Ad.yieldmanager.com

Posted: June 6, 2006 | Category: Tracking Cookies | Threat Level: 1/10
Screenshot Ad.yieldmanager.com, adyieldmanager.com or yieldmanager.com, is a tracking cookie designed to keep track of how many times you visit a website and how long you stay, your browser type, your IP address, and other web surfing activities which are sent back to the cookie's host site. Generally, cookies are not dangerous in nature. Cookies are even helpful since they allow websites to store user preferences (login credentials, personalize web pages, etc.). Yet there are cookies that are used for malicious purposes. In the wrong hands, a cookie can be harmful and turn into a...

YTDownloader Virus

Posted: | Category: Adware | Threat Level: 2/10
YTDownloader is a browser add-on that allows you to download YouTube-based movie content, but also makes several negative modifications to your Web browser. Considered a PUP, much like some other software by the same company (such as highly-similar Youtube Accelerator and Shopper-Pro apps), YTDownloader may redirect your browser or load advertisements. When it comes to removing YTDownloader from your browser, malware analysts recommend using anti-adware or general anti-malware tools with dependable histories of wielding PUP-deletion functions to good effect. Movie Downloads that...

Zlob

Posted: | Category: Backdoors | Threat Level: 8/10
Screenshot Zlob is a large family of multiple-component trojans that use several threats in coordination to hijack your web browsers and install malicious programs. Zlob is particularly closely-associated with rogue security applications like Windows AV Component that create fake infection warnings and other inaccurate system alerts. The goal of any rogue security program is to steal your credit card information and money, and Zlob assists them in that endeavor through a variety of methods that attack your web browser and potentially your security programs. If you've found an unusual security...

Wajam

Posted: | Category: Search Tools | Threat Level: 2/10
Wajam is a Potentially Unwanted Program that loads extra advertisements in your Web searches. Although only a PUP, Wajam has strong ties to other PC threats and websites of poor repute, and some PC security companies classify its official website (Wajam.com) as a threatening domain. Due its background and the frequency of Wajam causing performance issues for affected browsers, malware researchers find that uninstalling Wajam from your Web browser is more likely to give you a satisfying Web-searching experience than allowing Wajam to stay. Installing a Program that Gives You Extra...

Koobface

Posted: | Category: Worms | Threat Level: 9/10
Koobface is a worm that infects computers by using the messaging system of social networks like Facebook and MySpace. Other Koobface known variants are Boface, W32.Koobface, Net-Worm.Win32.Koobface.b, and W32/Koobface. The Koobface worm attacks profiles by sending an email to a user's Facebook inbox with subjects like "You look just awesome in this new movie" or "You look funny in this new video" and the email message provides a link to a malicious video website. The malicious video website will prompt the user to download the fake video codec file flash_player.exe under the assumption...

CryptoWall Ransomware

Posted: | Category: Ransomware | Threat Level: 10/10
Screenshot The CryptoWall Ransomware is a file encryptor Trojan that encodes the data of different file types and holds them hostage. The persons responsible for distributing the CryptoWall Ransomware through hacked websites and other methods demand that any victims make a high payment to return the affected files to readability, but malware researchers recommend against this course of action. As opposed to rewarding ill-minded persons for attacking your PC, file backups can let you restore any encrypted files for free, and anti-malware tools, as usual, can remove the CryptoWall Ransomware,...

Discover Treasure Ads

Posted: | Category: Adware | Threat Level: 2/10
Discover Treasure is an ad-oriented web extension that promises to enhance your online shopping. Just like the other similar shopping optimizers, Discover Treasure states it will show you the best deals and offers for the particular day. In theory, this activity should allow you to find the online stores that sell the products that you need at the cheapest price. In reality, the opinion of the clients about this adware tends to be negative, and many prefer to delete it as soon as they notice the changes that it causes. Discover Treasure may create many ads in the web browsers of the...

Qvo6 Hijacker

Posted: | Category: Browser Hijackers | Threat Level: 5/10
Screenshot The Qvo6 hijacker is a browser hijacker that's promoted by Qvo6.com as a useful search-enhancing utility, even though Qvo6's real search-related features appear to be limited to redirecting PC users to popular search engines like Google. Installation methods for the Qvo6 hijacker appear to include many non-consensual methods, and although Qvo6.com does provide uninstallation instructions, these instructions may not remove all of the components of any particular Qvo6 hijacker. As a standard precaution against Qvo6 hijacker infections, malware researchers recommend using anti-malware...

Bronze Aid Ads

Posted: | Category: Adware | Threat Level: 2/10
Bronze Aid is adware that may expose you to numerous additional commercial materials when you are online. According to the creator of this unreliable add-on, which is SuperWeb LLC, the purpose of new deals, coupons and vouchers is to make it easier for you to shop online. Theoretically, the ads should let you buy the things you need at a lower price. The real consequences for the browsers, however, may not be as positive as some clients could anticipate. The commercial materials that Bronze Aid inserts may come in large quantities, which may cause annoyance and minor performance problems....

DNS Unlocker

Posted: | Category: Potentially Unwanted Programs (PUPs) | Threat Level: 2/10
The DNS Unlocker is a utility for modifying how your PC interacts with the Domain Name System hierarchy, which may affect which websites your browser loads. While neither illegal nor threatening, the DNS Unlocker's features are easily exploitable for undesirable side effects, such as injected advertisements, redirecting your browser or blocking various websites. Since these risks may outweigh the DNS Unlocker's benefits, malware experts recommend removing the DNS Unlocker for any PC users who aren't completely comfortable with all of the risks and benefits of modifying their DNS settings....

HackTool:Win32/Keygen

Posted: | Category: Trojans | Threat Level: 8/10
HackTool:Win32/Keygen is a malicious tool that generates keys (special codes) for illegally-obtained versions of various software products. HackTool:Win32/Keygen may initially seem beneficial but it does pose a threat to PC security as it may cause system malfunctions. HackTool:Win32/Keygen may put a computer user at risk of using software that is illegally registered. Because the HackTool:Win32/Keygen infection could generate the code to register warez or software that was never purchased, the programs may run without essential updates causing further software issues. Failing to...

Reveton

Posted: August 14, 2012 | Category: Ransomware
Screenshot Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which SpywareRemove.com malware experts have noted are especially common in Europe, although other countries...

MyStart by Incredibar

Posted: January 18, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Screenshot MyStart by Incredibar is an adware program that displays advertisements. While similar adware plugins have been known to be bundled with freely-distributed programs, malware experts have also caught websites using browser exploits to install MyStart sans any other software. If you notice symptoms of the presence of Incredibar's MyStart while you browse the web, you should remove MyStart with anti-malware software that can delete all of MyStart without difficulties, including its Registry-based components. Normal software removal methods have been confirmed to fail on MyStart, although,...

‘You Have 48 Hours to Pay the Fine’ Ransomware

Posted: February 18, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot 'You Have 48 Hours to Pay the Fine' Ransomware is ransomware that locks your computer and recommends that you transfer money to a third-party to restore your PC. Instead of rewarding criminals for their malware-coding crimes, SpywareRemove.com malware experts suggest deleting 'You Have 48 Hours to Pay the Fine' Ransomware with a traditional anti-malware product from a trustworthy brand. Most ransomware-based PC threats like 'You Have 48 Hours to Pay the Fine' Ransomware are incapable of penalizing you for failing to pay their fines – even if, just like 'You Have 48 Hours To Pay The...

Rogue.Winfix 10

Posted: February 8, 2016 | Category: Rogue Optimizer Programs
The Winfix 10 system optimizer might be offered to you as a powerful tool to speed up your computer, but is is classified as a rogue optimizer program. Security investigators report that the Winfix 10 rogue optimizer may claim to improve your system security and provide '1-Click Maintenance', but it will display many fake critical errors. The Winfix 10 rogue optimizer will list hundreds of problems on your computer to scare you into buying a license to solve those problems. Security investigators note that the Winfix 10 rogueware does not have a digital certificate, and there is no evidence...

‘.uzltzyc File Extension’ Ransomware

Posted: February 8, 2016 | Category: Ransomware
The '.uzltzyc File Extension' Ransomware is a cryptomalware that targets the victims' files stored on their hard drives. The '.uzltzyc File Extension' Ransomware is a variant of the notorious CTB Locker , which also is known as Critoni. The Trojan may make all of your valuable data inaccessible. The parasite holds the affected computers hostage until the PC user pays a ransom. The '.uzltzyc File Extension' ransomware uses encryption methods that are hard to break. If you don't have a backup of your hard disks, you may find yourself in an unpleasant situation. To prevent it from happening,...

‘.trun File Extension’ Ransomware

Posted: February 8, 2016 | Category: Ransomware | Threat Level: 10/10
The '.trun File Extension' Ransomware is a file-encrypting Trojan that locks the whole computer of its victims. The '.trun File Extension' Ransomware uses complex RSA mechanisms to change the core structure of all targeted files. The process makes it impossible for the PC user to open or modify them in any way. The name of this parasite comes from the extension of the affected data. All locked files will acquire a new extension after their default one – .trun. From this moment on, you may lose your information forever unless you have a backup stored on an external device or uploaded to a...

HydraCrypt Ransomware

Posted: February 4, 2016 | Category: Ransomware | Threat Level: 10/10
The HydraCrypt Ransomware is a Trojan that encrypts the files on your PC and, then, sells a decryption solution. Its delivery strategies focus on using compromised Websites and browser exploits to install itself automatically, leaving victims unaware of the security breach until the Trojan takes their files hostage. A combination of robust backups, heavy browser security, and active anti-malware programs should be able to block any permanent damage from the HydraCrypt Ransomware's payload and remove the HydraCrypt Ransomware from infected PCs, when appropriate. When Your Browser Says...

Buddy Ransomware

Posted: February 3, 2016 | Category: Ransomware | Threat Level: 10/10
The Buddy Ransomware is a file encrypting Trojan that holds your data up for ransom so that the Buddy Ransomware can receive Bitcoin payments. Since ransoming files affected by the Buddy Ransomware may not provide the necessary decryption service to restore your information, malware researchers typically don't encourage that you pay the fees endorsed by these Trojans. Instead, employ security procedures as necessary for regaining access to your PC, and run anti-malware products capable of detecting and then uninstalling the Buddy Ransomware. The Buddy Who's Always Asking You for Money...

‘Doctor@freelinuxmail.org’ Ransomware

Posted: January 27, 2016 | Category: Ransomware | Threat Level: 10/10
The 'Doctor@freelinuxmail.org' Ransomware is an encryption Trojan: a Trojan that makes selected files unreadable in the hopes of selling a reversal of the process back to you. Like other encryptors, the 'Doctor@freelinuxmail.org' Ransomware is more likely to target information that's not essential to your PC, such as documents, text, images, audio files, archives and spreadsheets. Removing the 'Doctor@freelinuxmail.org' Ransomware and other file encryptors may require using dedicated anti-malware tools, after which you should use a variety of free options for recovering any damaged files....

7ev3n Ransomware

Posted: January 25, 2016 | Category: Ransomware | Threat Level: 10/10
The 7ev3n Ransomware is a file-encrypting Trojan that scans for data falling under non-essential formats (unrelated to your operating system) and encrypts them, making them unopenable and unreadable. Although the 7ev3n Ransomware displays a ransom message demanding a Bitcoin money transferral in exchange for a decryption solution, malware experts, instead, recommend restoring it from a dependable file backup. Removing the 7ev3n Ransomware always should include using anti-malware products able to identify both the 7ev3n Ransomware and related threats that may be responsible for its...

LeChiffre Ransomware

Posted: January 25, 2016 | Category: Ransomware | Threat Level: 10/10
The LeChiffre Ransomware is a new type of ransomware that has been troubling businesses across the world for some time. Just like other ransomware threats, the LeChiffre Ransomware also works by encrypting the user's files and offering to decrypt them in exchange for a hefty amount of money. However, there are several peculiar things about the LeChiffre Ransomware that make this threat more unique than your typical ransomware. The LeChiffre Ransomware isn't fully automated – the ransomware must be run manually on the victim's computer, and the LeChiffre Ransomware can't be spread...

RackCrypt Ransomware

Posted: January 25, 2016 | Category: Ransomware | Threat Level: 10/10
The RackCrypt Ransomware is a Trojan that encrypts your files and then asks for money in return for restoring them. Since paying the RackCrypt Ransomware's ransom can't guarantee the provision of a real decryption service, malware experts always encourage keeping secure backups that can avoid the payloads of threats like the RackCrypt Ransomware. Most PC users should remove the RackCrypt Ransomware with anti-malware products able to detect its frequently mislabeled components, which may disguise themselves as being other applications. The Program Putting Your Finances on the Rack...

‘.abc File Extension’ Ransomware

Posted: January 22, 2016 | Category: Ransomware | Threat Level: 10/10
The '.abc File Extension' Ransomware is a new variant of the TeslaCrypt Ransomware that modifies files through encryption, making them unusable, and asks for cash in exchange for providing a reversal of the file formatting attack. PC security experts have been deploying new decryptors for the '.abc File Extension' Ransomware and other TeslaCrypt Ransomware variants for free, and malware researchers also recognize most backup strategies as being effective against this threat. Before recovering your files, you also should uninstall the '.abc File Extension' Ransomware from your system with a...

Tarocrypt Ransomware

Posted: January 22, 2016 | Category: Ransomware | Threat Level: 10/10
The Tarocrypt Ransomware is a Trojan that encrypts the files on your PC to force you into paying a ransom fee for reversing its attacks. Affected files are left unusable until you decrypt them, although the con artists may not necessarily provide this service after receiving any payment. Although removing the Tarocrypt Ransomware and related security threats with anti-malware tools always should take priority, methodical backup strategies also can help prevent the Tarocrypt Ransomware from doing irreparable damage. When Anonymity Protection Goes Bad Products like Tor , the...

‘.zzz File Extension’ Ransomware

Posted: January 21, 2016 | Category: Ransomware | Threat Level: 10/10
The '.zzz File Extension' Ransomware is a threatening software that isolates your files according to their formats, encrypts them, and delivers a ransom message for how to 'save' the affected data. Following through on ransom demands may not salvage any encrypted files, and malware experts recommend using conventional backup strategies preferentially, instead of paying the '.zzz File Extension' Ransomware's authors. Anti-malware tools can delete the '.zzz File Extension' Ransomware most easily, which has a high chance of using semi-random names for some of its components. A Ransomware...

‘.exx File Extension’ Ransomware

Posted: January 21, 2016 | Category: Ransomware | Threat Level: 10/10
The '.exx File Extension' Ransomware is a file encryptor that scans your hard drive, blocks files of particular types by modifying their internal data, and delivers a ransom message for buying a service to undo these attacks. However, the naturally inconstant nature of decryption ransoms causes malware experts to recommend using almost any other solution to an '.exx File Extension' Ransomware attack. For most PCs, removing the '.exx File Extension' Ransomware with anti-malware products and restoring files from a remote backup should be sufficient for resolving the issue. How Data...

‘.ezz File Extension’ Ransomware

Posted: January 21, 2016 | Category: Ransomware | Threat Level: 10/10
The '.ezz File Extension' Ransomware is a Trojan that uses file encryption for blocking and then ransoming your data, including documents, images or even gaming files. Since reversing encryption is frequently difficult or impossible, malware experts heavily recommend including backup strategies in your work routine that can let you restore your files remotely. Removing the '.ezz File Extension' Ransomware always is best delegated to an anti-malware application. Threat Attacks with New Files but Old Stratagems The '.ezz File Extension' Ransomware is part of an emerging crop of...

‘.ecc File Extension’ Ransomware

Posted: January 20, 2016 | Category: Ransomware | Threat Level: 10/10
The '.ecc File Extension' Ransomware is a threat that encrypts your files, making them unusable in the process, after which the '.ecc File Extension' Ransomware attempts to sell its victims an expensive decryption service being run by its admins. There is a high likelihood of the '.ecc File Extension' Ransomware removing local backup information simultaneously, but remote backups are a free alternative to using a file decryptor. Dedicated anti-malware tools always should be involved with uninstalling the '.ecc File Extension' Ransomware. The New Scope of Targets for Modern Ransomware...
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 2289
Follow Us