Ad.yieldmanager.com

Posted: June 6, 2006 | Category: Tracking Cookies | Threat Level: 1/10
Screenshot Ad.yieldmanager.com, adyieldmanager.com or yieldmanager.com, is a tracking cookie designed to keep track of how many times you visit a website and how long you stay, your browser type, your IP address, and other web surfing activities which are sent back to the cookie's host site. Generally, cookies are not dangerous in nature. Cookies are even helpful since they allow websites to store user preferences (login credentials, personalize web pages, etc.). Yet there are cookies that are used for malicious purposes. In the wrong hands, a cookie can be harmful and turn into a...

DNS Unlocker

The DNS Unlocker is a utility for modifying how your PC interacts with the Domain Name System hierarchy, which may affect which websites your browser loads. While neither illegal nor threatening, the DNS Unlocker's features are easily exploitable for undesirable side effects, such as injected advertisements, redirecting your browser or blocking various websites. Since these risks may outweigh the DNS Unlocker's benefits, malware experts recommend removing the DNS Unlocker for any PC users who aren't completely comfortable with all of the risks and benefits of modifying their DNS settings....

YTDownloader Virus

Posted: | Category: Adware | Threat Level: 2/10
YTDownloader is a browser add-on that allows you to download YouTube-based movie content, but also makes several negative modifications to your Web browser. Considered a PUP, much like some other software by the same company (such as highly-similar Youtube Accelerator and Shopper-Pro apps), YTDownloader may redirect your browser or load advertisements. When it comes to removing YTDownloader from your browser, malware analysts recommend using anti-adware or general anti-malware tools with dependable histories of wielding PUP-deletion functions to good effect. Movie Downloads that...

CrossBrowse

CrossBrowse may seem like something that you actually respect, but it should be treated the complete opposite because it is a potentially unwanted program. The CrossBrowse program is known to load when installing random freeware programs where it may then act as a web browser add-on or browser extension. While running in the background CrossBrowse, is prone to loading random advertisements that attempt to offer random online sale discounts or coupon deals for shopping on the internet. Use of those various offers may cause redirects to load up other sites that may have questionable content...

HackTool:Win32/Keygen

Posted: | Category: Trojans | Threat Level: 8/10
HackTool:Win32/Keygen is a malicious tool that generates keys (special codes) for illegally-obtained versions of various software products. HackTool:Win32/Keygen may initially seem beneficial but it does pose a threat to PC security as it may cause system malfunctions. HackTool:Win32/Keygen may put a computer user at risk of using software that is illegally registered. Because the HackTool:Win32/Keygen infection could generate the code to register warez or software that was never purchased, the programs may run without essential updates causing further software issues. Failing to...

ArcadeCake

ArcadeCake is another Potentially Unwanted Program (PUP) that shows adware symptoms. ArcadeCake is a product by ArcadeCake LLC with its official website at arcadecake.com. At ArcadeCake's official website users can find a variety of free games that are available as soon as they download their software. The purpose of installing ArcadeCake software is to enable them to display advertising materials to the larger public. Ads by ArcadeCake may be in the shape of pop-ups, pop-unders, floating ads or inline text ads. If you check the Privacy Policy of ArcadeCake, you will see that the software...

GameZooks

Posted: | Category: Adware
GameZooks is a Potentially Unwanted Program that may deliver advertisements to your browser while also providing access to GameZooks-hosted Web games. GameZooks and adware products like GameZooks are common sources of various security and browser performance concerns, and you should remove GameZooks if it's not wanted. Because malware experts have seen cases of GameZooks being installed in uninstall-unfriendly formats, deleting GameZooks should use dedicated anti-adware products, when possible. When Gaming Chooses Your Browser's Content for You GameZooks is a browser extension...

HTML/ScrInject.B.Gen

Posted: | Category: Trojans | Threat Level: 9/10
HTML/ScrInject.B.Gen is a heuristic identifier for potentially threatening website content. Because HTML/ScrInject.B.Gen may be used in attacks that compromise your PC automatically, any detection of HTML/ScrInject.B.Gen always should be followed up with extended anti-malware scans. Although HTML/ScrInject.B.Gen's attack ordinarily is asymptomatic, threats installed by the attack may produce some symptoms, including system slowdowns or unusual crashes. Both browser security features and general anti-malware protection are recommended defenses against exposure to HTML/ScrInject.B.Gen....

RelevantKnowledge

Posted: | Category: Adware | Threat Level: 2/10
Screenshot RelevantKnowledge is a Netherlands-originating combination of spyware and adware, justified under the pretense of being useful for survey-related purposes. Just having RelevantKnowledge on your system opens up significant security risks and privacy issues, so it's not recommended that you put your trust in this program. An additional warning sign is that RelevantKnowledge may be difficult to remove and may require anti-malware procedures to actually uninstall. RelevantKnowledge's Friendly Facade Also known by Relevant Knowledge, RelevantKnowledge initially installs itself in a...

CryptoWall Ransomware

Posted: | Category: Ransomware | Threat Level: 10/10
Screenshot The CryptoWall Ransomware is a file encryptor Trojan that encodes the data of different file types and holds them hostage. The persons responsible for distributing the CryptoWall Ransomware through hacked websites and other methods demand that any victims make a high payment to return the affected files to readability, but malware researchers recommend against this course of action. As opposed to rewarding ill-minded persons for attacking your PC, file backups can let you restore any encrypted files for free, and anti-malware tools, as usual, can remove the CryptoWall Ransomware,...

Freshy Toolbar

Posted: | Category: Bad Toolbars | Threat Level: 5/10
The Freshy Toolbar is a Potentially Unwanted Program that modifies your browser for redirecting you to Conduit.com , a general search engine domain. Malware researchers have had past encounters with Conduit.com and don't rate it as a threat, but do warn that you usually will be safer than otherwise if you remove the Freshy Toolbar and other Conduit-brand products from your browser. Allowing the Freshy Toolbar to remain on your browser is essentially the same as allowing a third party company to determine what sites your browser visits, which is a bad practice both for overall online...

Reveton

Posted: August 14, 2012 | Category: Ransomware
Screenshot Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which SpywareRemove.com malware experts have noted are especially common in Europe, although other countries...

MyStart by Incredibar

Posted: January 18, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Screenshot MyStart by Incredibar is an adware program that displays advertisements. While similar adware plugins have been known to be bundled with freely-distributed programs, malware experts have also caught websites using browser exploits to install MyStart sans any other software. If you notice symptoms of the presence of Incredibar's MyStart while you browse the web, you should remove MyStart with anti-malware software that can delete all of MyStart without difficulties, including its Registry-based components. Normal software removal methods have been confirmed to fail on MyStart, although,...

‘You Have 48 Hours to Pay the Fine’ Ransomware

Posted: February 18, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot 'You Have 48 Hours to Pay the Fine' Ransomware is ransomware that locks your computer and recommends that you transfer money to a third-party to restore your PC. Instead of rewarding criminals for their malware-coding crimes, SpywareRemove.com malware experts suggest deleting 'You Have 48 Hours to Pay the Fine' Ransomware with a traditional anti-malware product from a trustworthy brand. Most ransomware-based PC threats like 'You Have 48 Hours to Pay the Fine' Ransomware are incapable of penalizing you for failing to pay their fines – even if, just like 'You Have 48 Hours To Pay The...

ORX-Locker

Posted: September 1, 2015 | Category: Ransomware
The cyberspace is currently filled with all kinds of malware. Some of them are very complex and dangerous, but luckily their creation is beyond the capabilities of most evil-minded people. Unfortunately, the qualified hackers quickly found a new market niche and started selling their harmful products to anyone willing to pay. Exactly this is the case with the perilous ransomware ORX-Locker. It copies the mechanisms of the notorious Tox Ransomware . Same as the other types of ransomware, ORX-Locker aims towards the personal files of the user. As soon as it reaches the system, this tool...

Onion Ransomware

Posted: August 27, 2015 | Category: Ransomware
The Onion Ransomware is a file encryptor that modifies your files for the purpose of holding them for ransom. Like other file encryption Trojans, the Onion Ransomware can't offer any guarantee that paying its ransom will return your files to a usable condition. As a consequence of that risk, malware researchers don't advise rewarding the Onion Ransomware's developers in response to an infection. Common backup strategies can prevent the Onion Ransomware from causing any long- term harm while good anti-malware products may remove the Onion Ransomware from your machine. The Many Layers of...

‘SimpleLocker’ Ransomware

Posted: August 13, 2015 | Category: Ransomware
The 'SimpleLocker' Ransomware is a file encryptor that, after compromising your machine, modifies your files to block them until you've paid a ransom. The 'SimpleLocker' Ransomware especially has been known for targeting Android devices but displays all of the standard features, including the fraudulent warning messages of other types of ransom threats. Even paying the illicit fine may not restore your files, and malware researchers advise you to use secure backup strategies in conjunction with anti-malware tools that can delete the 'SimpleLocker' Ransomware. A New Problem with Your...

DESKRYPTEDN81 Ransomware

Posted: August 6, 2015 | Category: Ransomware
The DESKRYPTEDN81 Ransomware is a file encryptor Trojan that makes files on your PC unusable to ransom them for money. Recent evidence suggests that the DESKRYPTEDN81 Ransomware campaigns are being targeted towards German and Russian PC owners, although the DESKRYPTEDN81 Ransomware's attacks may be equally effective against other systems, regardless of geography. Deleting the DESKRYPTEDN81 Ransomware with anti-malware products can be followed by using any of several data recovery techniques malware experts always advise for protecting your information from file encryptors. Seeing Your...

Encryptor RaaS

Posted: July 30, 2015 | Category: Ransomware
Encryptor RaaS is a harmful Trojan that aims directly at your personal files and makes them unreadable. If it manages to sneak into your system, the vicious ransomware will immediately perform a system scan to locate all of your valuable data. Encryptor RaaS can lock files with over 400 different extensions – including your pictures, Office documents, videos, music, presentations and so on. The only files that remain unaffected are used by the operating system, and the cyber criminals want your PC to be able to load. If your system is unable to boot, you will never notice the lockdown...

CryptPKO Ransomware

Posted: July 30, 2015 | Category: Ransomware
CryptPKO Ransomware is the name of a vicious Trojan, which may deprive you of access to your valuable personal files. This cyber threat modifies the configuration of the majority of files on your hard drive. The dangerous program adds .i8xmgq after the regular name of the files, which makes them unopenable. To decrypt the locked data, the people behind CryptPKO Ransomware demand payment. The requested amount of money is a typical ransom, and you should not consider paying it. No matter how much money they want, the cyber criminals may not hold their end of the deal. This extortion method...

‘Decipher@keemail.me’ Ransomware

Posted: July 16, 2015 | Category: Ransomware
The 'Decipher@keemail.me' Ransomware is a file encryptor Trojan that may make modifications to make files of popular formats (such as images and text documents) unreadable. As with similar threats, these attacks are intended to coerce the victim into transferring money to the 'Decipher@keemail.me' Ransomware's developers in exchange for a decryption key. Anti-malware solutions can be used to block the 'Decipher@keemail.me' Ransomware's original installers and various delivery methods. However, even after deleting the 'Decipher@keemail.me' Ransomware, additional steps are necessary for...

Rector Ransomware

Posted: July 2, 2015 | Category: Ransomware
The Rector Ransomware (also IDed as Trojan-Ransom.Win32.Rector or Ransom:Win32/Rector.A) is a file encryption Trojan that deprives you of access to your files in exchange for demanding a ransom. The Rector Ransomware's attacks may be accompanied by automatic network contact with remote servers, as well as changes in file names. As with any ransomware campaign, malware experts suggest that you ignore the Rector Ransomware's ransom demand and use proper anti-malware products to delete the Rector Ransomware and restore your computer. The Files Renamed into Ransoms Many file encryption...

ABOUT FILES! Ransomware

Posted: June 18, 2015 | Category: Ransomware
The ABOUT FILES! Ransomware (also referred to as error_(filename).xls Ransomware, according to its file renaming style), is a file encryption Trojan. The ABOUT FILES! Ransomware prevents you from accessing important files by rearranging their data, afterward holding the key to reversing its attack hostage for money. Malware researchers aren't able to verify the safety or reliability of bargaining with third parties for a file recovery service. However, you can use dependable backup strategies, along with proven anti-malware solutions, for overcoming and removing the ABOUT FILES! Ransomware....

Tox Ransomware

Posted: June 5, 2015 | Category: Ransomware
The Tox Ransomware is a file encryption Trojan built with the 'Tox' toolkit, a development platform for ransomware being promoted in late May of 2015 – and, only a week later, canceled. Despite the change of heart by the administrator of the Tox Ransomware toolkit, variants of the Tox Ransomware remain capable of attacking your personal files and encrypting them for ransom purposes. Backing up your files and keeping active anti-malware protection can provide your data with the best protection from any file encrypting attack, while removing the Tox Ransomware always should be viable with a...

Troldesh Ransomware

Posted: June 3, 2015 | Category: Ransomware
Screenshot The Troldesh Ransomware is a file encryption Trojan that modifies the personal data of your computer as a preliminary to holding it for ransom. After its initial attacks, the Troldesh Ransomware also displays telltale ransom messages and other, readily visible symptoms, including a request to open direct, e-mail communication with its developers. However, there is a degree of inherent unreliability in purchasing decryption services from the persons responsible for the original attacks. As a result, malware experts discourage it, instead recommending using anti-malware products for...

Cryptobot Ransomware

Posted: May 26, 2015 | Category: Ransomware
The Cryptobot Ransomware is a file encryption Trojan that may install itself through Trojan droppers embedded in the file attachments of fraudulent e-mail messages. Like CryptoWall or Critoni , the Cryptobot Ransomware encrypts files on your PC to make them unreadable and then provides instructions for how to pay its maintainers for access to a theoretical decryption service. There are no guarantees with this payment method, and you should seek alternative methods of protecting your files from the Cryptobot Ransomware while using anti-malware strategies as needed for removing the...

Locker Virus

Posted: May 25, 2015 | Category: Ransomware
The Locker Ransomware is a recent variant of the Critoni Ransomware (CTB-Locker) and includes similar attacks meant to hold your files hostage for payment. Because the Locker Ransomware's file encryption attacks may damage your saved data, having multiple methods of backup file storage is one of the primary defenses malware experts advise implementing prior to a Locker Ransomware infection. Dedicated anti-malware products always should be used for deleting the Locker Ransomware immediately, since this Trojan is a direct threat to your computer's security, independently from its threat to...

Antivirus Pro 2017

Posted: May 25, 2015 | Category: Rogue Anti-Virus Programs | Threat Level: 10/10
Antivirus Pro 2017 is a rogue anti-malware scanner that may block your access to various websites or applications. Although Antivirus Pro 2017 undertakes these actions under the pretense of protecting your computer, its actual motivation is to prevent its removal until you transfer money through its registration process. Since there are no benefits to owning a 'registered' version of this scamware, malware experts consider deleting Antivirus Pro 2017 with legitimate anti-malware tools to be the only tenable response. The New Professional in Antivirus Tactics Antivirus Pro 2017 is...

Ai88 Ransomware

Posted: May 25, 2015 | Category: Ransomware
The Ai88 Ransomware is a file encryptor that may modify the files on your PC, holding them hostage for payment. As per the norm, the Ai88 Ransomware insists that paying its fee will restore your files to their ordinary, decrypted formats. However, malware experts offer a more dependable alternative: backing up your files and using anti-malware tools to solicit the Ai88 Ransomware's uninstallation. Despite the potential danger that the Ai88 Ransomware poses to files on your hard drive, the Ai88 Ransomware has not been found to include other, noteworthy attack features. Nonetheless, the Ai88...
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 2243
Follow Us