TG Soft Cyber Security Specialist - Vir.IT eXplorer: AntiVirus, AntiSpyware, AntiMalware, AntiRansomware and Crypto-Malware protection
Detects viruses and malwareIdentifies polymorphic viruses thanks to DEEP SCANMacro Virus AnalyzerINTRUSION DETECTION TechnologyVirus/malware removal toolsInstallation on Active Directory16/32/64 bit Real-Time ProtectionVir.IT Scan MailVir.IT Console Client/ServerVir.IT WebFilter ProtectionAutomatic Live-UpdateVir.IT Personal FirewallItalian Tech SupportAntiMalware Reserch Center

Submit suspicious file
fb rss linkedin twitter


Vir.IT eXplorer PRO pass the test VB100 2019-06



EICAR Membro SERIT - SEcurity Research in ITaly

News about virus, malware & hoax

News feed RSS
19/10/2016 18:53:28 Even Egypt has its ransomware: Anubis is back from next world.
New ransomware, with an exotic name Anubis, encrypts all files in the computer and rename them by adding the .coded extension.

04/10/2016 16:42:43 "Checkmate to Crypto-Malware! ..." The C.R.A.M. workshop SMAU Milano 2016 on Thursday 27th October.
The educational / informative workshop "Checkmate to Crypto-Malware! How to secure our most precious data." will take place at FieraMilanoCity pad. 4 Arena SMAU ICT2 on Thursday 27th October at 14:30.

29/09/2016 08:53:53 Kovter: malware that propagates without creating files
Kovter is malware classified as "Fileless", malware is not stored on file but on the Windows registry.

22/05/2016 10:34:32 Vir.IT eXplorer 8.x has been certified as "SILVER" software by OPSWAT!
OPSWAT, a leader company in computer security, has awarded Vir.IT eXplorer 8.x the "SILVER" certification for safe, efficient and compatible software.

11/05/2016 18:20:26 Saraswati CryptoEncoder ransomware from India to encrypt and rename all you files!
This new variant of the CryptoEncoder family takes it name from the Indian goddess Saraswati. Encrypted files will have the extension changed to .id-????????.{}.xtbl.

20/04/2016 15:53:56 New crypto malware that pretends to be the FBI encrypts data files and requires redemption BitCoin !!!
The TG Soft's C.R.A.M. have found new types of CryptoMalware attacks that spread by exploiting not only fake email but also Trojan-downloader...

10/04/2016 09:31:09 Breaking Petya Ransomware!
How to obtain the key for cipher used by Petya Ransomware.

Pages: 1 2 [3] 4 5 6 7 8 9 10 11 12 13

Legal & Eula | Privacy | Uninstall

TG Soft S.r.l. - via Pitagora 11/B, 35030 Rubàno (PD), ITALY - C.F. e P.IVA 03296130283