Posted: June 6, 2006 | Category: Tracking Cookies | Threat Level: 1/10
Screenshot, or, is a tracking cookie designed to keep track of how many times you visit a website and how long you stay, your browser type, your IP address, and other web surfing activities which are sent back to the cookie's host site. Generally, cookies are not dangerous in nature. Cookies are even helpful since they allow websites to store user preferences (login credentials, personalize web pages, etc.). Yet there are cookies that are used for malicious purposes. In the wrong hands, a cookie can be harmful and turn into a...


Posted: | Category: | Threat Level: 1/10
AdTech is a tracking cookie that monitors your Internet activity and gathers your personal information as you surf the web. This information may be retrieved by the parent company, without your consent.

YTDownloader Virus

Posted: | Category: Adware | Threat Level: 2/10
YTDownloader is a browser add-on that allows you to download YouTube-based movie content, but also makes several negative modifications to your Web browser. Considered a PUP, much like some other software by the same company (such as highly-similar Youtube Accelerator and Shopper-Pro apps), YTDownloader may redirect your browser or load advertisements. When it comes to removing YTDownloader from your browser, malware analysts recommend using anti-adware or general anti-malware tools with dependable histories of wielding PUP-deletion functions to good effect. Movie Downloads that...

Treasure Track Ads

Posted: | Category: Adware | Threat Level: 2/10
Treasure Track is adware created to display various ads to its clients. It is promoted as a shopping enhancer, which means that the add-on doesn't offer any other functions. The developer of Treasure Track is a company named Super Web LLC. For some users, this name may be unfamiliar, but the cyber security specialists link Super Web LLC with multiple highly questionable applications like Any Angle , Back to Back and Global Gadget . Treasure Track annoys the majority of people for several reasons. First of all, the presence of this add-on is often unrequested as it travels bundled with...


Posted: | Category: Search Tools | Threat Level: 2/10
Wajam is a Potentially Unwanted Program that loads extra advertisements in your Web searches. Although only a PUP, Wajam has strong ties to other PC threats and websites of poor repute, and some PC security companies classify its official website ( as a threatening domain. Due its background and the frequency of Wajam causing performance issues for affected browsers, malware researchers find that uninstalling Wajam from your Web browser is more likely to give you a satisfying Web-searching experience than allowing Wajam to stay. Installing a Program that Gives You Extra...


Posted: | Category: Worms | Threat Level: 9/10
Koobface is a worm that infects computers by using the messaging system of social networks like Facebook and MySpace. Other Koobface known variants are Boface, W32.Koobface, Net-Worm.Win32.Koobface.b, and W32/Koobface. The Koobface worm attacks profiles by sending an email to a user's Facebook inbox with subjects like "You look just awesome in this new movie" or "You look funny in this new video" and the email message provides a link to a malicious video website. The malicious video website will prompt the user to download the fake video codec file flash_player.exe under the assumption...


Posted: | Category: Trojans | Threat Level: 9/10
HTML/ScrInject.B.Gen is a heuristic identifier for potentially threatening website content. Because HTML/ScrInject.B.Gen may be used in attacks that compromise your PC automatically, any detection of HTML/ScrInject.B.Gen always should be followed up with extended anti-malware scans. Although HTML/ScrInject.B.Gen's attack ordinarily is asymptomatic, threats installed by the attack may produce some symptoms, including system slowdowns or unusual crashes. Both browser security features and general anti-malware protection are recommended defenses against exposure to HTML/ScrInject.B.Gen....


Posted: | Category: Adware | Threat Level: 2/10
Adware.Baidu is an adware application, which is related to a Chinese search engine. Usually, Adware.Baidu secretly installs itself through browser security exploits or via other unethical mechanisms. Once executed, Adware.Baidu will generate hundreds of annoying popup adverts based on your browsing habits. Adware.Baidu may also connect to the Internet, download, and then install additional malware.


Posted: | Category: Worms | Threat Level: 5/10

Middle Rush Ads

Posted: | Category: Potentially Unwanted Programs (PUPs) | Threat Level: 2/10
You should always check the details when you install freeware because otherwise you may load suspicious tools against your will. An example of applications that it is best to ignore is Middle Rush. This program is adware, which means that it may place additional commercial materials in Google Chrome, Mozilla Firefox and Internet Explorer. The ads may come in such great quantities that it may affect the performance of the browsers. Once Middle Rush hooks towards Web clients as an extension, you may start encountering pop-ups, banners, interstitial ads and videos on the majority of sites. If...


Posted: | Category: Adware | Threat Level: 2/10
Screenshot RelevantKnowledge is a Netherlands-originating combination of spyware and adware, justified under the pretense of being useful for survey-related purposes. Just having RelevantKnowledge on your system opens up significant security risks and privacy issues, so it's not recommended that you put your trust in this program. An additional warning sign is that RelevantKnowledge may be difficult to remove and may require anti-malware procedures to actually uninstall. RelevantKnowledge's Friendly Facade Also known by Relevant Knowledge, RelevantKnowledge initially installs itself in a...


Posted: August 14, 2012 | Category: Ransomware
Screenshot Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which malware experts have noted are especially common in Europe, although other countries...

MyStart by Incredibar

Posted: January 18, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Screenshot MyStart by Incredibar is an adware program that displays advertisements. While similar adware plugins have been known to be bundled with freely-distributed programs, malware experts have also caught websites using browser exploits to install MyStart sans any other software. If you notice symptoms of the presence of Incredibar's MyStart while you browse the web, you should remove MyStart with anti-malware software that can delete all of MyStart without difficulties, including its Registry-based components. Normal software removal methods have been confirmed to fail on MyStart, although,...

‘You Have 48 Hours to Pay the Fine’ Ransomware

Posted: February 18, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot 'You Have 48 Hours to Pay the Fine' Ransomware is ransomware that locks your computer and recommends that you transfer money to a third-party to restore your PC. Instead of rewarding criminals for their malware-coding crimes, malware experts suggest deleting 'You Have 48 Hours to Pay the Fine' Ransomware with a traditional anti-malware product from a trustworthy brand. Most ransomware-based PC threats like 'You Have 48 Hours to Pay the Fine' Ransomware are incapable of penalizing you for failing to pay their fines – even if, just like 'You Have 48 Hours To Pay The...

Power Worm Ransomware

Posted: November 11, 2015 | Category: Ransomware | Threat Level: 10/10
The Power Worm Ransomware is a PowerShell script Trojan that encrypts your files in attempts to ransom them for money. However, the Power Worm Ransomware's ransom message delivers inaccurate information about its features, and its file encryption attack is bugged currently, making your files undecryptable. The state of this threat only lends additional credence to the standard advice of malware experts when dealing with file encryptors, which is is to use anti-malware products for their removal and remote backups to save your files. The Power Worm Ransomware: A Trojan Coded for...

DecryptorMax Ransomware or CryptInfinite Ransomware

Posted: November 4, 2015 | Category: Ransomware | Threat Level: 10/10
The DecryptorMax Ransomware or CryptInfinite Ransomware is a file encryptor that modifies your files and displays requests for payment in return for undoing its attacks. As with any other file encryptor, the most direct defense against the DecryptorMax Ransomware's payload is to use a regular backup system, and malware experts don't recommend paying its 'fee.' Despite this Trojan's claims of using supposedly military coding standards, uninstalling the CryptInfinite Ransomware should be viable with most competent brands of anti-malware software. The DecryptorMax Ransomware: A Maximum...

‘Help recover files.txt’ Ransomware

Posted: October 16, 2015 | Category: Ransomware | Threat Level: 10/10
The 'Help recover files.txt' Ransomware is a file encryptor that uses an RSA-2048 encryption algorithm to prevent you from accessing personal or work-related files. The Trojan holds these files for ransom, which this threat's associated instruction text provides directions for paying. However, since these ransoms rely on the veracity of its perpetrators for restoring your data, malware experts advise alternative resolution methods, typically encompassing removing the 'Help recover files.txt' Ransomware with an anti-malware product, followed by using common backup strategies for retrieving...

‘’ Ransomware

Posted: October 12, 2015 | Category: Ransomware | Threat Level: 10/10
The '' Ransomware is a file encrypting Trojan, or threat that makes your files unreadable for the sake of holding them for ransom. Even though standard protocols for ransomware campaigns imply that victims may purchase a file decrypting service, malware experts advise holding onto any ransom funds and using file backup techniques to neuter the '' Ransomware's payload. Removing the '' Ransomware, similarly to all Trojans, should include the proper and timely use of reliable anti-malware programs and strategies. A Hairy Situation for...

Shade Ransomware

Posted: September 24, 2015 | Category: Ransomware | Threat Level: 10/10
The Shade Ransomware is a file encryption Trojan, or a Trojan that encrypts your files to make them unreadable. These attacks normally are followed by ransom demands for transferring money to 'buy' a decryption key for reversing the attack. Because of the suspect reliability and sheer illegality of these transactions, malware researchers advise using other solutions, such as deleting the Shade Ransomware with any anti-malware scanner, and then restoring your files from a secure backup. Shades of an Old Tactic Still Profiteering Russia is notable for its intractability to military...

Chimera Ransomware

Posted: September 24, 2015 | Category: Ransomware | Threat Level: 10/10
The Chimera Ransomware is a file encryptor that blocks your access to your files so that the Chimera Ransomware can force you to pay a cash ransom. Although the symptoms of the Chimera Ransomware attacks are very high in visibility, third parties rely on the difficulty of casual file decryption encouraging their victims to pay ransoms promptly. Nevertheless, there are no guarantees of receiving a decryption key after rewarding con artists for their behavior, and malware experts advise using anti-malware products to remove the Chimera Ransomware, as a preferable resolution. The Many...

Ninja Ransomware

Posted: September 21, 2015 | Category: Ransomware | Threat Level: 10/10
The Ninja Ransomware is a file encrypting Trojan that holds your files hostage in return for cash payments. Since paying third parties to decrypt your files has no guarantee of reciprocation, malware researchers consider almost any other means of preserving or restoring your files to be a preferable solution. As with other threatening programs that may try to block their deletion, removing the Ninja Ransomware may require using dedicated anti-malware software and strategies, such as scanning your computer from a sterile system boot environment. A Stealthy Program's Exfiltration of Your...

FBI Header Ransomware

Posted: September 17, 2015 | Category: Ransomware | Threat Level: 10/10
The FBI Header Ransomware is a Windows locker Trojan that uses your browser to block the desktop and deliver a fraudulent legal alert. Such legal warnings normally are meant to force their victims to transfer money to (in theory) unlock their machines, although malware experts have seen no signs of unlocking capabilities from the FBI Header Ransomware. Any warning messages delivered by this Trojan should be disregarded, with anti-malware products used for uninstalling the FBI Header Ransomware from PCs suffering from persistent symptoms of an infection. The FBI Agents You shouldn't Take...

ScreenLocker Ransomware

Posted: September 16, 2015 | Category: Ransomware | Threat Level: 10/10
The ScreenLocker Ransomware is a Trojan that restricts the PC owners' control over their machines until a survey process has been completed. This process may be used to collect your information (commonly known as 'phishing attack'), transfer money or expose you to other PC threats. If your computer is being victimized by a ScreenLocker Ransomware attack, you should use standardized anti-malware strategies and products to disinfect your machine while avoiding its lockdown (such as by switching to Safe Mode). The Questionnaire Holding Your Desktop Hostage People designing ransomware...

BandarChor Ransomware

Posted: September 8, 2015 | Category: Ransomware | Threat Level: 10/10
The BandarChor Ransomware is a file encryption Trojan that locks your files to force you to pay for their renewed use. Although the BandarChor Ransomware family's identification dates from mid-2014, its campaigns continue to see activity in the current year, with infection vectors using multiple strategies to target various victims. Malware researchers, as always, recommend your using the two-pronged approach of anti-malware products for deleting the BandarChor Ransomware, and reliable file backups for avoiding any collateral damage from its payload. The Kind of File Encoding You Want...


Posted: September 1, 2015 | Category: Ransomware | Threat Level: 10/10
ORX-Locker is a file encryption Trojan that recently has gained attention from a ransomware campaign reliant on third-party users for distributing ORX-Locker to their targets via whatever methods they see fit. Data protection through common methods such as remote file backups remain the simplest way to protect your information from ORX-Locker, and anti-malware applications should be used generously for removing ORX-Locker or any related threats. As always, any payment of ransoms offered by ORX-Locker is ill-advised. The File-Locking Service Coming to a PC Near You ORX-Locker's...

Onion Ransomware

Posted: August 27, 2015 | Category: Ransomware | Threat Level: 10/10
The Onion Ransomware is a file encryptor that modifies your files for the purpose of holding them for ransom. Like other file encryption Trojans, the Onion Ransomware can't offer any guarantee that paying its ransom will return your files to a usable condition. As a consequence of that risk, malware researchers don't advise rewarding the Onion Ransomware's developers in response to an infection. Common backup strategies can prevent the Onion Ransomware from causing any long- term harm while good anti-malware products may remove the Onion Ransomware from your machine. The Many Layers of...

‘SimpleLocker’ Ransomware

Posted: August 13, 2015 | Category: Ransomware
The 'SimpleLocker' Ransomware is a file encryptor that, after compromising your machine, modifies your files to block them until you've paid a ransom. The 'SimpleLocker' Ransomware especially has been known for targeting Android devices but displays all of the standard features, including the fraudulent warning messages of other types of ransom threats. Even paying the illicit fine may not restore your files, and malware researchers advise you to use secure backup strategies in conjunction with anti-malware tools that can delete the 'SimpleLocker' Ransomware. A New Problem with Your...

DESKRYPTEDN81 Ransomware

Posted: August 6, 2015 | Category: Ransomware | Threat Level: 10/10
The DESKRYPTEDN81 Ransomware is a file encryptor Trojan that makes files on your PC unusable to ransom them for money. Recent evidence suggests that the DESKRYPTEDN81 Ransomware campaigns are being targeted towards German and Russian PC owners, although the DESKRYPTEDN81 Ransomware's attacks may be equally effective against other systems, regardless of geography. Deleting the DESKRYPTEDN81 Ransomware with anti-malware products can be followed by using any of several data recovery techniques malware experts always advise for protecting your information from file encryptors. Seeing Your...

Encryptor RaaS

Posted: July 30, 2015 | Category: Ransomware | Threat Level: 10/10
Encryptor RaaS is a harmful Trojan that aims directly at your personal files and makes them unreadable. If it manages to sneak into your system, the vicious ransomware will immediately perform a system scan to locate all of your valuable data. Encryptor RaaS can lock files with over 400 different extensions – including your pictures, Office documents, videos, music, presentations and so on. The only files that remain unaffected are used by the operating system, and the cyber criminals want your PC to be able to load. If your system is unable to boot, you will never notice the lockdown...
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 2253
Follow Us