Anti-Ransomware CryptoBuster v1.0.935 Beta 2 Released

We at Smart PC Utilities are very excited to announce the release of the second beta of our anti-ransomware software CryptoBuster. This new update brings a small but important set of changes and bug fixes that aims to improve the software’s performance and reliability, therefore, the user experience.

You can download the new CryptoBuster version from the CryptoBuster download page.

In the following notes, you will get a summary of features, enhancements, and bug fixes brought by CryptoBuster v1.0.935. You can view the complete list of changes on the CryptoBuster release notes page.

What is New in the Anti-Ransomware Solution, CryptoBuster v1.0.935:

New Features

  • Added the ability to filter the CryptoBuster security events by their status in the Security History.
  • Added an option in the CryptoBuster settings that allows to turn off and disable all CryptoBuster’s features.


  • Improved the CryptoBuster dashboard.
  • CryptoBuster uninstaller can now delete all honeypots created by CryptoBuster.
  • CryptoBuster can now show alerts about license expiration.

Bug fixes

  • Fixed a critical bug that caused the CryptoBuster service to crash on computers using languages other than English.
  • Fixed bugs in the CryptoBuster licensing system.
  • Several bug fixes.

CryptoBuster v1.0.823 Beta 1 has a known issue that affects the updates installer module; this will prevent CryptoBuster from installing this update automatically, so you will have to download and install the new version manually.

CryptoBuster – A New Anti-Ransomware Solution

We at Smart PC Utilities are proud to announce the release of the first Beta of our new anti-ransomware solution CryptoBuster. We designed our new software solution to work with your existing security product to offer an additional security layer and form the last line of defense against ransomware to protect your valuable data from permanent damage.

CryptoBuster features a user-friendly interface that makes it very easy to use and customize; it also has a small system footprint so that it can run smoothly side by side with your existing security solution without affecting the system performance.

The current CryptoBuster Beta offers two main protection modules to help detect and stop ransomware, Honeypots and File Extensions Monitor.


Honeypots are decoy files that CryptoBuster uses to detect malicious activities on your computer; this is an efficient and proven technique with low false-positive chances to detect and stop ransomware when they start to encrypt the user files.

You can either create honeypots manually customizing their names, locations, and file types, or you can take advantage of the Honeypots Wizard that can deploy dozens of honeypot files in all critical system locations using custom names and file types that would allow ransomware to target those honeypots before they start to encrypt the user’s files, thus protecting important data from being encrypted by ransomware.

CrpyotBuster will instantly monitor the created honeypots and will notify you when an unauthorized program changes a honeypot file as this strongly indicates malicious activity. Besides notifying the user about honeypot changes, CryptoBuster can be configured to respond to honeypot changes with a series of actions aimed to prevent data damage like sending an email notification, suspending the program that changed the honeypot then terminating its process tree, and disabling all active network adapters.

Learn more about honeypots and how to use them to protect your computer from ransomware from the CryptoBuster user guide.

File Extensions Monitor

Besides Honeypots that are effective to stop ransomware when they start to encrypt the user files, File Extensions Monitor can monitor the file system to detect the creation of specific types of files that may indicate ongoing ransomware attack or sometimes may indicate the preparations for an attack.

For instance, CryptoBuster can detect the creation of files with extensions that are known to be used by ransomware to encrypt user files, also you can configure CryptoBuster to detect the creation of potentially dangerous files like batch files and scripts that are commonly used in ransomware attacks, or even to detect the creation of files of unknown types which is an aggressive technique used to stop most of the ransomware strains that change file extensions.

Learn about the File Extensions Monitor and how to properly configure it to help detect ransomware from the CryptoBuster user guide.


We will continue to improve the existing CryptoBuster protection modules and introduce new ones; here are some features and ideas we are working on:

  • The development of a Windows Driver to intercept and block ransomware at the Kernel level.
  • Support the creation of honeypots and file monitoring in network shares.
  • New protection module to monitor services, scheduled tasks, and startup programs to prevent ransomware from achieving persistence.
  • Working on techniques to detect and prevent data exfiltration.

Please feel free to report any bugs and share any feedback and suggestions you have; this will greatly help us improve our software solution.

System Requirements

Free 30-day CryptoBuster Trial

NSA Identifies ‘Critical Vulnerability’ In Microsoft Windows 10

The National Security Agency disclosed that it has identified a “critical vulnerability” (CVE-2020-0601) in Microsoft Windows 10, however neither the agency nor Microsoft has, to date, seen exploitation of the flaw, which affects millions of computers.

But rather than exploit the flaw for its own intelligence needs, the NSA tipped off Microsoft so that it can fix the system for everyone.

The NSA issued a cybersecurity advisory on Tuesday, calling the flaw “severe” and said that “sophisticated cyber actors will understand the underlying flaw very quickly and the consequences of not patching the vulnerability are severe and widespread”.

Optimize Windows 10 For Gaming: Prevent Store Apps From Running in the Background

Microsoft released details about the vulnerability, which could allow an attacker to use a spoofed code-signing certificate to sign malicious software. This would allow the malware to appear to be from a trusted source and could make detection significantly more difficult.

This vulnerability affects Windows 10, and while it has not yet been exploited in the wild, it may be only a matter of time before someone looks to take advantage of unpatched systems.

How to Patch Windows 10?

Microsoft released a software patch to fix the flaw and credited the NSA for discovering it. The company said it has not seen any evidence that hackers have used the technique.

  • If you have Windows 10 Automatic Updates enabled by default, your system will attempt to install the updates when they are downloaded, likely over the next several days.
  • If you want to run your Windows Update manually to get the patch more quickly, follow these instructions from Microsoft and click the “Check for Windows updates” button.
  • Alternatively, click the Start button, select Settings, then Update & Security, then Windows Update, and click Check for updates to run Windows Update manually.

Exit mobile version