Home | Kos-Cert
  • slider-img
  • slider-img
  • slider-img

Latest News

Researchers Identify 44 Trackers in More Than 300 Android Apps !

A collaborative effort between the Yale Privacy Lab and Exodus Privacy has shed light on dozens of invasive trackers that are embedded within Android applications and record user activity, sometimes without user consent. The results of this study, published last week, come to show that the practice of collec…

Read More

29/11/2017

Acer, Dell, Fujitsu, HP, Lenovo, Panasonic Impacted by Intel ME Security Bugs !

Acer, Dell, Fujitsu, HP, Lenovo, and Panasonic have officially confirmed that products incorporating Intel chipsets are affected by eight security flaws that allow hackers to take over devices. Intel published details about these flaws in a security advisory, on Monday. The eight bugs affected core Intel CPU…

Read More

29/11/2017

macOS High Sierra Bug Lets Anyone Gain Root Access Without a Password !

If you own a Mac computer and run the latest version of Apple's operating system, macOS High Sierra, then you need to be extra careful with your computer. A serious, yet stupid vulnerability has been discovered in macOS High Sierra that allows untrusted users to quickly gain unfettered administrative (or…

Read More

29/11/2017

Another Facebook Bug Allowed Anyone to Delete Your Photos !

If you think a website whose value is more than $500 billion does not have any vulnerability in it, then you are wrong. Pouya Darabi, an Iranian web developer, discovered and reported a critical yet straightforward vulnerability in Facebook earlier this month that could have allowed anyone to delete any phot…

Read More

29/11/2017

Google Detects Android Spyware That Spies On WhatsApp, Skype Calls !

In an attempt to protect Android users from malware and shady apps, Google has been continuously working to detect and remove malicious apps from your devices using its newly launched Google Play Protect service. Google Play Protect—a security feature that uses machine learning and app usage analysis t…

Read More

29/11/2017

Scarab Ransomware Pushed via Massive Spam Campaign !

A ransomware strain known as Scarab, and detected for the first time in June, is now being pushed to millions of users via Necurs, the Internet's largest email spam botnet. The spam campaign started in the early hours of the morning (EU timezones) and has been spotted by all security researchers not busy…

Read More

24/11/2017

Newsletter:

Remove the Mingc.exe CPU Miner !

What is Mingc.exe CPU Miner?  The Mingc.exe Miner is a Trojan that utilizes a victim's computer resources to mine for digital currency. When i…

Remove the YoutubeAdBlock PUP !

What is YoutubeAdBlock PUP? YoutubeAdBlock is a potentially unwanted program, or PUP, that is installed by adware bundles. When installed, this program…

Remove the Tweakerbit Antimalware !

What is Tweakerbit Antimalware ? Tweakerbit Antimalware is a potentially unwanted security program that can be installed via adware bundles. This progr…

How to remove Antivirus 360 (Uninstall Instructions) !

What is Antivirus 360? Antivirus 360 is a rogue anti-spyware program that uses false scan results and aggressive advertising in order to promote itself…

Remove the YourClassifiedsNow Ad Clicking Trojan !

What is YourClassifiedsNow Ad Clicking Trojan? YourClassifiedsNow is a ad clicking Trojan that runs silently in the background on your computer while c…

Some Bad Rabbit Victims Can Recover Files Without Paying Ransom !

Some extremely lucky users will be able to recover files locked by the Bad Rabbit ransomware because of small operational mistakes on the part of the ma…

'Krack' Wi-Fi guidance

What is Krack? Most Wi-Fi networks are configured to encrypt traffic between client devices and access points, so that someone outside the network cann…

True story: What happens when your phone is stolen (video) !

Film student Anthony van der Meer decided to find out what happens to stolen telephones and the data on them.   He created a 20-minute documentary …

How to remove Tech Support Scam Popups in your Browser !

What is Tech Support Scam Popups? A Tech Support Scam browser popup is when your browser displays an advertisement that pretends to be from Microsoft, …

Remove the Floxif CCleaner Trojan

What is Floxif CCleaner Trojan? Floxif is the detection for a Trojan that was bundled with a hacked version of CCleaner. Downloads of the 32-bit versio…

CCleaner Malware Incident - What You Need to Know and How to Remove

This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CClean…

Remove the Microsoft Windows Product Key Tech Support Scam

What is Microsoft Windows Product Key Tech Support Scam? The Microsoft Windows Product Key Tech Support Scam is a Trojan.Tech-Support-Scam that display…

Remove the Your Computer May Have a Virus Web Page !

What is Your Computer May Have a Virus Web Page? The Your Computer May Have a Virus Scam Popup is a web browser advertisement shown by affiliates promo…

Remove the "Novo Optimizer GPU Miner"

What is Novo Optimizer GPU Miner? The Novo Optimizer GPU Miner is a Trojan that utilizes a victim's GPU, or Graphic Processing Unit, to mine digita…

Remove the Your Windows computer is at High Risk Popup !

What is Your Windows computer is at High Risk Popup? The Your Windows computer is at High Risk Popup is a web browser advertisement shown by scammy rem…

10 Tips to Prevent Phishing Attacks

Have you ever considered that you could be a target for phishing attacks? It’s not a new issue, but it’s a rising threat. Phishing attacker…

How to remove the Windows Security Warning Popup Scam !

What is Windows Security Warning Popup Scam ? The Windows Security Warning Scam Popup is a web browser advertisement shown by scammy remote tech suppor…

Remove the Oneway Hosts File Modifying Trojan !

What is Oneway Hosts File Modifying Trojan? OneWay is a Trojan that modifies the Windows HOSTS file so that the computer is not able to reach various a…

Remove the Your Windows is infected Popup Scam !

What is Your Windows is infected Popup? The Your Windows is infected Popup is a browser based tech support scam that tries to scare visitors into think…

Remove the WindowService Trojan !

What is WindowService Trojan? The WindowService Trojan is malware program that is commonly installed by adware bundles that you download from the Inter…

The best free parental control software 2017 !

Keep your children safe online with the best free parental control software for Windows. It's hard to imagine anything less child-friendly than an …

Remove The publisher has been blocked from running software Alert ?!

What is The publisher has been blocked from running software Alert? If you are receiving errors when you try to install or run a security program that …

How to Remove Smart Registry Care ?

What is Smart Registry Care? Smart Registry Cleaner is a Registry cleaner that scans for a variety of categories that include ActiveX/COM, System Softw…

How to remove the WannaCry and Wana Decryptor Ransomware !

This section will provide a brief tutorial on how to remove WannaCry/Wana Decryptor using MalwareBytes and Emsisoft. While both can remove this infectio…

Remove the Photo.scr Monero Miner

What is Photo.scr Monero Miner? The Photo.scr Miner is a Trojan that utilizes a victim's computer processing power to mine the digital currency cal…

How to remove Fake Java Update PopUps !

What is Fake Java Update PopUp? The Fake Java Update PopUp is a web browser advertisement shown by scammers that are trying to trick you into downloadi…

Remove the "FilePlus" Potentially Unwanted Program

What is FilePlus? FilePlus is a program that allows you to download copyrighted movies, tv shows, and programs for free. What it does not tell you, tho…

Remove the MaohaWiFi Program (Uninstall Guide)

MaohaWiFi is a potentially unwanted program that is commonly bundled with free programs that you download from the Internet. This programs allows your c…

Remove AdBlocker for YouTube !

What is AdBlocker for Youtube? AdBlocker for Youtube is a potentially unwanted Google Chrome extension that states that it blocks advertisements shown …

"CryptorBit" and "HowDecrypt" Information Guide and FAQ

Table of Contents: How to get help with CryptorBit What is CryptorBit or the HowDecrypt Ransomware How to recover files encrypted by CryptorBit Ho…

How to remove Unwanted Chromium Browsers ?!

What is Chromium Browser? Chromium is a open source web browser created by Google, which Google Chrome is based on. As Chromium is open source, it can …

Remove the MSSecTeam Tech Support Scam (Removal Guide)

What is MSSecTeam Tech Support Scam? The MSSecTeam Tech Support Scam is a Trojan.Tech-Support-Scam that displays a lock screen pretending to be from Mi…

This PC Has Been Blocked Screenlocker Removal Guide !!

What is This PC Has Been Blocked Screenlocker? The This PC Has Been Blocked screen locker is a Trojan that displays a fake security screen stating that…

How to use SUPERAntiSpyware to scan and remove malware from your computer !

With viruses, worms, Trojans, and malware becoming more and more pervasive in every computer users life, it is important to have an arsenal of tools tha…

PacketTotal - A Useful Site for Analyzing PCAP Files

If you are InfoSec professional who commonly deals with intrusion detection and response or malware analysis, a new site called PacketTotal may make you…

Locky Ransomware Information, Help Guide, and FAQ!

What is the Locky Ransomware? Locky is a Windows ransomware infection that was released in the middle of February 2016. This ransomware infection will a…

Remove the BrowserMe.exe or Chrome_Font.exe Fleercivet Ad Clicker Trojan !

The "BrowserMe" or "Chrome_Font.exe" Trojan is a computer infection that only targets users of the Chrome browser. When running it w…

Top tips for protecting your Android from malware !

With the largest installed base of all operating systems, Android has certainly taken the mobile world by storm, and as the active user stats show, Andr…

How to tell if your Snapchat has been hacked, and how to get it back !

What to look out for, and what to do about it! Snapchat is one of the most popular messaging services available today. As of June 2016, more than 150 …

Padlock Screen Locker Removal Guide

The Padlock Screen locker is a Trojan that displays a picture of a locked door with a message stating that the victim's files have been deleted and …

How to Remove Antivirus 10 (Removal Guide)

Antivirus 10 is a scareware program that pretends to an anti-virus program, but in reality is just a Trojan trying to scare you into purchasing it. This…

CryptorBit and HowDecrypt Information Guide and FAQ

CryptorBit and HowDecrypt Information Guide and FAQ

CryptoLocker Ransomware Information Guide and FAQ

Info: The original CryptoLocker infection was disabled on June 2nd, 2014 when Operation Gameover took down its distribution network. Since then there ha…

How to Protect and Harden a Computer against Ransomware ?!

2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. With even the smaller ransom…

Using Wireless Technology Securely

In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great number…

PGP KEY MANUAL

PGP KEY MANUAL

Offline CryptoMix Ransomware Decryptor

Avast released a decryptor for CryptoMix victim's that were encrypted while in offline mode. Offline mode is when the ransomware runs and encrypts a…

UCheck

UCheck is a free program that allows you to scan a computer for outdated programs and automatically update them to the latest version.  UCheck also…

VT Hash Check 1.60

"VT Hash check" adds a context menu item for all files allowing you to quickly search VirusTotal.com for matching files and their correspondin…

Shortcut Cleaner 1.4.9.0

Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software.  When S…

GIBON Ransomware Decryptor

"GibonDecryptor" is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the GIBON Ransomware. Using this decr…

RansomNoteCleaner !

Ransom Note Cleaner is a program that can be used to scan a ransomware victim's computer for left over ransom notes and elete them. When someone is …

Chrome Cleanup Tool

The Chrome Cleanup Tool is a program written by Google that will scan a computer for programs that cause problems in Google Chrome. The targeted applica…

Symantec Kovter Removal Tool

The Symantec Kovter Removal Tool can be used to remove the Kovter infection from your computer.  The Kovter infection is a Click Fraud Trojan as it…

Malwarebytes Anti-Exploit 1.10.1.41

Malwarebytes Anti-Exploit is a security program that protects you from zero-day exploits that target browser and application vulnerabilities. This progr…

Sophos Home

"Sophos Home" is a free Internet security product that protects Windows and Mac computers from malware and malicious web sites. Sophos Home ca…

WinPatrol

WinPatrol is a free security utility that allows you to get a closer look under the hood of Windows so that you can detect programs that should not be r…

PowerLockyDecrypter

"PowerLocky Decrypter" is a free decryption program created by Michael Gillespie for the PowerWare Locky Ransomware. Using this decryptor a vi…

Process Monitor (ProcMon)

Process Monitor, or ProcMon, is an advanced monitoring tool that allows you to see in real-time the file system, registry, and process activity occuring…

BTCWareDecrypter Download !

BTCWareDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the BTCWare ransomware. Using this decryptor, v…

RansomFree Download !

Cyberreason's RansomFree is a ransomware protection program that silently runs in the background looking for ransomware activity on a computer. If a…

"Malwarebytes Anti-Ransomware 0.9.18.807" Download !

Malwarebytes Anti-Ransomware Beta is a program that protects your computer from file encrypting ransomware programs.  This programs quietly sits in…

StrikedDecrypter

StrikedDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the Striked Ransomware. Using this de…

Mole02 Decryptor Download !

Mole02 Decryptor is a program that allows victims who have been encrypted the Mole02 Ransomware to recovery their files for free. This decryptor is very…

DCryDecrypter 1.0.0.1 Download !

DCryDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the DCry Ransomware. Using this decryptor, victims…

PC Hunter 1.51 Download

"PC Hunter" is a very powerful security utility that allows great insight into the inner workings of Windows. It is especially useful when you…

Farbar Recovery Scan Tool Download

Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mo…

AVCertClean 0.3 Download

A recent infection blocks the launch of several security software by setting their code signing certificate as untrusted. This software will search for…

VIPRE Advance Security for Home Download !

COMPANY'S DESCRIPTION: With today’s online threats, you can’t afford to settle for anything but the best. The top-rated, award-winning …

Glasswire 1.2.3100.0 Download

GlassWire is a free network monitoring tool that displays and alerts you about the network traffic originating from your computer.  This allows you…

StupidDecryptor Download

StupidDecryptor is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by various ransomware infections that are based off…

AVG Remover Download

AVG Remover allows you to completely uninstall detected AVG products from your computer.  Unfortunately, there are times when the traditional metho…

RakhniDecryptor Ransomware Decryptor Download !

RakhniDecryptor is a general purpose ransomware decryptor created by Kaspersky Labs. Instead of creating a separate decryptor for each ransomware infect…

Zemana AntiMalware Download

Zemana AntiMalware is a second opinion cloud based malware scanner that allows you to perform on demand scanning as necessary. Zemana AntiMalware does n…

RogueKillerCMD Download

RogueKillerCMD is the command line version of the RogueKiller anti-malware program and security utility. This program is designed to be used by power us…

RogueKiller Download

RogueKiller is a security tool that can be used to terminate and remove malicious processes and programs from your computer.  RogueKiller has the a…

CryptoSearch Download

CryptoSearch is a utility created by Michael Gillespie that allows you to clean up your computer of encrypted files and ransom notes from a ransomware i…

CryptON Ransomware Decryptor Download

If you are infected with the CryptON Ransomware, then you are in luck. Emsisoft was able to figure out a way to decrypt files encrypted by this ransomwa…

SUPERAntiSpyware Download

SUPERAntiSpyware is a free anti-spyware program that offers excellent detections and quick removal of common infections. As malware is constantly evolvi…

Junkware Removal Tool 8.1.0.0 Download

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your co…

Windows Repair (All In One) 3.9.25 Download

Windows Repair is a utility that contains numerous mini-fixes for Windows.  This tool will allow you to repair common issues with your computer suc…

Heimdal Free Download

Heimdal Free is a program that scans your computer for outdated and possibly vulnerable programs and automatically updates them to the latest version fo…

EMSISOFT HIJACKFREE

Emsisoft HiJackFree is a simple tool that allows detection of malicious activity and allows the user to stop them. Using tools is possible to get an ins…

Malwarebytes Anti-Malware

Malwarebytes' is an important security program for any computer user to have installed on their computer. It is light-weight, fast, and best of all,…

RKill

RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software c…

BitStakDecrypter Download

BitStak Decrypter is a free decryption program created by Michael Gillespie for the BitStak Ransomware. Using this decryptor a victim of the BitStak Ran…

HEIMDAL FREE

FREE HEIMDAL security software tool applied in 20 most used software applications in the world. Performs these functions: Scans your computer every 2…

ComboFix

ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In…

AdwCleaner

AdwCleaner is a program that searches for and deletes Adware, Toolbars, Potentially Unwanted Programs (PUP), and browser Hijackers from your computer. &…

Newsletter:

Mission

National Unit “KOS-CERT” will have a key role in maintaining the networks security and electronic communications services of the Republic of Kosovo. The purpose and mission is to help the community to cope effectively with the challenges of cyber security, coordination of actions in order to solve cyber security incidents and effectively prevent them.

Community

“KOS-CERT” community includes all operators that are authorized / licensed by the Regulatory Authority of Electronic and Postal Communications (TRA) to provide networks and electronic communications services and the consumers who use these networks and / or services in the Republic of Kosovo.