Antivirus

Best free anti-ransomware software 2019

Of all the malware attacks you can experience, ransomware has to be one of the worst. While some paid-for anti-virus programs will protect against ransomware, most free ones do not. The result is that most PC’s are likely vulnerable to this particularly nasty form of attack.Ransomware became big news when WannaCry first appeared in 2017,…


Of all the malware attacks you can experience, ransomware has to be one of the worst. While some paid-for anti-virus programs will protect against ransomware, most free ones do not. The result is that most PC’s are likely vulnerable to this particularly nasty form of attack.

Ransomware became big news when WannaCry first appeared in 2017, crippling organizations all around the world, and while attack volume has lessened since then, the threat of attack has now become routine.

There are two main forms of ransomware. The first encrypts your files so you can’t access them, unless you pay a ransom, usually to an anonymous bitcoin account, to the attacker. The other form locks up your PC so that your only apparent option is to pay to gain access to your PC again.

This is why it’s all the more important to ensure that you have some form of protection on your PC against ransomware attacks. And while we list five of the best white knights who aim to help recover your PC from ransomware, it remains a stressful process you’re best avoiding by having protection in the first place.

  • This is our best antivirus buying guide
  • See how afree VPNcan help keep you safer online

If you haven’t yet fallen victim to a ransomware attack and want to protect your PC proactively, consider a dedicated prevention tool like ZoneAlarm Anti-Ransomware, which uses behavioral analysis to identify processes that act like ransomware – even if it’s not yet a specific known threat – and automatically backs up your files if it detects anything. It carries a subscription fee, so we haven’t included it in our main roundup, but $1.99 per month for one PC is a modest fee compared to the ransoms charged by criminals.

  • Discover thebest free antivirus software
  • Want your company or services to be added to this buyer’s guide? Please email your request to desire.athow@futurenet.com with the URL of the buying guide in the subject line.

avast-ransomware-tools.jpg

Image credit: Avast

(Image: © Avast)

1. Avast Free Ransomware Decryption Tools

Solutions designed to defeat different strains of ransomware

Step-by-step guidance
Tackles 21 forms of ransomware
Frequently updated

Not all ransomware encrypts data in the same way, so security software providers have to create specific solutions as new threats emerge. At the time of writing, the security experts at Avast have developed Free Ransomware Decryption Tools to tackle 21 different strains of file-locking ransomware.

To help you work out which one you need, Avast has provided a detailed description of how each form of ransomware works, what extension you’ll see on the encrypted files, and an example of the type of message the virus creators have prepared for their victims. 

Once you’ve downloaded the appropriate tool, it will guide you through the process of wiping out the ransomware without paying the criminals. You’ll need to provide two versions of the same file – an encrypted one, and the original.

This will be easiest if you made a backup before the infection, but Avast also suggests locations where you might be able to find unaffected original files. The  tool will then compare the two and use the results to determine the password.

Download here:Avast Free Ransomware Decryption Tools

trend-micro-antiransomware.jpg

Image credit: Trend Micro

(Image: © Trend Micro)

2. Trend Micro Ransomware File Decryptor

A single download that can defeat 27 breeds of ransomware

All tools provided in one download
Regular updates
Decryption may be incomplete

Trend Micro Ransomware File Decryptor is updated regularly with new ransomware definitions, and at the time of writing it can release files locked by 27 different types of ransomware and their variants.

Unlike Avast, Trend Micro bundles all its decryption tools into one bundle, but you still need to tell it what form of ransomware it’s

!–>
Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
Read More

Continue Reading
Antivirus

The best antivirus software of 2025: Stay safe from online attacks and ransomware scams

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…
Read More

Continue Reading
Antivirus

Why This Budget-Friendly VPN & Antivirus Combo Is Blowing Up

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…
Read More

Continue Reading
Antivirus

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


  • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
  • This malware only activates during checkout, making it a silent threat to online payments
  • The script opens a WebSocket connection for live control, completely invisible to the average user

A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

You may like

  • Google Apps Script abused to launch dangerous phishing attacks
  • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
  • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

Malware hidden in plain sight

The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

Read More

Continue Reading