Ad.yieldmanager.com

Posted: June 6, 2006 | Category: Tracking Cookies | Threat Level: 1/10
Screenshot Ad.yieldmanager.com, adyieldmanager.com or yieldmanager.com, is a tracking cookie designed to keep track of how many times you visit a website and how long you stay, your browser type, your IP address, and other web surfing activities which are sent back to the cookie's host site. Generally, cookies are not dangerous in nature. Cookies are even helpful since they allow websites to store user preferences (login credentials, personalize web pages, etc.). Yet there are cookies that are used for malicious purposes. In the wrong hands, a cookie can be harmful and turn into a...

Freshy Toolbar

Posted: | Category: Bad Toolbars | Threat Level: 5/10
The Freshy Toolbar is a Potentially Unwanted Program that modifies your browser for redirecting you to Conduit.com , a general search engine domain. Malware researchers have had past encounters with Conduit.com and don't rate it as a threat, but do warn that you usually will be safer than otherwise if you remove the Freshy Toolbar and other Conduit-brand products from your browser. Allowing the Freshy Toolbar to remain on your browser is essentially the same as allowing a third party company to determine what sites your browser visits, which is a bad practice both for overall online...

OfferApp Ads

Posted: | Category: Adware | Threat Level: 2/10
OfferApp is a browser extension that delivers product recommendations and price comparisons as in-browser advertisements. In addition to being a potential risk to your Web browser's health, some versions of OfferApp also may attempt to block their deletion or generate additional files in unusual locations. However, malware researchers have found no indications that deleting OfferApp will fail when assisted by appropriate anti-adware utilities and standard security precautions. The Advertisement Offer You don't get a Chance to Refuse Because of their ability to provide minute, but...

Delta-homes.com

Posted: | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Delta-Homes or Delta-Homes.com is a search site that redirects all of its searches to the much more well-known Google and promotes companies that have been confirmed for disreputable business practices (such as stealing content from competitors' websites). Although not very dangerous for you or your PC, Delta-Homes also is promoted by the browser-redirecting attacks of browser hijackers who also have a history of tampering with their victims' desktop icons. If your desktop icons begin to reroute you to Delta-Homes, or you experience other Delta-Homes-related problems, you should be...

Trojan.CoinMiner.J

Posted: | Category: Trojans | Threat Level: 8/10

YTDownloader Virus

Posted: | Category: Adware | Threat Level: 2/10
YTDownloader is a browser add-on that allows you to download YouTube-based movie content, but also makes several negative modifications to your Web browser. Considered a PUP, much like some other software by the same company (such as highly-similar Youtube Accelerator and Shopper-Pro apps), YTDownloader may redirect your browser or load advertisements. When it comes to removing YTDownloader from your browser, malware analysts recommend using anti-adware or general anti-malware tools with dependable histories of wielding PUP-deletion functions to good effect. Movie Downloads that...

Koobface

Posted: | Category: Worms | Threat Level: 9/10
Koobface is a worm that infects computers by using the messaging system of social networks like Facebook and MySpace. Other Koobface known variants are Boface, W32.Koobface, Net-Worm.Win32.Koobface.b, and W32/Koobface. The Koobface worm attacks profiles by sending an email to a user's Facebook inbox with subjects like "You look just awesome in this new movie" or "You look funny in this new video" and the email message provides a link to a malicious video website. The malicious video website will prompt the user to download the fake video codec file flash_player.exe under the assumption...

Cantix.A

Posted: | Category: Worms | Threat Level: 5/10

FindWide

Posted: | Category: Adware | Threat Level: 5/10
Screenshot FindWide is a browser hijacker that, once installed on the infected computer, adds a browser add-on on the compromised Internet browser. FindWide installs itself on the targeted PC together with numerous shareware or freeware applications. Usually, the option to install a toolbar of FindWide is pre-checked and even invisible during the common installation process. FindWide hijacks search results in any legal search engine and redirect victims to its own website called search.findwide.com. Search.findwide.com is supported by FindWide, which displays pop-up ads from Microsoft and is...

PriceMinus

Posted: | Category: Adware
PriceMinus is an adware application that is known for rendering alert notifications that are presented as advertisements. Through the PriceMinus ads a computer user may be enticed to click on them, which will result in causing a web site redirect to a page that may have questionable content. Additionally, the PriceMinus sites that you are redirected to may contain other links and ads that cause redirects to other questionable sites that may have malicious downloads. Eliminating the PriceMinus ads may consist of finding the various associated plugins or browser extensions, which may be done...

Record Page Ads

Posted: | Category: Adware
Ads by Record Page may appear within your web browsers as additional advertising materials due to an adware infection currently infecting your computer. Record Page is classified as adware that is known to infiltrate users' computer via questionable marketing methods such as bundling with other third-party applications. In order to achieve a higher distribution rate, adware creators utilize methods such as bundling. Users are advised to remain attentive during the installation process of all free applications and carefully read the EULA (End User License Agreement). In case your computer...

Reveton

Posted: August 14, 2012 | Category: Ransomware
Screenshot Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which SpywareRemove.com malware experts have noted are especially common in Europe, although other countries...

MyStart by Incredibar

Posted: January 18, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Screenshot MyStart by Incredibar is an adware program that displays advertisements. While similar adware plugins have been known to be bundled with freely-distributed programs, malware experts have also caught websites using browser exploits to install MyStart sans any other software. If you notice symptoms of the presence of Incredibar's MyStart while you browse the web, you should remove MyStart with anti-malware software that can delete all of MyStart without difficulties, including its Registry-based components. Normal software removal methods have been confirmed to fail on MyStart, although,...

‘You Have 48 Hours to Pay the Fine’ Ransomware

Posted: February 18, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot 'You Have 48 Hours to Pay the Fine' Ransomware is ransomware that locks your computer and recommends that you transfer money to a third-party to restore your PC. Instead of rewarding criminals for their malware-coding crimes, SpywareRemove.com malware experts suggest deleting 'You Have 48 Hours to Pay the Fine' Ransomware with a traditional anti-malware product from a trustworthy brand. Most ransomware-based PC threats like 'You Have 48 Hours to Pay the Fine' Ransomware are incapable of penalizing you for failing to pay their fines – even if, just like 'You Have 48 Hours To Pay The...

ABOUT FILES! Ransomware

Posted: June 18, 2015 | Category: Ransomware
ABOUT FILES! is a ransomware infection that utilizes RSA and AES ciphers to encrypt files on the infected PC. Computer security researchers have been speculating that the ABOUT FILES! Ransomware might be a version of PClock. The ABOUT FILES! Ransomware has a .txt document that is named ABOUT FILES! since the name of this encrypting malware is yet unknown. The message by ABOUT FILES! Ransomware suggests a couple of actions for users to choose: 'Hi guys! We have bad news for you. Your files have been crypted by 2 popular alghoritms - AES and RSA. Only we have private RSA key All...

Tox Ransomware

Posted: June 5, 2015 | Category: Ransomware
The Tox Ransomware is a file encryption Trojan built with the 'Tox' toolkit, a development platform for ransomware being promoted in late May of 2015 – and, only a week later, canceled. Despite the change of heart by the administrator of the Tox Ransomware toolkit, variants of the Tox Ransomware remain capable of attacking your personal files and encrypting them for ransom purposes. Backing up your files and keeping active anti-malware protection can provide your data with the best protection from any file encrypting attack, while removing the Tox Ransomware always should be viable with a...

Troldesh Ransomware

Posted: June 3, 2015 | Category: Ransomware
Screenshot The Troldesh Ransomware is a file encryption Trojan that modifies the personal data of your computer as a preliminary to holding it for ransom. After its initial attacks, the Troldesh Ransomware also displays telltale ransom messages and other, readily visible symptoms, including a request to open direct, e-mail communication with its developers. However, there is a degree of inherent unreliability in purchasing decryption services from the persons responsible for the original attacks. As a result, malware experts discourage it, instead recommending using anti-malware products for...

Cryptobot Ransomware

Posted: May 26, 2015 | Category: Ransomware
The Cryptobot Ransomware is a file encryption Trojan that may install itself through Trojan droppers embedded in the file attachments of fraudulent e-mail messages. Like CryptoWall or Critoni , the Cryptobot Ransomware encrypts files on your PC to make them unreadable and then provides instructions for how to pay its maintainers for access to a theoretical decryption service. There are no guarantees with this payment method, and you should seek alternative methods of protecting your files from the Cryptobot Ransomware while using anti-malware strategies as needed for removing the...

Locker Virus

Posted: May 25, 2015 | Category: Ransomware
The Locker Ransomware is a recent variant of the Critoni Ransomware (CTB-Locker) and includes similar attacks meant to hold your files hostage for payment. Because the Locker Ransomware's file encryption attacks may damage your saved data, having multiple methods of backup file storage is one of the primary defenses malware experts advise implementing prior to a Locker Ransomware infection. Dedicated anti-malware products always should be used for deleting the Locker Ransomware immediately, since this Trojan is a direct threat to your computer's security, independently from its threat to...

Antivirus Pro 2017

Posted: May 25, 2015 | Category: Rogue Anti-Virus Programs | Threat Level: 10/10
Antivirus Pro 2017 is a rogue anti-malware scanner that may block your access to various websites or applications. Although Antivirus Pro 2017 undertakes these actions under the pretense of protecting your computer, its actual motivation is to prevent its removal until you transfer money through its registration process. Since there are no benefits to owning a 'registered' version of this scamware, malware experts consider deleting Antivirus Pro 2017 with legitimate anti-malware tools to be the only tenable response. The New Professional in Antivirus Tactics Antivirus Pro 2017 is...

Ai88 Ransomware

Posted: May 25, 2015 | Category: Ransomware
The Ai88 Ransomware is a file encryptor that may modify the files on your PC, holding them hostage for payment. As per the norm, the Ai88 Ransomware insists that paying its fee will restore your files to their ordinary, decrypted formats. However, malware experts offer a more dependable alternative: backing up your files and using anti-malware tools to solicit the Ai88 Ransomware's uninstallation. Despite the potential danger that the Ai88 Ransomware poses to files on your hard drive, the Ai88 Ransomware has not been found to include other, noteworthy attack features. Nonetheless, the Ai88...

Threat Finder Ransomware

Posted: May 18, 2015 | Category: Ransomware
The Threat Finder Ransomware is a file encrypting Trojan used to deprive you of access to your PC and its data before demanding its victims pay Bitcoin fines equivalent to roughly 300 USD. The Threat Finder Ransomware doesn't include self-distributing functions in and of itself, but other threats may install the Threat Finder Ransomware, including Trojans malware experts link to compromised Flash advertising networks. As with many, equivalent threats, removing the Threat Finder Ransomware after its installation may require both dedicated anti-malware tools and additional steps for avoiding...

BitCryptor Ransomware

Posted: May 14, 2015 | Category: Ransomware
Screenshot BitCryptor Ransomware, also referred to as Bit Cryptor, is an updated variant of CoinVault , a file encryption Trojan. Although the BitCryptor Ransomware takes care to avoid damaging OS files, the BitCryptor Ransomware will encrypt and render unusable most non-essential files of popular formats. Like other Trojans of its ilk, the BitCryptor Ransomware uses its attacks as an initial step in demanding a ransom fee via Bitcoin. For their part, malware experts recommend alternative solutions, such as blocking or removing the BitCryptor Ransomware with anti-malware tools, as cheaper and...

‘Los Pollos Hermanos’ Crypto Virus

Posted: May 11, 2015 | Category: Ransomware
The 'Los Pollos Hermanos' Crypto Virus is a file encryptor that targets files on the infected PC with a data-scrambling attack, afterward displaying a ransom message requesting payment for the restoration of your lost information. Although the 'Los Pollos Hermanos' Crypto Virus uses a whimsical ransom note referencing pop culture, in all other respects, the 'Los Pollos Hermanos' Crypto Virus is identical to prior file encrypting Trojans already surveyed by malware experts. Deleting the 'Los Pollos Hermanos' Crypto Virus with appropriate anti-malware equipment and avoiding any payment of its...

Alpha Crypt

Posted: April 30, 2015 | Category: Ransomware
Alpha Crypt, also known as AlphaCrypt, is a file encryption Trojan that targets files of particular formats and makes them unusable for holding for ransom. In addition to text files, image files, movie files and other, common targets, Alpha Crypt also sabotages files associated with major gaming applications. Despite the potential disruption to stored data on the infected PC, malware experts discourage paying Alpha Crypt's ransom, particularly as an alternative to deleting Alpha Crypt with a trusted brand of anti-malware software. From Beta Malware to Alpha Crypt Attacks abusing...

KRIPTOVOR Ransomware

Posted: April 10, 2015 | Category: Ransomware
The KRIPTOVOR Ransomware is a file encryptor Trojan that includes features for other attacks on a modular basis, and also may collect file data. Although the KRIPTOVOR Ransomware originates in Russia, and current samples are configured primarily for targeting victims using Cyrillic script documents, its functions also may endanger the files and machines of PC users residing elsewhere. As a reasonable precaution against file encryption attacks, malware researchers advise using routine, remote backup strategies in combination with regular anti-malware scans to delete the KRIPTOVOR Ransomware...

CrypVault

Posted: April 8, 2015 | Category: Ransomware
CrypVault is a file encrypting Trojan that also incorporates spyware add-ons capable of collecting information, such as your account login. While CrypVault has seen the greatest rates of distribution in Russia and neighboring countries, CrypVault also has begun to be seen in meaningful numbers elsewhere, including North America. During its attacks, CrypVault portrays itself as a legitimate PC security tool for recovering locked files. However, malware researchers see no advantages in victims paying its ransom and recommend responding to CrypVault as threatening software, with appropriate...

Ransom:Win32/Isda

Posted: April 3, 2015 | Category: Ransomware
Ransom:Win32/Isda is a ransomware that is mostly distributed via spam e-mail attachments. Computer security experts advise users not to pay the ransom presented by Ransom:Win32/Isda. Sometimes, trojan downloaders are also capable of attracting ransomware to your computer. Infections such as Ransom:Win32/Isda are intended to generate income for cyber crooks by encrypting files on their systems and providing a non-standard payment method. The presence of Ransom:Win32/Isda ransom message is a signal that there is an infection on your computer, and it is advisable that you use a powerful...

‘PacMan’ Ransomware

Posted: March 27, 2015 | Category: Ransomware | Threat Level: 10/10
The 'PacMan' Ransomware is a file encryption Trojan that recently saw distribution in targeted e-mail attacks focused on European chiropractors. In addition to locking your files in exchange for a ransom fee, the 'PacMan' Ransomware also conducts other attacks, such as collecting personal information and disabling standard security solutions. Paying the 'PacMan' Ransomware's ransom has no certainty of restoring your files, and malware specialists advise using anti-malware tools to disable the 'PacMan' Ransomware alongside file backup protocols that can render your data immune to its...
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 2235
Follow Us