Southwest Air is not giving away 800 tickets to Facebook users

Southwest Air is not giving away 800 tickets to Facebook users

A Facebook like-farming and survey scam associated with advance-free fraud claims that Southwest Airlines is giving away 800 tickets to any destination in the world the airline flies to. The Southwest Airlines Facebook scam claims that 4 tickets will be awarded to each winner and that there will be up to 400 winners. The scam further details that food, drinks, and hotel accommodations are all paid for with $5,000 spending money.

Southwest Air is not giving away 800 tickets to Facebook users

A fake Southwest Airlines Facebook community page named Southwest Air has published a Facebook post that claims that Facebook users who share their photo, comment “booked” on the photo, like the page, and then go to a loveflightss.co website will be given the chance to win 4 tickets to any destination in the world that Southwest Airlines flies to.

Is Southwest Air giving away free tickets?

NO. The information published in the Southwest Air Facebook post is entirely false. You will not be given a chance to win Southwest Airlines tickets to any destination they fly to, plus other accommodations, if you follow instructions posted by the dubious Facebook community page. For starters, the Southwest Air Facebook page is not associated with Southwest Airlines. The real Southwest Airlines Facebook page is verified by Facebook and has over 5 million likes. The real Southwest Airlines Facebook page is also very active. They post to Facebook daily about travel advisories and current events.

The fake Southwest Air Facebook page has only published 1 post and shared a link to a survey-scam website. The page also only has over 11,000 likes, some of which could be considered fake.

Why is this scam dangerous?

Facebook scams like this are very common. There are many Facebook scams designed to trick users into believing that they can win airline tickets and other items by following instructions published in a Facebook post. The reason why cybercriminals conduct these types of Facebook scams are to gather Facebook likes, direct users to a survey-scam website, and obtain targets potentially gullible enough to fall for future scams, including advance fee fraud.

Facebook likes are designed to make the Southwest Air Facebook page seem safe and legitimate to other people. The more likes a Facebook page has, the more realistic it might seem to people.

Survey-scam websites are designed to phish your personal information. They will ask you for information such as your name, email address, telephone number, home address, interests, and more. Once this information is provided victims can expect a large amount of email spam messages, telephone calls at home, junk mail, and more. Providing your information to a survey-scam website is like adding yourself to the world’s worst mailing list. You can be targeted by third-party scammers and other parties as well.

Furthermore, Facebook users who are duped by scams like this will become targeted for other scams by the party behind the initial scam. The fake Southwest Air Facebook page or another account associated with the Facebook page might send victims who followed the instructions private messages claiming that they won. They will then ask for an advance payment, for shipping or other purposes. However, once the advance payment is received the victim will not receive the prize and will most likely be blocked from viewing other content posted by the dubious Facebook page. This is called advanced-free fraud and it happens all the time.

Southwest Air Facebook post examples

If you come across Facebook posts like this make sure to ignore them. You can also report them to Facebook and warn others, including your duped friends, about them by sharing the content on this page.

We’re giving away 800 tickets to any destination in the world we fly to, 4 tickets per winner for you and your friends. (Up to 400 winners). Food & Drinks plus hotels are all paid for with $5,000 spending money. Want to win 4 tickets?

1. Share this photo and Comment “Booked” below.
2. Like This Page.
3. Then go here: http://loveflightss.co/
Good Luck~ Southwest


Get a Free PUBLIX $75 Gift Coupon to celebrate 89th Anniversary (285 Remaining)
Get yours here – (1) per person
LOVWINNIN.CO

How to fix Green and Purple videos in Google Chrome

How to fix Green and Purple videos in Google Chrome

If some of the videos you view in Google Chrome are being displayed in green and purple colors it could mean that your Google Chrome GPU process is not composing accelerated media related content properly. Perhaps the GPU process was somehow ended which resulted in Google Chrome generated HTML (HTML5) videos and other graphics with overlapping green and purple colors. If the GPU process is not running correctly in Google Chrome it will cause HTML, CSS, and various types of graphics to fail inside the browser window in normal and incognito mode.

green and purple video

The GPU process is a Google Chrome process that is used by the internet browser to display GPU-accelerated content such as videos and graphic files with high pixels (for example, .gif files). The GPU process also serves other purposes; The process can help reduce power consumption and limit battery usage for multiple devices because it takes less power than CPU.

gpu process

In a document published by Tom Wiltzius, Vangelis Kokkevis & the Chrome Graphics team they state that web browsers traditionally relied on the central processing units to render graphics. But now with graphics processing units being an integral part of popular devices (laptops, tablets, smartphones, etc.), attention has turned to finding ways to effectively use this underlying hardware to achieve better performance and power savings.

GPU can achieve far better efficiency than the CPU (both in terms of speed and power draw) in drawing and compositing operations that involve large numbers of pixels. – Chromium.org

Solutions

There are several solutions and troubleshooting options that can help you find the appropriate answer to fix green and purple videos and display normal SD and HD videos and graphic content in Google Chrome.

Enable hardware acceleration

1. Go to: Tools >Settings in Google Chrome browser and search for “accel” to bring up a new window. (chrome://settings/search#accel).

use hardware acceleration

2. Check the use hardware acceleration when available option.

Uninstall and reinstall Google Chrome

A simple and straightforward solution is to uninstall and reinstall Google Chrome.

Use GPU to rasterize web content

Go to: Enable GPU rasterization in Google Chrome browser and set the option to default. (chrome://flags/#enable-gpu-rasterization)

Specify the number of MSAA samples for GPU rasterization

Go to: GPU rasterization MSAA sample count in Google Chrome browser and set the option to default. (chrome://flags/#gpu-rasterization-msaa-sample-count)

How to remove Flyper (Virus Removal Guide)

How to remove Flyper (Virus Removal Guide)

Example of file encryption caused by ransomware

Flyper virus is a term used to identify ransomware that encrypts the files on your computer, changes the name of the files, and adds the .flyper extension to files it encrypts. Flyper ransomware will additionally leave various note files (.txt, .html) in every folder it encrypts files in and Windows Desktop. The note files contain a ransom note that explains what happened to the files and how to pay a ransom in order to acquire a key to decode the compromised files.

flyper virus

Example of file encryption caused by ransomware

Ransom note

Your personal files have been encrypted with strongest encryption RSA 2048 and unique key generated for this computer.

We present a decrypter software which allows to decrypt and return control to all your encrypted files.
we accept a payment with Bitcoin, there are many methods to get them.
On these sites you can buy Bitcoin
localbitcoin.com cex.io btcdirect.eu
To get KEY and Decrypter Program :
1)Send 0.5 BTC bitcoins to this address with Description your PC Computer Name
Bitcoin Address 1PniPmm5kbotcrawliuuAhXpBWR3QJiUtpfAAFm2SS
2)Contact me by email to get your key 
flyper01@sigaint.org

Once a computer becomes infected with Flyper ransomware it will encrypt files, change the file names to something random, and replace Windows Desktop Wallpaper with an image of a ransom note. It will also dump files in every folder it encrypts files in that contain a ransom note.

Flyper ransomware is usually dispersed by malicious email attachments. The email content employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

Aliases: Flyper virus, Flyper ransomware

How to remove Flyper virus

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links

What does DVDRip, R5, DVDSCR, TC, TS, PDVD, and CAM mean?

What does DVDRip, R5, DVDSCR, TC, TS, PDVD, and CAM mean?

If you are an online video junkie or someone who enjoys DVDS you might occasionally come across video files with DVDRip, R5, DVDSCR, TC, TS, PDVD, and CAM in the title and wondered what these terms imply. For starters, DVDRip, R5, DVDSCR, TC, TS, PDVD, and CAM are Online video Good quality names that identify the quality of the video. Each Online video Good quality term implies something different than the other with DVDRip at the top of the quality hierarchy and CAM at the bottom.

DVDRip > R5 > DVDSCR > SCR > TC > TS > PDVD > CAM

DVDRip

DVDRip video

DVDRip is a copy of the final released DVD of the video. DVDRips are excellent quality and are released in SVCD and DivX/XviD.

R5 (R5 Retail)

R5 refers to a certain structure of a DVD unveiled in the DVD Region 5 which is Russia or the former Societ Union. R5 video files are typically bootleg videos that are dispersed on the internet in excellent quality.

DVDSCR (DVD-SCREENER)

DVDSCR video

A DVDSCR video is a DVD that has been sent to a rental store, involved party, or another location for promotional use. A DVDSCR copy is usually very good quality and can be released in SVCD and DivX/XviD. The quality of the DVSSCR also depends on the skill of the person ripping the video. A DVD-SCREENER is essentially the same thing as a SCR; However, it is ripped to DVD. DVDSCR videos usually contain watermarks, other markings, and serial numbers on them.

SCR

SCR is a VHS tape that has been sent to a rental store, involved party, or another location for promotional use. SCR videos usually contain watermarks, other markings, and serial numbers on them. The quality of a SCR video depends on the equipment used and can range from excellent if done from a master copy or very poor if done on an old VHS recorder through poor capture equipment.

TC (Telecine Copy)

TC video

TC refers to a telecine machine copy of a film recorded straight from the film reels. The telecine process is commonly used by filmmakers to transfer production footage to video, which can then be captured by various non-linear digital editing systems such as Avid or Final Cut Pro. The sound and picture quality of a TC video should be very good; However, due to the equipment involved and costs telecine copies are fairly uncommon. The film is usually in correct aspect ratio, although 4:3 telecines are frequently used.

TS (Telesync)

TS is similar to a CAM but is filmed with different conditions and uses an external audio source (audio jack in the theater chair, direct audio line); However, TS does not ensure good audio quality. A TS video is typically filmed inside an empty movie theater (cinema) or from the projection booth with a professional grade camera. TS videos are usually have better video quality than that of a CAM due to better filming conditions.

PDVD (Telesync encoded DVD)

PDVD usually refers to an asian silver or, TS copy of a movie, that has been encoded to DVD.

CAM

CAM video

CAM refers to a video recorded by a digital video camera inside a movie theater (cinema). The audio is taken directly from the camera’s microphone and the sound of the theater’s audience can often be heard talking, laughing, or clapping.  The video ripper might use a tripod or record the video manually which can cause the camera to shake. A CAM version of a video might also be filmed from an angle or from different locations. Due to the factors of a CAM video the audio and picture quality is usually very poor.

How to remove Powerbase virus (Ransomware)

How to remove Powerbase virus (Ransomware)

Powerbase virus

What is Powerbase virus?

Powerbase virus is an expression used to describe a specific variant of ransomware called the Globe virus. The term “Powerbase” is taken from the email address used by the ransomware developer “powerbase@tutanota.com.” The Powerbase virus will encrypt the files on your computer using Blowfish encryption, add .purge to the file extensions, and leave a ransom note on your computer in a HTA or HTML format demanding that you pay a ransom to recover your files.

powerbase virus

Powerbase ransomware will additionally leave a ransom note named How to restore files.hta  in every folder it encrypts files in as well as Windows Desktop. The note files contain a ransom note that explains what happened to the affected files and how to pay a ransom via Bitcoins in order to acquire a key to decode the compromised files. The note may suggest that users email powerbase@tutanota.com to acquire a decryption key.

Ransom note

This wallpaper will state "You files are encrypted. Pay for decryption please" and then contains the powerbase@tutanota.com email address.

Once a computer becomes infected with Powerbase ransomware it will encrypt files, change the file names, delete the Shadow Volume Copies so that files cannot easily be recovered, and disable Windows Startup Repair. It will also dump files in every folder it encrypts files in that contain a ransom note. The note can additionally be used as a lock screen that restricts access to the infected computer.

Commands to disable Windows Startup Repair

vssadmin.exe Delete Shadows /All /Quiet 
bcdedit.exe /set {default} recoveryenabled No 
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

Files

How to restore files.hta
%UserProfile%\AppData\Local\msiscan.exe
%UserProfile%\How to decrypt your files.jpg

Registry entries

HKCU\Software\Powerbase
HKCU\Software\Powerbase\ "idle"
HKCU\Software\Powerbase\ "debug"
HKCU\Control Panel\Desktop\ "Wallpaper" "%UserProfile%\How to decrypt your files.jpg"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "How to restore files" = "mshta.exe "%UserProfile%\How to restore files.hta""

Not much is known how this malware will be distributed. However, ransomware like the Powerbase virus is usually dispersed by malicious email attachments. The email content employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

Aliases: Powerbase virus, Powerbase ransomware, Globe virus, Purge virus

How to remove Powerbase virus

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links

Remove Simple_Encoder virus

Ransomware

What is Simple_Encoder?

Simple_Encoder is an expression that characterizes explicit ransomware and an encryption virus that encrypts the files on your computer, revises the filenames, and adds a new file extension name. Simple_Encoder ransomware will additionally leave executable note files (.txt, .html) in every folder it encrypts files in and Windows Desktop. The note files contain a ransom note that explains what happened to the files and how to pay a ransom to decode the compromised files.

Simple_Encoder ransomware is usually dispersed by malicious email attachments. The email content employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

Aliases: Simple_Encoder virus, Simple_Encoder ransomware

How to remove Simple_Encoder

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links

Remove Chimera virus

Ransomware

What is Chimera ransomware?

Chimera ransomware is an inactive computer virus that encrypts the files on your computer, revises the filenames, and adds a new file extension name to the files it encrypts. Chimera ransomware will additionally leave various note files (.txt, .html) in every folder it encrypts files in and Windows Desktop. The note files contain a ransom note that explains what happened to the files and how to pay a ransom to decode the compromised files.

Chimera ransomware is usually dispersed by malicious email attachments. The email content employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

UPDATE: 3500 decryption keys from Chimera ransomware were leaked

Aliases: Chimera virus, Chimera ransomware

How to remove Chimera ransomware

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links

Remove ACCDFISA virus

ACCDFISA ransomware is a very serious computer encryption virus that encrypts the files on your computer, randomizes the filenames, and adds a new file extension name to the files it encrypts. ACCDFISA ransomware will additionally leave various note files (.txt, .html) in every folder it encrypts files in and Windows Desktop. The note files contain a ransom note that explains what happened to the files and how to pay a ransom to decode the compromised files.

ACCDFISA ransomware is usually dispersed by malicious email attachments. The email content employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

Aliases: ACCDFISA virus, ACCDFISA ransomware, ACCDFISA Protection Program

How to remove ACCDFISA virus

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links

Remove VenusLocker virus

Remove VenusLocker virus

Ransomware

What is VenusLocker?

VenusLocker ransomware is a computer virus that encrypts targeted files, randomizes the file names, changes the file type, and adds a new extension to the encrypted the file name. VenusLocker ransomware will additionally dump various note files (.txt, .html) in every folder it encrypts files in and Windows Desktop. The note files contain a ransom note that explains what happened to the files and how to pay a ransom to decode the compromised files.

VenusLocker

Overview

VenusLocker virus is commonly spread by malicious email attachments like many variants of ransomware. The email content utilizes a tactic known as social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

How to remove VenusLocker

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links

Remove Cerber2 virus

Remove Cerber2 virus

Ransomware

What is Cerber2 virus?

Cerber2 ransomware is a computer virus that encrypts targeted files, randomizes the file names, changes the file type to CERBER2 File, and adds the .cerber2 extension to the end of the file name. Cerber2 ransomware will additionally dump various note files (.txt, .html, .vbs) in every folder it encrypts files in and Windows Desktop. The note files contain a ransom note that explains what happened to the files and how to pay a ransom to decode the compromised files. The note can be named # DECRYPT MY FILES #.
cerber2 virus

Overview

Cerber2 ransomware is a new variant of Cerber ransomware. The computer virus is like most ransomware and is typically syndicated by malicious email attachments. The email content employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.

It is not recommended to pay ransomware authors to decrypt your files. Instead you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.

Aliases: Cerber2 virus, Cerber2 ransomware

Targeted file extensions

1cd, .3dm, .3ds, .3fr, .3g2, .3gp, .3pr, .7z, .7zip, .aac, .ab4, .abd, .acc, .accdb, .accde, .accdr, .accdt, .ach, .acr, .act, .adb, .adp, .ads, .agdl, .ai, .aiff, .ait, .al, .aoi, .apj, .apk, .arw, .ascx, .asf, .asm, .asp, .aspx, .asset, .asx, .atb, .avi, .awg, .back, .backup, .backupdb, .bak, .bank, .bay, .bdb, .bgt, .bik, .bin, .bkp, .blend, .bmp, .bpw, .bsa, .c, .cash, .cdb, .cdf, .cdr, .cdr3, .cdr4, .cdr5, .cdr6, .cdrw, .cdx, .ce1, .ce2, .cer, .cfg, .cfn, .cgm, .cib, .class, .cls, .cmt, .config, .contact, .cpi, .cpp, .cr2, .craw, .crt, .crw, .cry, .cs, .csh, .csl, .css, .csv, .d3dbsp, .dac, .das, .dat, .db, .db_journal, .db3, .dbf, .dbx, .dc2, .dcr, .dcs, .ddd, .ddoc, .ddrw, .dds, .def, .der, .des, .design, .dgc, .dgn, .dit, .djvu, .dng, .doc, .docm, .docx, .dot, .dotm, .dotx, .drf, .drw, .dtd, .dwg, .dxb, .dxf, .dxg, .edb, .eml, .eps, .erbsql, .erf, .exf, .fdb, .ffd, .fff, .fh, .fhd, .fla, .flac, .flb, .flf, .flv, .flvv, .forge, .fpx, .fxg, .gbr, .gho, .gif, .gray, .grey, .groups, .gry, .h, .hbk, .hdd, .hpp, .html, .ibank, .ibd, .ibz, .idx, .iif, .iiq, .incpas, .indd, .info, .info_, .ini, .iwi, .jar, .java, .jnt, .jpe, .jpeg, .jpg, .js, .json, .k2p, .kc2, .kdbx, .kdc, .key, .kpdx, .kwm, .laccdb, .lbf, .lck, .ldf, .lit, .litemod, .litesql, .lock, .log, .ltx, .lua, .m, .m2ts, .m3u, .m4a, .m4p, .m4v, .ma, .mab, .mapimail, .max, .mbx, .md, .mdb, .mdc, .mdf, .mef, .mfw, .mid, .mkv, .mlb, .mmw, .mny, .money, .moneywell, .mos, .mov, .mp3, .mp4, .mpeg, .mpg, .mrw, .msf, .msg, .myd, .nd, .ndd, .ndf, .nef, .nk2, .nop, .nrw, .ns2, .ns3, .ns4, .nsd, .nsf, .nsg, .nsh, .nvram, .nwb, .nx2, .nxl, .nyf, .oab, .obj, .odb, .odc, .odf, .odg, .odm, .odp, .ods, .odt, .ogg, .oil, .omg, .one, .orf, .ost, .otg, .oth, .otp, .ots, .ott, .p12, .p7b, .p7c, .pab, .pages, .pas, .pat, .pbf, .pcd, .pct, .pdb, .pdd, .pdf, .pef, .pem, .pfx, .php, .pif, .pl, .plc, .plus_muhd, .pm!, .pm, .pmi, .pmj, .pml, .pmm, .pmo, .pmr, .pnc, .pnd, .png, .pnx, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx,.ppt, .pptm, .pptx, .prf, .private, .ps, .psafe3, .psd, .pspimage, .pst, .ptx, .pub, .pwm, .py, .qba, .qbb, .qbm, .qbr, .qbw, .qbx, .qby, .qcow, .qcow2, .qed, .qtb, .r3d, .raf, .rar, .rat, .raw, .rdb, .re4, .rm, .rtf, .rvt, .rw2, .rwl, .rwz, .s3db, .safe, .sas7bdat, .sav, .save, .say, .sd0, .sda, .sdb, .sdf, .sh, .sldm, .sldx, .slm, .sql, .sqlite, .sqlite3, .sqlitedb, .sqlite-shm, .sqlite-wal, .sr2, .srb, .srf, .srs, .srt, .srw, .st4, .st5, .st6, .st7, .st8, .stc, .std, .sti, .stl, .stm, .stw, .stx, .svg, .swf, .sxc, .sxd, .sxg, .sxi, .sxm, .sxw, .tax, .tbb, .tbk, .tbn, .tex, .tga, .thm, .tif, .tiff, .tlg, .tlx, .txt, .upk, .usr, .vbox, .vdi, .vhd, .vhdx, .vmdk, .vmsd, .vmx, .vmxf, .vob, .vpd, .vsd, .wab, .wad, .wallet, .war, .wav, .wb2, .wma, .wmf, .wmv, .wpd, .wps, .x11, .x3f, .xis, .xla, .xlam, .xlk, .xlm, .xlr, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xps, .xxx, .ycbcra, .yuv, .zip

How to remove Cerber2 virus

1. Download and Install Recuva by Pirform.

download recuva

2. Run the program and start the Recuva Wizard.

3. Select All Files and click Next.

4. Select a file location. Click I’m not sure to search everywhere on your computer.

5. Click Start.

6. Select All Files with your mouse and click the Recover button. If you cannot restore your files with Recuva we recommend to try using Shadow Explorer to restore your files.

7. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.

download malwarebytes

buy now button

8. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

9. Once the Malwarebytes scan is complete click the Remove Selected button.

10. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.

11. Download and Install HitmanPro by Surfright to perform a second-opinion scan.

download hitmanpro

12. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

13. Once the HitmanPro scan is complete click the Next button.

14. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

15. Click the Reboot button.

16. Download and Install CCleaner by Piriform to cleanup junk files, repair your registry, and manage settings that may have been changed.

download ccleaner

buy now button

17. Open CCleaner and go to the main Cleaner screen. Click the Analyze button. When the process is complete, click the Run Cleaner button on the bottom right of the program interface.

18. Go to Tools > Startup and search for suspicious entries in each tab starting from Windows all the way to Content Menu. If you find anything suspicious click it and click the Delete button to remove it.

19. Go to the Registry window and click the Scan for Issues button. When the scan is complete click the Fix selected issues… button and click Fix All Selected Issues.

How to stay protected against future infections

The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.

Real-time security software

Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.

download norton security
Common Online Guidelines

  • Backup your computer and personal files to an external drive or online backup service
  • Create a restore point on your computer in case you need to restore your computer to a date before infection
  • Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
  • Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
  • If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
  • Avoid torrents and P2P clients
  • Do not open email messages from senders you do not know
Helpful Links