Cerber is ransomware virus that uses AES encryption to encrypt user files. Usually it affects documents, photos, images, music, games and other types of personal data. Cerber adds .cerber extension to all encrypted files. Targeting personal information helps them to demand ransom ($500) for decryption. As there are no 100% working free decryption tools available many users pay the ransom to restore their files.
TeslaCrypt is very dangerous encrypting virus and ransomware. It uses AES encryption to encrypt sensitive user files (documents, photos, music, video). After this it asks for a ransom to decrypt those files. One of the features of TeslaCrypt ransomware is that it also affects gaming files of most popular games
Zingload.com is controversial search engine. It is not a virus, and it is not very dangerous. Zingload.com actually redirects your searches to Google Custom Search results. Main issue is: hijacker installs in Google Chrome, Mozilla Firefox and Internet Explorer and sets as default homepage and search engine. Zingload.com also hijacks browser shortcuts to make them open its URL every time users click on them.
Zepto Ransomware is new file-encrypting ransomware from Locky family. It uses RSA-2048 encryption algorithm and appends .zepto extensions to encrypted files and modifies file names with set of numbers and letters. First part of this set is your actually personal ID that is needed to pay the ransom and get decryptor. Ransom amount is 0.6 BitCoins (~$365). Zepto creates _HELP_instructions.html file with instructions to make the payment.
Crypt0L0cker is newer version of TorrentLocker ransomware, that appeared earlier. It encrypts all files except .html, .inf, .manifest, .chm, .ini, .tmp, .log, .url, .lnk, .cmd, .bat, .scr, .msi, .sys, .dll, .exe, .avi, .wav, .mp3, .gif, .ico, .png, .bmp and .txt that are necessary for proper Windows operation. All files get .encrypted extension and become inaccessible. The ransom amount is 2.2 Bitcoin. Crypt0l0cker creates DECRYPT_INSTRUCTIONS.html and DECRYPT_INSTRUCTIONS.txt files with instructions to pay the ransom and receive decryptor.