cyber security incidents and effectively prevent them.

Community

“KOS-CERT” community includes all operators that are authorized / licensed by the Regulatory Authority of Electronic and Postal Communications (TRA) to provide networks and electronic communications services and the consumers who use these networks and / or services in the Republic of Kosovo.