IObit Malware Fighter 1.7.0.0

Published by jon 0

IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.

RogueKiller 8.4.1

Published by jon 0

RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.

Pirate Bay Censorship Backfires as New Proxies Bloom | TorrentFreak

Published by Jim 0

After legal threats from the music industry the UK Pirate Party saw no other option than to shut down their Pirate Bay proxy service. However, as is usually the case with censorship, the Internet has found a way to route around it. Responding to the UK situation Pirate parties in Argentina and Luxembourg have decided to start fresh Pirate Bay proxies.

D7 7.8.33

Published by Tim Tibbetts 0

D7 is a tool for PC technicians to aid in many tasks and provide a uniform procedure for technicians to follow. It has many capabilities and many uses.

Kaspersky XoristDecryptor 2.2.115.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

Kaspersky RectorDecryptor 2.5.20.0

Published by Tim Tibbetts 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

Pikspam: An SMS Spam Botnet | Symantec Connect Community

Published by Jim 0

The recent discovery of an Android SMS spam botnet by Cloudmark, which is detected by Symantec as Android.Pikspam, has gained media attention. While delivering spam by botnets is nothing new, mobile technology has opened up new attack vectors to cybercriminals who are using the proven attack techniques of social engineering and spam with success on mobile devices.

BlackBeltPrivacy Tor+WASTE 2.1.2012.12 Final

Published by Tim Tibbetts 0

Tor helps keep you safe online. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous() Privacy Pack. An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE).

McAfee Stinger 10.2.0.924

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Android Trojan Apps Build SMS Botnet | threatpost

Published by Jim 0

A rudimentary, SMS-based botnet is ensnaring Android users into its web with a series of text messages offering free downloads for popular, paid gaming applications, according to Cloudmark researcher Andrew Conway.

McAfee Stinger 10.2.0.923

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Kaspersky RectorDecryptor 2.5.19.0

Published by jon 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

Kaspersky XoristDecryptor 2.2.114.0

Published by jon 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

McAfee Stinger 10.2.0.921

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Phishers' Fake Security App for Facebook | Symantec Connect Community

Published by Jim 0

Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. The Symantec Connect community allows customers and users of Symantec to network and learn more about creative and innovative ways to use Symantec products and technologies.

Malwarebytes Anti-Malware BETA 1.70.0.1100

Published by Tim Tibbetts 0

Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. It monitors every process and stops malicious processes before they even start. Over 5 million download on Majorgeeks alone. This is the BETA version, the latest stable version can be downloaded here.

Panda Cloud Cleaner 1.0.35

Published by jon 0

Panda Cloud Cleaner is an advanced disinfector based on Collective Intelligence (scanning in-the-cloud) that detects malware that traditional security solutions cannot detect.

Kaspersky Updater 2.3.2.160

Published by Tim Tibbetts 0

Kaspersky Updater is a program designed to download and manually save updates and modules of the Kaspersky Lab’s software into a separate directory.

Kaspersky RectorDecryptor 2.5.18.0

Published by jon 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

McAfee Stinger 10.2.0.918

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Kaspersky XoristDecryptor 2.2.113.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

Kaspersky RectorDecryptor 2.5.17.0

Published by Tim Tibbetts 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

McAfee Stinger 10.2.0.917

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Avira Free Antivirus 2013 13.0.0.2890

Published by Tim Tibbetts 0

Avira AntiVir Personal FREE Antivirus was developed to be a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc.

McAfee Stinger 10.2.0.915

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

McAfee Stinger 10.2.0.914

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Wise Folder Hider 1.31

Published by Tim Tibbetts 0

Wise Folder Hider is a free file/folder hiding tool. User can use it to hide files and folders on local partitions or removable devices.

Kaspersky RectorDecryptor 2.5.15.0

Published by jon 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

Kaspersky XoristDecryptor 2.2.112.0

Published by jon 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

McAfee Stinger 10.2.0.912

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Kaspersky CapperKiller 1.0.8

Published by jon 0

Kaspersky CapperKiller is a handy and reliable utility designed to detect and remove Trojan-Banker.Win32.Capper infections from your computer.

RogueKiller 8.3.2

Published by jon 0

RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.

McAfee Stinger 10.2.0.910

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

McAfee Stinger 10.2.0.909

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

McAfee Stinger 10.2.0.907

Published by jon 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Prey 0.5.9

Published by jon 0

Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.

Kaspersky XoristDecryptor 2.2.110.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.