Home | Kos-Cert
  • slider-img
  • slider-img
  • slider-img

Latest News

Microsoft Won't Patch a Severe Skype Vulnerability Anytime Soon !

A serious vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could potentially allow attackers to gain full control of the host machine by granting system-level privileges to a local, unprivileged user. The worst part is that this vulnera…

Read More

15/02/2018

Microsoft February Patch Tuesday Fixes 50 Security Issues !

Microsoft has released the February 2018 Patch Tuesday security updates, and this month's release comes with fixes for 50 vulnerabilities, along with additional patches for the Meltdown and Spectre vulnerabilities (ADV180002). As for Microsoft products, the company says this month's Patch Tuesday con…

Read More

15/02/2018

Intel Releases New Spectre Patch Update for Skylake Processors !

After leaving million of devices at risk of hacking and then rolling out broken patches, Intel has now released a new batch of security patches only for its Skylake processors to address one of the Spectre vulnerabilities (Variant 2). For those unaware, Spectre (Variant 1, Variant 2) and Meltdown (Variant 3)…

Read More

09/02/2018

World Police Take Down "Infraud" Carding Operation !

The US Department of Justice (DOJ) has charged 36 suspects for their role in Infraud, a cyber-criminal organization that has been involved in the acquisition, sale, and dissemination of stolen identities, stolen debit and credit card data, personally identifiable information (PII), financial and banking infor…

Read More

09/02/2018

Google Chrome to Mark All HTTP Sites "Not Secure" Starting July 2018 !

Google announced earlier today plans to mark all HTTP sites as "Not Secure" in Chrome, starting with July 2018, when the company plans to release Google Chrome 68. The company's decision comes after HTTPS adoption increased among website owners and a large chunk of today's traffic is now en…

Read More

09/02/2018

GandCrab Ransomware Being Distributed Via Malspam Disguised as Receipts !

A new malspam campaign is underway that is pretending to be PDF receipts, but instead installs the GandCrab ransomware on a victim's computer. This is done through a series of malicious documents that ultimately install the ransomware via a PowerShell script. The start of the chain of events that lead to…

Read More

09/02/2018

Newsletter:

Remove the Win an iPhone X Advertisement !

What is Win an iPhone X Advertisement? The "Win an iPhone X" page is an web browser advertisement that states you can win an iPhone X if you …

Remove the Video Control Adware Firefox Addon !

What is Video Control Adware Firefox Addon? Video Control is a Firefox addon that will display advertisements in search result pages and web sites that…

How to remove a Trojan.BitCoinMiner Miner Infection !

What is Trojan.BitCoinMiner? A Trojan.BitCoinMiner is a computer infection that silently runs on your computer while using your CPU or GPU resources to…

How to use Malwarebytes Anti-Malware to scan and remove malware from your computer !

As you may have noticed, MalwareBytes or MBAM, is used in a lot of our removal guides. We do this for no reason other than the fact that the program sim…

Remove the Deftesrg.exe Monero CPU Miner

What is Deftesrg.exe Monero CPU Miner? The Deftesrg.exe Miner is a Trojan that utilizes a victim's computer resources to mine for digital currency …

List of Meltdown and Spectre Vulnerability Advisories, Patches, & Updates !

Two new vulnerabilities called Meltdown and Spectre, or speculative execution side-channel vulnerabilities, have been discovered in modern processors th…

How to protect yourself from the FILE CryptoMix Ransomware !

In order to protect yourself from ransomware, it is important that you use good computing habits and security software. First and foremost, you should a…

Remove the RelevantKnowledge PUP !

What is RelevantKnowledge PUP? RelevantKnowledge is a potentially unwanted program that may displays advertisement and surveys to computer users. This …

How to protect yourself from the File Spider Ransomware

In order to protect yourself from ransomware, it is important that you use good computing habits and security software. First and foremost, you should a…

Remove the Mingc.exe CPU Miner !

What is Mingc.exe CPU Miner?  The Mingc.exe Miner is a Trojan that utilizes a victim's computer resources to mine for digital currency. When i…

Remove the YoutubeAdBlock PUP !

What is YoutubeAdBlock PUP? YoutubeAdBlock is a potentially unwanted program, or PUP, that is installed by adware bundles. When installed, this program…

Remove the Tweakerbit Antimalware !

What is Tweakerbit Antimalware ? Tweakerbit Antimalware is a potentially unwanted security program that can be installed via adware bundles. This progr…

How to remove Antivirus 360 (Uninstall Instructions) !

What is Antivirus 360? Antivirus 360 is a rogue anti-spyware program that uses false scan results and aggressive advertising in order to promote itself…

Remove the YourClassifiedsNow Ad Clicking Trojan !

What is YourClassifiedsNow Ad Clicking Trojan? YourClassifiedsNow is a ad clicking Trojan that runs silently in the background on your computer while c…

Some Bad Rabbit Victims Can Recover Files Without Paying Ransom !

Some extremely lucky users will be able to recover files locked by the Bad Rabbit ransomware because of small operational mistakes on the part of the ma…

'Krack' Wi-Fi guidance

What is Krack? Most Wi-Fi networks are configured to encrypt traffic between client devices and access points, so that someone outside the network cann…

True story: What happens when your phone is stolen (video) !

Film student Anthony van der Meer decided to find out what happens to stolen telephones and the data on them.   He created a 20-minute documentary …

How to remove Tech Support Scam Popups in your Browser !

What is Tech Support Scam Popups? A Tech Support Scam browser popup is when your browser displays an advertisement that pretends to be from Microsoft, …

Remove the Floxif CCleaner Trojan

What is Floxif CCleaner Trojan? Floxif is the detection for a Trojan that was bundled with a hacked version of CCleaner. Downloads of the 32-bit versio…

CCleaner Malware Incident - What You Need to Know and How to Remove

This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CClean…

Remove the Microsoft Windows Product Key Tech Support Scam

What is Microsoft Windows Product Key Tech Support Scam? The Microsoft Windows Product Key Tech Support Scam is a Trojan.Tech-Support-Scam that display…

Remove the Your Computer May Have a Virus Web Page !

What is Your Computer May Have a Virus Web Page? The Your Computer May Have a Virus Scam Popup is a web browser advertisement shown by affiliates promo…

Remove the "Novo Optimizer GPU Miner"

What is Novo Optimizer GPU Miner? The Novo Optimizer GPU Miner is a Trojan that utilizes a victim's GPU, or Graphic Processing Unit, to mine digita…

Remove the Your Windows computer is at High Risk Popup !

What is Your Windows computer is at High Risk Popup? The Your Windows computer is at High Risk Popup is a web browser advertisement shown by scammy rem…

10 Tips to Prevent Phishing Attacks

Have you ever considered that you could be a target for phishing attacks? It’s not a new issue, but it’s a rising threat. Phishing attacker…

How to remove the Windows Security Warning Popup Scam !

What is Windows Security Warning Popup Scam ? The Windows Security Warning Scam Popup is a web browser advertisement shown by scammy remote tech suppor…

Remove the Oneway Hosts File Modifying Trojan !

What is Oneway Hosts File Modifying Trojan? OneWay is a Trojan that modifies the Windows HOSTS file so that the computer is not able to reach various a…

Remove the Your Windows is infected Popup Scam !

What is Your Windows is infected Popup? The Your Windows is infected Popup is a browser based tech support scam that tries to scare visitors into think…

Remove the WindowService Trojan !

What is WindowService Trojan? The WindowService Trojan is malware program that is commonly installed by adware bundles that you download from the Inter…

The best free parental control software 2017 !

Keep your children safe online with the best free parental control software for Windows. It's hard to imagine anything less child-friendly than an …

Remove The publisher has been blocked from running software Alert ?!

What is The publisher has been blocked from running software Alert? If you are receiving errors when you try to install or run a security program that …

How to Remove Smart Registry Care ?

What is Smart Registry Care? Smart Registry Cleaner is a Registry cleaner that scans for a variety of categories that include ActiveX/COM, System Softw…

How to remove the WannaCry and Wana Decryptor Ransomware !

This section will provide a brief tutorial on how to remove WannaCry/Wana Decryptor using MalwareBytes and Emsisoft. While both can remove this infectio…

Remove the Photo.scr Monero Miner

What is Photo.scr Monero Miner? The Photo.scr Miner is a Trojan that utilizes a victim's computer processing power to mine the digital currency cal…

How to remove Fake Java Update PopUps !

What is Fake Java Update PopUp? The Fake Java Update PopUp is a web browser advertisement shown by scammers that are trying to trick you into downloadi…

Remove the "FilePlus" Potentially Unwanted Program

What is FilePlus? FilePlus is a program that allows you to download copyrighted movies, tv shows, and programs for free. What it does not tell you, tho…

Remove the MaohaWiFi Program (Uninstall Guide)

MaohaWiFi is a potentially unwanted program that is commonly bundled with free programs that you download from the Internet. This programs allows your c…

Remove AdBlocker for YouTube !

What is AdBlocker for Youtube? AdBlocker for Youtube is a potentially unwanted Google Chrome extension that states that it blocks advertisements shown …

"CryptorBit" and "HowDecrypt" Information Guide and FAQ

Table of Contents: How to get help with CryptorBit What is CryptorBit or the HowDecrypt Ransomware How to recover files encrypted by CryptorBit Ho…

How to remove Unwanted Chromium Browsers ?!

What is Chromium Browser? Chromium is a open source web browser created by Google, which Google Chrome is based on. As Chromium is open source, it can …

Remove the MSSecTeam Tech Support Scam (Removal Guide)

What is MSSecTeam Tech Support Scam? The MSSecTeam Tech Support Scam is a Trojan.Tech-Support-Scam that displays a lock screen pretending to be from Mi…

This PC Has Been Blocked Screenlocker Removal Guide !!

What is This PC Has Been Blocked Screenlocker? The This PC Has Been Blocked screen locker is a Trojan that displays a fake security screen stating that…

How to use SUPERAntiSpyware to scan and remove malware from your computer !

With viruses, worms, Trojans, and malware becoming more and more pervasive in every computer users life, it is important to have an arsenal of tools tha…

PacketTotal - A Useful Site for Analyzing PCAP Files

If you are InfoSec professional who commonly deals with intrusion detection and response or malware analysis, a new site called PacketTotal may make you…

Locky Ransomware Information, Help Guide, and FAQ!

What is the Locky Ransomware? Locky is a Windows ransomware infection that was released in the middle of February 2016. This ransomware infection will a…

Remove the BrowserMe.exe or Chrome_Font.exe Fleercivet Ad Clicker Trojan !

The "BrowserMe" or "Chrome_Font.exe" Trojan is a computer infection that only targets users of the Chrome browser. When running it w…

Top tips for protecting your Android from malware !

With the largest installed base of all operating systems, Android has certainly taken the mobile world by storm, and as the active user stats show, Andr…

How to tell if your Snapchat has been hacked, and how to get it back !

What to look out for, and what to do about it! Snapchat is one of the most popular messaging services available today. As of June 2016, more than 150 …

Padlock Screen Locker Removal Guide

The Padlock Screen locker is a Trojan that displays a picture of a locked door with a message stating that the victim's files have been deleted and …

How to Remove Antivirus 10 (Removal Guide)

Antivirus 10 is a scareware program that pretends to an anti-virus program, but in reality is just a Trojan trying to scare you into purchasing it. This…

CryptorBit and HowDecrypt Information Guide and FAQ

CryptorBit and HowDecrypt Information Guide and FAQ

CryptoLocker Ransomware Information Guide and FAQ

Info: The original CryptoLocker infection was disabled on June 2nd, 2014 when Operation Gameover took down its distribution network. Since then there ha…

How to Protect and Harden a Computer against Ransomware ?!

2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. With even the smaller ransom…

Using Wireless Technology Securely

In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great number…

PGP KEY MANUAL

PGP KEY MANUAL

Rem-VBSworm

Rem-VBSworm is a utility that removes VBS and Windows Script Host malware from your computer, USB drives, and the network.  This program was create…

"Jigsaw Decrypter"

Jigsaw Decryptor is a free decryption program created by Michael Gillespie for variants of the Jigsaw Ransomware. Using this decryptor a victim of the J…

GPU-Z 2.7.0

GPU-Z is a free tool that provides detailed information on the graphics cards in your computer. Using this tool you can see information such as the GPU …

McAfee Real Protect !

McAfee Real Protect is a real-time behavior program that monitors your computer for suspicious activity. Real Protect utilizes machine learning and beha…

Crypt38Decrypter !

"Crypt38 Decrypter" is a free decryption program created by Michael Gillespie for the Crypt38 Ransomware. Using this decryptor a victim of the…

Simple System Tweaker 2.2.0

Simple System Tweaker is a free utility that optimizes various functions in Windows. These tweaks could allow for faster boot and shutdown times, faster…

Autoruns 13.71

Autoruns is a free Sysinternals tool from Microsoft that enumerates all the programs that automatically start on a Windows machine.  You can then e…

Offline CryptoMix Ransomware Decryptor

Avast released a decryptor for CryptoMix victim's that were encrypted while in offline mode. Offline mode is when the ransomware runs and encrypts a…

UCheck

UCheck is a free program that allows you to scan a computer for outdated programs and automatically update them to the latest version.  UCheck also…

VT Hash Check 1.60

"VT Hash check" adds a context menu item for all files allowing you to quickly search VirusTotal.com for matching files and their correspondin…

Shortcut Cleaner 1.4.9.0

Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software.  When S…

GIBON Ransomware Decryptor

"GibonDecryptor" is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the GIBON Ransomware. Using this decr…

RansomNoteCleaner !

Ransom Note Cleaner is a program that can be used to scan a ransomware victim's computer for left over ransom notes and elete them. When someone is …

Chrome Cleanup Tool

The Chrome Cleanup Tool is a program written by Google that will scan a computer for programs that cause problems in Google Chrome. The targeted applica…

Symantec Kovter Removal Tool

The Symantec Kovter Removal Tool can be used to remove the Kovter infection from your computer.  The Kovter infection is a Click Fraud Trojan as it…

Malwarebytes Anti-Exploit 1.10.1.41

Malwarebytes Anti-Exploit is a security program that protects you from zero-day exploits that target browser and application vulnerabilities. This progr…

Sophos Home

"Sophos Home" is a free Internet security product that protects Windows and Mac computers from malware and malicious web sites. Sophos Home ca…

WinPatrol

WinPatrol is a free security utility that allows you to get a closer look under the hood of Windows so that you can detect programs that should not be r…

PowerLockyDecrypter

"PowerLocky Decrypter" is a free decryption program created by Michael Gillespie for the PowerWare Locky Ransomware. Using this decryptor a vi…

Process Monitor (ProcMon)

Process Monitor, or ProcMon, is an advanced monitoring tool that allows you to see in real-time the file system, registry, and process activity occuring…

BTCWareDecrypter Download !

BTCWareDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the BTCWare ransomware. Using this decryptor, v…

RansomFree Download !

Cyberreason's RansomFree is a ransomware protection program that silently runs in the background looking for ransomware activity on a computer. If a…

"Malwarebytes Anti-Ransomware 0.9.18.807" Download !

Malwarebytes Anti-Ransomware Beta is a program that protects your computer from file encrypting ransomware programs.  This programs quietly sits in…

StrikedDecrypter

StrikedDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the Striked Ransomware. Using this de…

Mole02 Decryptor Download !

Mole02 Decryptor is a program that allows victims who have been encrypted the Mole02 Ransomware to recovery their files for free. This decryptor is very…

DCryDecrypter 1.0.0.1 Download !

DCryDecrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the DCry Ransomware. Using this decryptor, victims…

PC Hunter 1.51 Download

"PC Hunter" is a very powerful security utility that allows great insight into the inner workings of Windows. It is especially useful when you…

Farbar Recovery Scan Tool Download

Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mo…

AVCertClean 0.3 Download

A recent infection blocks the launch of several security software by setting their code signing certificate as untrusted. This software will search for…

VIPRE Advance Security for Home Download !

COMPANY'S DESCRIPTION: With today’s online threats, you can’t afford to settle for anything but the best. The top-rated, award-winning …

Glasswire 1.2.3100.0 Download

GlassWire is a free network monitoring tool that displays and alerts you about the network traffic originating from your computer.  This allows you…

StupidDecryptor Download

StupidDecryptor is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by various ransomware infections that are based off…

AVG Remover Download

AVG Remover allows you to completely uninstall detected AVG products from your computer.  Unfortunately, there are times when the traditional metho…

RakhniDecryptor Ransomware Decryptor Download !

RakhniDecryptor is a general purpose ransomware decryptor created by Kaspersky Labs. Instead of creating a separate decryptor for each ransomware infect…

Zemana AntiMalware Download

Zemana AntiMalware is a second opinion cloud based malware scanner that allows you to perform on demand scanning as necessary. Zemana AntiMalware does n…

RogueKillerCMD Download

RogueKillerCMD is the command line version of the RogueKiller anti-malware program and security utility. This program is designed to be used by power us…

RogueKiller Download

RogueKiller is a security tool that can be used to terminate and remove malicious processes and programs from your computer.  RogueKiller has the a…

CryptoSearch Download

CryptoSearch is a utility created by Michael Gillespie that allows you to clean up your computer of encrypted files and ransom notes from a ransomware i…

CryptON Ransomware Decryptor Download

If you are infected with the CryptON Ransomware, then you are in luck. Emsisoft was able to figure out a way to decrypt files encrypted by this ransomwa…

SUPERAntiSpyware Download

SUPERAntiSpyware is a free anti-spyware program that offers excellent detections and quick removal of common infections. As malware is constantly evolvi…

Junkware Removal Tool 8.1.0.0 Download

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your co…

Windows Repair (All In One) 3.9.25 Download

Windows Repair is a utility that contains numerous mini-fixes for Windows.  This tool will allow you to repair common issues with your computer suc…

Heimdal Free Download

Heimdal Free is a program that scans your computer for outdated and possibly vulnerable programs and automatically updates them to the latest version fo…

EMSISOFT HIJACKFREE

Emsisoft HiJackFree is a simple tool that allows detection of malicious activity and allows the user to stop them. Using tools is possible to get an ins…

Malwarebytes Anti-Malware

Malwarebytes' is an important security program for any computer user to have installed on their computer. It is light-weight, fast, and best of all,…

RKill

RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software c…

BitStakDecrypter Download

BitStak Decrypter is a free decryption program created by Michael Gillespie for the BitStak Ransomware. Using this decryptor a victim of the BitStak Ran…

HEIMDAL FREE

FREE HEIMDAL security software tool applied in 20 most used software applications in the world. Performs these functions: Scans your computer every 2…

ComboFix

ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In…

AdwCleaner

AdwCleaner is a program that searches for and deletes Adware, Toolbars, Potentially Unwanted Programs (PUP), and browser Hijackers from your computer. &…

Emsisoft Emergency Kit

The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected compu…

Newsletter:

Mission

National Unit “KOS-CERT” will have a key role in maintaining the networks security and electronic communications services of the Republic of Kosovo. The purpose and mission is to help the community to cope effectively with the challenges of cyber security, coordination of actions in order to solve cyber security incidents and effectively prevent them.

Community

“KOS-CERT” community includes all operators that are authorized / licensed by the Regulatory Authority of Electronic and Postal Communications (TRA) to provide networks and electronic communications services and the consumers who use these networks and / or services in the Republic of Kosovo.