Ad.yieldmanager.com

Posted: June 6, 2006 | Category: Tracking Cookies | Threat Level: 1/10
Screenshot Ad.yieldmanager.com, adyieldmanager.com or yieldmanager.com, is a tracking cookie designed to keep track of how many times you visit a website and how long you stay, your browser type, your IP address, and other web surfing activities which are sent back to the cookie's host site. Generally, cookies are not dangerous in nature. Cookies are even helpful since they allow websites to store user preferences (login credentials, personalize web pages, etc.). Yet there are cookies that are used for malicious purposes. In the wrong hands, a cookie can be harmful and turn into a...

SalePlus

Posted: | Category: Adware
SalePlus is classified as a Potentially Unwanted Program that comes into your computer by downloading a free software through a download manager. In most cases, download managers include additional programs such as SalePlus that have adware-related symptoms. Once installed, the browser extension starts injecting adware into your browser. The result of this adware is the display of several commercial advertisements like pop-ups, sponsored links, banners, coupons, etc. It is possible that these advertisements may lead to undesired websites; such cases of redirects are created with the...

StealRat

Posted: | Category: Botnets | Threat Level: 7/10
StealRat is a backdoor Trojan that uses a botnet to conduct spam-based attacks through a multi-step setup that's designed to avoid being detected by traditional security protocols. Because of StealRat's simple but effective mechanism of offloading much of its attack process through compromised websites, you're unlikely to notice any obvious symptoms of a StealRat infection on your computer, despite its ability to exploit your PC's own resources for illegal attacks against arbitrary e-mail addresses. Already, tens of thousands of PCs are estimated to be infected by StealRat, which has seen...

Freshy Toolbar

Posted: | Category: Bad Toolbars | Threat Level: 5/10
The Freshy Toolbar is a Potentially Unwanted Program that modifies your browser for redirecting you to Conduit.com , a general search engine domain. Malware researchers have had past encounters with Conduit.com and don't rate it as a threat, but do warn that you usually will be safer than otherwise if you remove the Freshy Toolbar and other Conduit-brand products from your browser. Allowing the Freshy Toolbar to remain on your browser is essentially the same as allowing a third party company to determine what sites your browser visits, which is a bad practice both for overall online...

Delta-homes.com

Posted: | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Delta-Homes or Delta-Homes.com is a search site that redirects all of its searches to the much more well-known Google and promotes companies that have been confirmed for disreputable business practices (such as stealing content from competitors' websites). Although not very dangerous for you or your PC, Delta-Homes also is promoted by the browser-redirecting attacks of browser hijackers who also have a history of tampering with their victims' desktop icons. If your desktop icons begin to reroute you to Delta-Homes, or you experience other Delta-Homes-related problems, you should be...

Browse Pulse

Browse Pulse is a browser add-on noted for its advertising content, as well as its claims of supposedly enhancing its user's browser search results. While the meaningful advantages of its additional search results are questionable, Browse Pulse does provide tangible drawbacks in the form of its advertisements, which may interfere with other Web pages or deliver harmful content through your browser. Unless you have individual reasons for avoiding removing Browse Pulse, malware experts would recommend handling Browse Pulse's uninstall routine with quality anti-adware products. The Pulse...

YTDownloader Virus

Posted: | Category: Adware | Threat Level: 2/10
YTDownloader is a browser add-on that allows you to download YouTube-based movie content, but also makes several negative modifications to your Web browser. Considered a PUP, much like some other software by the same company (such as highly-similar Youtube Accelerator and Shopper-Pro apps), YTDownloader may redirect your browser or load advertisements. When it comes to removing YTDownloader from your browser, malware analysts recommend using anti-adware or general anti-malware tools with dependable histories of wielding PUP-deletion functions to good effect. Movie Downloads that...

OfferApp Ads

Posted: | Category: Adware | Threat Level: 2/10
OfferApp is a browser extension that delivers product recommendations and price comparisons as in-browser advertisements. In addition to being a potential risk to your Web browser's health, some versions of OfferApp also may attempt to block their deletion or generate additional files in unusual locations. However, malware researchers have found no indications that deleting OfferApp will fail when assisted by appropriate anti-adware utilities and standard security precautions. The Advertisement Offer You don't get a Chance to Refuse Because of their ability to provide minute, but...

Dragon Branch Ads

Dragon Branch is detected as a Potentially Unwanted Program (PUP). Customarily, PUPs such as Dragon Branch are distributed using a variety of questionable marketing methods. Users may acquire Dragon Branch via freeware downloads or by downloading it themselves. Either way, a PUP that exhibits adware capabilities such as Dragon Branch is not recommended to be kept on your computer. Typically, PUPs like Dragon Branch are known to pretend to offer useful features related to your online experience, but in reality, they are not as good as advertised. Dragon Branch starts collecting information...

Google Redirect Virus

Posted: | Category: Viruses | Threat Level: 8/10
Screenshot Google Redirect Virus is a rootkit and backdoor Trojan that earned its name from Google Redirect Virus' central function of redirecting you to unrelated websites, after you click a search result link. Despite this function being Google-specific, Google Redirect Virus infections can also have many different secondary functions, with prominent possibilities including downloading other malicious programs, creating a backdoor in your PC security and creating advertisements. Although Google Redirect Virus has no beneficial purposes and shouldn't remain on your computer, removing Google...

Offers4U

Posted: | Category: Adware | Threat Level: 2/10
Offers4U is an online advertising network focusing on shopping 'bargains' that often are themed after the content of the sites that you visit. While the content promoted through Offers4U isn't a major threat to your PC, malware researchers have seen Offers4U advertisements may deliberately ignore basic browser security features, along with Offers4U adware's tendency to install itself surreptitiously. Offers4U pop-up issues are particularly common for Chrome but also may affect other browsers, and the use of anti-malware products to delete Offers4U adware always should be considered as...

Reveton

Posted: August 14, 2012 | Category: Ransomware
Screenshot Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which SpywareRemove.com malware experts have noted are especially common in Europe, although other countries...

MyStart by Incredibar

Posted: January 18, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Screenshot MyStart by Incredibar is an adware program that displays advertisements. While similar adware plugins have been known to be bundled with freely-distributed programs, malware experts have also caught websites using browser exploits to install MyStart sans any other software. If you notice symptoms of the presence of Incredibar's MyStart while you browse the web, you should remove MyStart with anti-malware software that can delete all of MyStart without difficulties, including its Registry-based components. Normal software removal methods have been confirmed to fail on MyStart, although,...

‘You Have 48 Hours to Pay the Fine’ Ransomware

Posted: February 18, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot 'You Have 48 Hours to Pay the Fine' Ransomware is ransomware that locks your computer and recommends that you transfer money to a third-party to restore your PC. Instead of rewarding criminals for their malware-coding crimes, SpywareRemove.com malware experts suggest deleting 'You Have 48 Hours to Pay the Fine' Ransomware with a traditional anti-malware product from a trustworthy brand. Most ransomware-based PC threats like 'You Have 48 Hours to Pay the Fine' Ransomware are incapable of penalizing you for failing to pay their fines – even if, just like 'You Have 48 Hours To Pay The...

Threat Finder Ransomware

Posted: May 18, 2015 | Category: Ransomware
The Threat Finder Ransomware is a file encrypting Trojan used to deprive you of access to your PC and its data before demanding its victims pay Bitcoin fines equivalent to roughly 300 USD. The Threat Finder Ransomware doesn't include self-distributing functions in and of itself, but other threats may install the Threat Finder Ransomware, including Trojans malware experts link to compromised Flash advertising networks. As with many, equivalent threats, removing the Threat Finder Ransomware after its installation may require both dedicated anti-malware tools and additional steps for avoiding...

BitCryptor Ransomware

Posted: May 14, 2015 | Category: Ransomware
Screenshot BitCryptor Ransomware, also referred to as Bit Cryptor, is an updated variant of CoinVault , a file encryption Trojan. Although the BitCryptor Ransomware takes care to avoid damaging OS files, the BitCryptor Ransomware will encrypt and render unusable most non-essential files of popular formats. Like other Trojans of its ilk, the BitCryptor Ransomware uses its attacks as an initial step in demanding a ransom fee via Bitcoin. For their part, malware experts recommend alternative solutions, such as blocking or removing the BitCryptor Ransomware with anti-malware tools, as cheaper and...

‘Los Pollos Hermanos’ Crypto Virus

Posted: May 11, 2015 | Category: Ransomware
The 'Los Pollos Hermanos' Crypto Virus is a file encryptor that targets files on the infected PC with a data-scrambling attack, afterward displaying a ransom message requesting payment for the restoration of your lost information. Although the 'Los Pollos Hermanos' Crypto Virus uses a whimsical ransom note referencing pop culture, in all other respects, the 'Los Pollos Hermanos' Crypto Virus is identical to prior file encrypting Trojans already surveyed by malware experts. Deleting the 'Los Pollos Hermanos' Crypto Virus with appropriate anti-malware equipment and avoiding any payment of its...

Alpha Crypt

Posted: April 30, 2015 | Category: Ransomware
Alpha Crypt, also known as AlphaCrypt, is a file encryption Trojan that targets files of particular formats and makes them unusable for holding for ransom. In addition to text files, image files, movie files and other, common targets, Alpha Crypt also sabotages files associated with major gaming applications. Despite the potential disruption to stored data on the infected PC, malware experts discourage paying Alpha Crypt's ransom, particularly as an alternative to deleting Alpha Crypt with a trusted brand of anti-malware software. From Beta Malware to Alpha Crypt Attacks abusing...

KRIPTOVOR Ransomware

Posted: April 10, 2015 | Category: Ransomware
The KRIPTOVOR Ransomware is a file encryptor Trojan that includes features for other attacks on a modular basis, and also may collect file data. Although the KRIPTOVOR Ransomware originates in Russia, and current samples are configured primarily for targeting victims using Cyrillic script documents, its functions also may endanger the files and machines of PC users residing elsewhere. As a reasonable precaution against file encryption attacks, malware researchers advise using routine, remote backup strategies in combination with regular anti-malware scans to delete the KRIPTOVOR Ransomware...

CrypVault

Posted: April 8, 2015 | Category: Ransomware
CrypVault is a file encrypting Trojan that also incorporates spyware add-ons capable of collecting information, such as your account login. While CrypVault has seen the greatest rates of distribution in Russia and neighboring countries, CrypVault also has begun to be seen in meaningful numbers elsewhere, including North America. During its attacks, CrypVault portrays itself as a legitimate PC security tool for recovering locked files. However, malware researchers see no advantages in victims paying its ransom and recommend responding to CrypVault as threatening software, with appropriate...

Ransom:Win32/Isda

Posted: April 3, 2015 | Category: Ransomware
Ransom:Win32/Isda is a ransomware that is mostly distributed via spam e-mail attachments. Computer security experts advise users not to pay the ransom presented by Ransom:Win32/Isda. Sometimes, trojan downloaders are also capable of attracting ransomware to your computer. Infections such as Ransom:Win32/Isda are intended to generate income for cyber crooks by encrypting files on their systems and providing a non-standard payment method. The presence of Ransom:Win32/Isda ransom message is a signal that there is an infection on your computer, and it is advisable that you use a powerful...

‘PacMan’ Ransomware

Posted: March 27, 2015 | Category: Ransomware | Threat Level: 10/10
The 'PacMan' Ransomware is a file encryption Trojan that recently saw distribution in targeted e-mail attacks focused on European chiropractors. In addition to locking your files in exchange for a ransom fee, the 'PacMan' Ransomware also conducts other attacks, such as collecting personal information and disabling standard security solutions. Paying the 'PacMan' Ransomware's ransom has no certainty of restoring your files, and malware specialists advise using anti-malware tools to disable the 'PacMan' Ransomware alongside file backup protocols that can render your data immune to its...

AntiVirus PRO 2015

Posted: March 27, 2015 | Category: Rogue Anti-Virus Programs
AntiVirus PRO 2015 is a rogue anti-virus program whose GUI imitates the looks, but not functionality, of a legitimate AV suite, including file-scanning technology and pop-up warnings against relevant attacks or vulnerabilities. While AntiVirus PRO 2015 will use its supposed security features to encourage the premium registration of its software, doing so offers no virus removal advantages for your computer. Accordingly, malware experts have categorized AntiVirus PRO 2015 as scamware. Standard course of action for dealing with fraudulent AV products like AntiVirus PRO 2015 should include...

Protective Antivirus 2015

Posted: March 26, 2015 | Category: Rogue Anti-Virus Programs
Protective Antivirus 2015 is a rogue anti-virus scanner that detects imaginary threats such as nonexistent backdoor Trojans or remote hacking tools automatically. While providing imitations of actual security features, Protective Antivirus 2015 exhorts its users to purchase a registered version of its suite for the removal of all 'detected' threats. As malware researchers have classified Protective Antivirus 2015 as scamware, this program should not be purchased, nor any attempts made to communicate with its developers. However, for your PC's overall safety, removing Protective Antivirus...

Security Defender Pro 2015

Posted: March 24, 2015 | Category: Rogue Anti-Virus Programs
Security Defender Pro 2015, also known as Defender Pro 2015, is a rogue anti-malware program that imitates the features of actual anti-malware suites as a means of extorting money with its software registration requests. The registered version of Security Defender Pro 2015 is no more capable of protecting your system from infections than its unregistered version. However, Defender Pro 2015 may generate believable pop-up alerts that highly resemble the warnings of real PC security suites. Because many members of Security Defender Pro 2015's estimated family of scamware, the family also are...

VaultCrypt

Posted: March 18, 2015 | Category: Ransomware
VaultCrypt is a file encryptor Trojan that uses a combination of Visual Basic scripts, batch files and third-party freeware to encrypt your files, rendering them unusable until you pay a Bitcoin fee to its admins. While previously seen distributed towards Russian PC users, VaultCrypt now is beginning to make headway in Canada and other, English-speaking regions, although much of its well-developed infrastructure still is in a transitional state. Despite the inherent difficulties in recovering files from this threat, paying its ransom is not a course of action malware experts would...

Cryptexplorer.us

Posted: March 16, 2015 | Category: Ransomware
Cryptexplorer.us is a threatening Web domain associated with the activities of backdoor Trojans and some forms of ransomware, such as file encrypting Trojans. Like any threatening site, and even if you make no effort to interact with it, Cryptexplorer.us should be regarded as a direct threat to your PC's safety. Repeated, unwanted contact with Cryptexplorer.us can be resolved with the same anti-malware products malware researchers would advise your using in most cases of infections. Exploring What goes into a Cryptexplorer.us Pop-Up Cryptexplorer.us is just one of many websites with...

EpicScale

Posted: March 9, 2015 | Category: Ransomware
Epic Scale is a cryptocurrency miner that generates Bitcoins and other, digital currencies through using your PC's unallocated resources. While Epic Scale isn't a threat and makes no attempts to hide itself from the PC's users, side effects of its installation may be detrimental. As an extra caveat, recent third-party bundles have included an apparent misconfiguration that installs Epic Scale automatically. A Potentially Unwanted Program may be judged on a case by case basis, but if you have any doubts about the appropriateness of this software's presence, malware experts can suggest...

CryptoFortress

Posted: March 6, 2015 | Category: Ransomware
CryptoFortress is a file encryptor Trojan that uses an RSA encryption algorithm to make your stored data unreadable. After modifying your files, CryptoFortress also places instructions on your hard drive demanding cash payment in return for their restoration. Like other file encryption Trojans, there are zero guarantees of CryptoFortress's keeping its word after receiving payment, which is why malware experts recommend alternative solutions to its attacks. Anti-malware tools in conjunction with good file backup strategies should allow you to both remove CryptoFortress and protect your data...
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 2228
Follow Us