iolo WW

How to back up and transfer WhatsApp chat history

0
The storage and exchange of data have never been as easy as is now, especially since the adaptation of cloud services that are already installed on practically any device and offer a solid amount of space for storing backups. WhatsApp is one of the most popular messengers linking people and allowing their data exchange from different parts of the world. Each time users are about to change their smartphone or simply perform a factory reset, nobody wants to lose chat history and media that accumulated over time while communicating with others. And in this article, we are going to show how to back up and restore your WhatsApp chat history - be it on a new or the same device, and iPhone or Android. Check out this list of options and choose the one that fits you the most!

How to remove Cypher RAT (Android)

0
Cypher is a remote administration trojan (RAT) promoted by cybercriminals to control Android devices and run a number of malicious actions on them. Once it hacks an Android device, threat actors become able to manage almost the whole device for achieving their purposes. Cypher is also a public trojan that can be purchased by anyone in form of subscription plans on the developers' website. One of the special features that cybercriminals behind Cypher get access to is the so-called clipboard hijacker. It is designed to substitute copied addresses of crypto wallets with ones owned by trojan owners. In other words, if a victim runs some cryptocurrency transaction while the trojan is on the smartphone, cybercriminals will be able to stealthily replace the copied address and receive the payment to their wallet instead. Apart from this, Cypher RAT has a plethora of other capabilities typical for such malware. For instance, it can change smartphone wallpapers, manage calls and SMSs, force-open various apps, manipulate the screen, memorize keyboard strokes, take screenshots, use a microphone to record incoming audio, analyze the device location, download additional software, read 2-factor authentication codes, imitate log-in windows, and other such functions aimed at benefiting cybercriminals in any desired way.

How to remove AXLocker Ransomware and decrypt your files

0
AXLocker is a ransomware virus that encrypts personal data (documents, photos, databases, etc,) and demands victims to pay money for its decryption. Unlike other ransomware infections that typically rename encrypted data (by adding new extensions), AXLocker leaves files to look in their original appearance. Despite this, victims will not be able to access their data and the virus will then display a pop-up window with decryption-related demands and allocated time to meet them.

How to remove Dharma-Zxcvb Ransomware and decrypt .zxcvb files

0
Dharma is a notorious malware group that has been distributing a number of high-end ransomware infections. Zxcvb is one of the most recent versions released by cybercriminals. Alike its precursors, the virus encrypts access to system-stored files and changes their visual appearance (by adding the victim's ID, paymoney@onionmail.org email address, and the .zxcvb extension). For instance, a file originally named 1.pdf will change to something like 1.pdf.id-9ECFA84E.[paymoney@onionmail.org].zxcvb and so forth with other affected data. Once Zxcvb deprives access to files, it creates a ransom-demanding note called FILES ENCRYPTED.txt and also displays a pop-up window.

How to remove Pushycaptcha.live

0
Pushycaptcha.live is a tricky domain, that uses technical and psychological wiles to make users subscribe to its notifications via Google Chrome, Mozilla Firefox, or Safari browsers. The website contains various phishing landing pages, that victims get redirected to from other resources they are visiting. Usually, Shokips.com displays following message: "Click the "Allow" button to subscribe to push notifications and continue watching". Pages offer to click the "Allow" button, supposedly to get access to restricted content they were trying to download or watch. However, this is just a useless intermediary page, that will offer to download fake Adobe Flash updates, adware apps, or subscribe to site notifications. If users allow this, they will receive unwanted spam pop-ups in the right-bottom corner of the desktop. Also, a persistent module can be installed in browsers or directly in the system. This article contains step-by-step instructions to remove Pushycaptcha.live and get rid of ads, pop-ups, and notifications in browsers.

How to remove D0ggerofficial Ransomware and decrypt .locked files

0
D0ggerofficial is a ransomware virus that runs encryption of data using AES-256 algorithms. While doing so, it also renames all targeted files (documents, videos, images, etc.) with the .locked extension. For instance, a file originally named 1.pdf will change to 1.pdf.locked and reset its original icon. Following this, D0ggerofficial displays a pop-up window with decryption instructions. Cybercriminals say victims have to make a payment of 0.25 BTC (roughly 4,200) in order to retrieve a special decryption key from the cybercriminals' remote server. Victims can also obtain more detailed information by contacting the attackers via their Telegram channel (@d0ggerofficial).

How to remove Eyedocx Ransomware and decrypt .encrypted files

0
Eyedocx is a ransomware infection that encrypts access to system-stored data and presents instructions to make victims pay for the decryption. Once the encryption process gets put underway, all files will change according to this example - originally named 1.pdf will change to 1.pdf.encrypted and reset its icon. The assignment of random extensions is a common effect of many ransomware infections, designed to highlight the blocked data. The .encrypted extension is quite generic and can therefore be used by other ransomware variants as well. Once Eyedocx finishes running encryption, it creates a text note (readme.infomation) with ransom-demanding instructions.

How to remove Greenskymotions.net

0
Greenskymotions.net is an online scam that delivers unwanted content by forcing users on allowing push-notifications. The website can appear either accidentally when clicking on suspicious ads or because you have adware installed on your PC. In the second case, Greenskymotions.net will pop up time each time you boot up a browser. It will say you to click "Allow" in order to bypass Captcha, download a file, watch a video, or other unreasonable actions. In fact, this action will do nothing of mentioned, but push suspicious and intrusive banners right into your notification center. The adware will bombard your desktop with tons of deceptive ads leading to low-sort or malicious websites. Infections like adware can gobble a lot of system resources and force performance issues. To stamp on such consequences, you should delete Greenskymotions.net from your PC using the instructions below.