Home | Kos-Cert
  • slider-img
  • slider-img
  • slider-img

Latest News

img6

Microsoft's June Patch Tuesday Fixes Two Vulnerabilities Used in Live Attacks !

Microsoft published today the June 2017 Patch Tuesday, which patches over 90 security flaws, including two vulnerabilities used in live attacks. Windows Search Remote Code Execution Vulnerability: The first of these vulnerabilities is tracked as CVE-2017-8543.  LNK Remote Code Execution Vulnerabili…

Read More

16/06/2017

img6

Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls !

Microsoft's security team has come across a malware family that uses Intel's Active Management Technology (AMT) Serial-over-LAN (SOL) interface as a file transfer tool. Because of the way the Intel AMT SOL technology works, SOL traffic bypasses the local computer's networking stack, so local fire…

Read More

09/06/2017

img6

No Known Ransomware Works Against Windows 10 S !

No currently known ransomware strain can infect Windows 10 S, said Microsoft today with the release of a new report detailing the next-get ransomware protection features the company introduced with the release of the Windows 10 Creators Update last month. Microsoft's statement is technically accurate bec…

Read More

09/06/2017

img6

CertLock Trojan Blocks Security Programs by Disallowing Their Certificates !

A new trend in adware and unwanted program purveyors is to install protection software that makes it more difficult for Windows users to run their security programs and clean infections. This was seen with the SmartService rootkit that blocked AV software from running and now with a protection program being c…

Read More

09/06/2017

img6

Android Smartphones Targeted by WannaCry Lookalike !

Crooks in China have developed an Android ransomware that uses similar graphics to the WannaCry ransom note in an attempt to scare and trick users into quickly paying the ransom. Spotted by Qihoo 360 researchers, crooks are spreading this ransomware via Chinese gaming forums. The malicious app containing the…

Read More

09/06/2017

img6

Backend Servers for 1,000 Apps Expose Terabytes of User Data !

There are 1,000 apps available for download today that despite not containing any malware or featuring glaring vulnerabilities, they communicate and store data on improperly secured backend servers, exposing user data along the way. This is the conclusion of an investigation conducted by mobile security expe…

Read More

06/06/2017

The best free parental control software 2017 !

Keep your children safe online with the best free parental control software for Windows. It's hard to imagine anything less child-friendly than an …

Remove The publisher has been blocked from running software Alert ?!

What is The publisher has been blocked from running software Alert? If you are receiving errors when you try to install or run a security program that …

How to Remove Smart Registry Care ?

What is Smart Registry Care? Smart Registry Cleaner is a Registry cleaner that scans for a variety of categories that include ActiveX/COM, System Softw…

How to remove the WannaCry and Wana Decryptor Ransomware !

This section will provide a brief tutorial on how to remove WannaCry/Wana Decryptor using MalwareBytes and Emsisoft. While both can remove this infectio…

Remove the Photo.scr Monero Miner

What is Photo.scr Monero Miner? The Photo.scr Miner is a Trojan that utilizes a victim's computer processing power to mine the digital currency cal…

How to remove Fake Java Update PopUps !

What is Fake Java Update PopUp? The Fake Java Update PopUp is a web browser advertisement shown by scammers that are trying to trick you into downloadi…

Remove the "FilePlus" Potentially Unwanted Program

What is FilePlus? FilePlus is a program that allows you to download copyrighted movies, tv shows, and programs for free. What it does not tell you, tho…

Remove the MaohaWiFi Program (Uninstall Guide)

MaohaWiFi is a potentially unwanted program that is commonly bundled with free programs that you download from the Internet. This programs allows your c…

Remove AdBlocker for YouTube !

What is AdBlocker for Youtube? AdBlocker for Youtube is a potentially unwanted Google Chrome extension that states that it blocks advertisements shown …

"CryptorBit" and "HowDecrypt" Information Guide and FAQ

Table of Contents: How to get help with CryptorBit What is CryptorBit or the HowDecrypt Ransomware How to recover files encrypted by CryptorBit Ho…

How to remove Unwanted Chromium Browsers ?!

What is Chromium Browser? Chromium is a open source web browser created by Google, which Google Chrome is based on. As Chromium is open source, it can …

Remove the MSSecTeam Tech Support Scam (Removal Guide)

What is MSSecTeam Tech Support Scam? The MSSecTeam Tech Support Scam is a Trojan.Tech-Support-Scam that displays a lock screen pretending to be from Mi…

This PC Has Been Blocked Screenlocker Removal Guide !!

What is This PC Has Been Blocked Screenlocker? The This PC Has Been Blocked screen locker is a Trojan that displays a fake security screen stating that…

How to use SUPERAntiSpyware to scan and remove malware from your computer !

With viruses, worms, Trojans, and malware becoming more and more pervasive in every computer users life, it is important to have an arsenal of tools tha…

PacketTotal - A Useful Site for Analyzing PCAP Files

If you are InfoSec professional who commonly deals with intrusion detection and response or malware analysis, a new site called PacketTotal may make you…

Locky Ransomware Information, Help Guide, and FAQ!

What is the Locky Ransomware? Locky is a Windows ransomware infection that was released in the middle of February 2016. This ransomware infection will a…

Remove the BrowserMe.exe or Chrome_Font.exe Fleercivet Ad Clicker Trojan !

The "BrowserMe" or "Chrome_Font.exe" Trojan is a computer infection that only targets users of the Chrome browser. When running it w…

Top tips for protecting your Android from malware !

With the largest installed base of all operating systems, Android has certainly taken the mobile world by storm, and as the active user stats show, Andr…

How to tell if your Snapchat has been hacked, and how to get it back !

What to look out for, and what to do about it! Snapchat is one of the most popular messaging services available today. As of June 2016, more than 150 …

Padlock Screen Locker Removal Guide

The Padlock Screen locker is a Trojan that displays a picture of a locked door with a message stating that the victim's files have been deleted and …

How to Remove Antivirus 10 (Removal Guide)

Antivirus 10 is a scareware program that pretends to an anti-virus program, but in reality is just a Trojan trying to scare you into purchasing it. This…

CryptorBit and HowDecrypt Information Guide and FAQ

CryptorBit and HowDecrypt Information Guide and FAQ

CryptoLocker Ransomware Information Guide and FAQ

Info: The original CryptoLocker infection was disabled on June 2nd, 2014 when Operation Gameover took down its distribution network. Since then there ha…

How to Protect and Harden a Computer against Ransomware ?!

2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. With even the smaller ransom…

Using Wireless Technology Securely

In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great number…

PGP KEY MANUAL

PGP KEY MANUAL

Farbar Recovery Scan Tool Download

Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mo…

AVCertClean 0.3 Download

A recent infection blocks the launch of several security software by setting their code signing certificate as untrusted. This software will search for…

VIPRE Advance Security for Home Download !

COMPANY'S DESCRIPTION: With today’s online threats, you can’t afford to settle for anything but the best. The top-rated, award-winning …

Glasswire 1.2.3100.0 Download

GlassWire is a free network monitoring tool that displays and alerts you about the network traffic originating from your computer.  This allows you…

StupidDecryptor Download

StupidDecryptor is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by various ransomware infections that are based off…

AVG Remover Download

AVG Remover allows you to completely uninstall detected AVG products from your computer.  Unfortunately, there are times when the traditional metho…

RakhniDecryptor Ransomware Decryptor Download !

RakhniDecryptor is a general purpose ransomware decryptor created by Kaspersky Labs. Instead of creating a separate decryptor for each ransomware infect…

Zemana AntiMalware Download

Zemana AntiMalware is a second opinion cloud based malware scanner that allows you to perform on demand scanning as necessary. Zemana AntiMalware does n…

RogueKillerCMD Download

RogueKillerCMD is the command line version of the RogueKiller anti-malware program and security utility. This program is designed to be used by power us…

RogueKiller Download

RogueKiller is a security tool that can be used to terminate and remove malicious processes and programs from your computer.  RogueKiller has the a…

CryptoSearch Download

CryptoSearch is a utility created by Michael Gillespie that allows you to clean up your computer of encrypted files and ransom notes from a ransomware i…

CryptON Ransomware Decryptor Download

If you are infected with the CryptON Ransomware, then you are in luck. Emsisoft was able to figure out a way to decrypt files encrypted by this ransomwa…

SUPERAntiSpyware Download

SUPERAntiSpyware is a free anti-spyware program that offers excellent detections and quick removal of common infections. As malware is constantly evolvi…

Junkware Removal Tool 8.1.0.0 Download

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your co…

Windows Repair (All In One) 3.9.25 Download

Windows Repair is a utility that contains numerous mini-fixes for Windows.  This tool will allow you to repair common issues with your computer suc…

Heimdal Free Download

Heimdal Free is a program that scans your computer for outdated and possibly vulnerable programs and automatically updates them to the latest version fo…

EMSISOFT HIJACKFREE

Emsisoft HiJackFree is a simple tool that allows detection of malicious activity and allows the user to stop them. Using tools is possible to get an ins…

Malwarebytes Anti-Malware

Malwarebytes' is an important security program for any computer user to have installed on their computer. It is light-weight, fast, and best of all,…

RKill

RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software c…

BitStakDecrypter Download

BitStak Decrypter is a free decryption program created by Michael Gillespie for the BitStak Ransomware. Using this decryptor a victim of the BitStak Ran…

HEIMDAL FREE

FREE HEIMDAL security software tool applied in 20 most used software applications in the world. Performs these functions: Scans your computer every 2…

ComboFix

ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In…

AdwCleaner

AdwCleaner is a program that searches for and deletes Adware, Toolbars, Potentially Unwanted Programs (PUP), and browser Hijackers from your computer. &…

Newsletter:

Mission

National Unit “KOS-CERT” will have a key role in maintaining the networks security and electronic communications services of the Republic of Kosovo. The purpose and mission is to help the community to cope effectively with the challenges of cyber security, coordination of actions in order to solve cyber security incidents and effectively prevent them.

Community

“KOS-CERT” community includes all operators that are authorized / licensed by the Regulatory Authority of Electronic and Postal Communications (TRA) to provide networks and electronic communications services and the consumers who use these networks and / or services in the Republic of Kosovo.