Ad.yieldmanager.com

Posted: June 6, 2006 | Category: Tracking Cookies | Threat Level: 1/10
Screenshot Ad.yieldmanager.com, adyieldmanager.com or yieldmanager.com, is a tracking cookie designed to keep track of how many times you visit a website and how long you stay, your browser type, your IP address, and other web surfing activities which are sent back to the cookie's host site. Generally, cookies are not dangerous in nature. Cookies are even helpful since they allow websites to store user preferences (login credentials, personalize web pages, etc.). Yet there are cookies that are used for malicious purposes. In the wrong hands, a cookie can be harmful and turn into a...

Google Redirect Virus

Posted: | Category: Viruses | Threat Level: 8/10
Screenshot Google Redirect Virus is a rootkit and backdoor Trojan that earned its name from Google Redirect Virus' central function of redirecting you to unrelated websites, after you click a search result link. Despite this function being Google-specific, Google Redirect Virus infections can also have many different secondary functions, with prominent possibilities including downloading other malicious programs, creating a backdoor in your PC security and creating advertisements. Although Google Redirect Virus has no beneficial purposes and shouldn't remain on your computer, removing Google...

MyStartSearch.com

Posted: | Category: Browser Hijackers
MyStartSearch.com is a search site that redirects its traffic to other search domains. Although MyStartSearch.com has no clear links with any illegal activities, malware researchers sometimes see browser-hijacking toolbars redirecting their users to MyStartSearch.com. Persistent exposure to advertisements through MyStartSearch.com may put your PC at risk, and removing MyStartSearch.com software is the default response advised for keeping your browser safe. The Start of MyStartSearch.com Hijacks MyStartSearch.com resembles a search site but doesn't provide independent links or...

Delta-homes.com

Posted: | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Delta-Homes or Delta-Homes.com is a search site that redirects all of its searches to the much more well-known Google and promotes companies that have been confirmed for disreputable business practices (such as stealing content from competitors' websites). Although not very dangerous for you or your PC, Delta-Homes also is promoted by the browser-redirecting attacks of browser hijackers who also have a history of tampering with their victims' desktop icons. If your desktop icons begin to reroute you to Delta-Homes, or you experience other Delta-Homes-related problems, you should be...

V9 Redirect Virus

Posted: | Category: Browser Hijackers | Threat Level: 5/10
Screenshot The V9 Redirect Virus is a browser hijacker that promotes V9.com – a link directory and search engine website. Although the V9.com's currently does not appear to have any direct association with the malicious software that redirects your browser to the V9 Redirect Virus, SpywareRemove.com malware experts are unable to verify the safety of all of V9.com's content and recommend that you browse the V9 Redirect Virus with caution. Meanwhile, the V9 Redirect Virus, like every browser hijacker, should be considered a danger to your PC's web-browsing security. To make sure that your...

CryptoLocker Ransomware

Posted: | Category: Ransomware | Threat Level: 10/10
Screenshot CryptoLocker, also identified as Trojan:Win32/Crilock.A, is a Windows locker Trojan that modifies a range of files on your PC to make them temporarily unusable and demands that you pay a fee before you can acquire the key to decrypt the affected files. As an added incentive to submit to CryptoLocker's ransom, CryptoLocker also warns that any attempt to remove the infection from your PC will cause the associated key to be deleted. Despite these threats, SpywareRemove.com malware experts consider it unlikely that criminals would bother to restore any affected PCs to normal after receiving...

Vid Adblock

Posted: | Category: Adware
Vid Adblock is an extension for your browser that blocks in-video advertisements from YouTube, but also injects its independent advertisements into arbitrary Web pages. This tradeoff may result in your browser having poor performance or being subjected to potentially unsafe advertisements, and most PC users should consider removing Vid Adblock from their browsers. However, any Potentially Unwanted Program, like Vid Adblock, may be weighed for its benefits and drawbacks on an individual basis. The Irony of a Would-Be Advertisement Blocker Vid Adblock (unrelated to Adblock, a...

Delta-search.com

Posted: | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Delta-search.com is a search engine website found to be associated with browser hijackers, which are known to lead to browser-redirecting attacks. While there is no evidence that Delta-search.com, by itself, is dangerous to your browser or your PC, browser hijacker-based infections that redirect you to Delta-search.com should be considered viable threats to your web-browsing safety. In addition to redirects to Delta-search.com, these browser hijackers also may redirect you to dangerous sites (such as hosts for Blackhole Exploit Kits ), neuter your browser's security settings or degrade...

Microsoft Security Essentials Alert Virus

Posted: | Category: Fake Warning Messages | Threat Level: 10/10
Screenshot The Microsoft Security Essentials Alert Virus is a ransomware Trojan that imitates the pop-up alerts of Microsoft Security Essentials to encourage you to pay an illegal fine through one of several methods. Because Microsoft Security Essentials Alert Virus may block other programs to prevent you from removing Microsoft Security Essentials Alert Virus and its pop-up, SpywareRemove.com malware analysts recommend disabling Microsoft Security Essentials Alert Virus's startup exploits prior to any anti-malware scans that could delete Microsoft Security Essentials Alert Virus safely. Contrary...

Home Malware Cleaner

Posted: | Category: Rogue Anti-Spyware Programs | Threat Level: 10/10
Screenshot Home Malware Cleaner should be considered to be anything but hygienic, since SpywareRemove.com malware researchers have traced Home Malware Cleaner's past through disreputable scamware like Malware Protection Center and all the way back to evidence of browser hijacks, attacks against PC security software and fraudulent security features. Even though Home Malware Cleaner has the appearance of a polished and reputable anti-malware scanner, there isn't a single virus or Trojan in the world that Home Malware Cleaner could detect or remove, and system analysis information from Home Malware...

Random Audio Ads Virus

Posted: | Category: Malware | Threat Level: 7/10
Screenshot The Audio Ads Virus is a colloquial name for Trojans, adware and similar PC threats that play streaming audio advertisements automatically. Some of the most infamous of these, such as Rootkit.Boot.Harbinger.a, are high-level PC threats that require extremely thorough anti-malware strategies to remove from your computer. An Audio Ads Virus often is identifiable only by its obvious symptoms, which may cause performance issues but, for the most part, are just one facet of an invasive PC threat that may conduct other attacks against your computer. Naturally, malware researchers suggest...

Reveton

Posted: August 14, 2012 | Category: Ransomware
Screenshot Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which SpywareRemove.com malware experts have noted are especially common in Europe, although other countries...

MyStart by Incredibar

Posted: January 18, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Screenshot MyStart by Incredibar is an adware program that displays advertisements. While similar adware plugins have been known to be bundled with freely-distributed programs, malware experts have also caught websites using browser exploits to install MyStart sans any other software. If you notice symptoms of the presence of Incredibar's MyStart while you browse the web, you should remove MyStart with anti-malware software that can delete all of MyStart without difficulties, including its Registry-based components. Normal software removal methods have been confirmed to fail on MyStart, although,...

‘You Have 48 Hours to Pay the Fine’ Ransomware

Posted: February 18, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot 'You Have 48 Hours to Pay the Fine' Ransomware is ransomware that locks your computer and recommends that you transfer money to a third-party to restore your PC. Instead of rewarding criminals for their malware-coding crimes, SpywareRemove.com malware experts suggest deleting 'You Have 48 Hours to Pay the Fine' Ransomware with a traditional anti-malware product from a trustworthy brand. Most ransomware-based PC threats like 'You Have 48 Hours to Pay the Fine' Ransomware are incapable of penalizing you for failing to pay their fines – even if, just like 'You Have 48 Hours To Pay The...

KRIPTOVOR Ransomware

Posted: April 10, 2015 | Category: Ransomware
The KRIPTOVOR Ransomware is a file encryptor Trojan that includes features for other attacks on a modular basis, and also may collect file data. Although the KRIPTOVOR Ransomware originates in Russia, and current samples are configured primarily for targeting victims using Cyrillic script documents, its functions also may endanger the files and machines of PC users residing elsewhere. As a reasonable precaution against file encryption attacks, malware researchers advise using routine, remote backup strategies in combination with regular anti-malware scans to delete the KRIPTOVOR Ransomware...

CrypVault

Posted: April 8, 2015 | Category: Ransomware
CrypVault is a file encrypting Trojan that also incorporates spyware add-ons capable of collecting information, such as your account login. While CrypVault has seen the greatest rates of distribution in Russia and neighboring countries, CrypVault also has begun to be seen in meaningful numbers elsewhere, including North America. During its attacks, CrypVault portrays itself as a legitimate PC security tool for recovering locked files. However, malware researchers see no advantages in victims paying its ransom and recommend responding to CrypVault as threatening software, with appropriate...

Ransom:Win32/Isda

Posted: April 3, 2015 | Category: Ransomware
Ransom:Win32/Isda is a ransomware that is mostly distributed via spam e-mail attachments. Computer security experts advise users not to pay the ransom presented by Ransom:Win32/Isda. Sometimes, trojan downloaders are also capable of attracting ransomware to your computer. Infections such as Ransom:Win32/Isda are intended to generate income for cyber crooks by encrypting files on their systems and providing a non-standard payment method. The presence of Ransom:Win32/Isda ransom message is a signal that there is an infection on your computer, and it is advisable that you use a powerful...

‘PacMan’ Ransomware

Posted: March 27, 2015 | Category: Ransomware
The 'PacMan' Ransomware is a file encryption Trojan that recently saw distribution in targeted e-mail attacks focused on European chiropractors. In addition to locking your files in exchange for a ransom fee, the 'PacMan' Ransomware also conducts other attacks, such as collecting personal information and disabling standard security solutions. Paying the 'PacMan' Ransomware's ransom has no certainty of restoring your files, and malware specialists advise using anti-malware tools to disable the 'PacMan' Ransomware alongside file backup protocols that can render your data immune to its...

AntiVirus PRO 2015

Posted: March 27, 2015 | Category: Rogue Anti-Virus Programs
AntiVirus PRO 2015 is a rogue anti-virus program whose GUI imitates the looks, but not functionality, of a legitimate AV suite, including file-scanning technology and pop-up warnings against relevant attacks or vulnerabilities. While AntiVirus PRO 2015 will use its supposed security features to encourage the premium registration of its software, doing so offers no virus removal advantages for your computer. Accordingly, malware experts have categorized AntiVirus PRO 2015 as scamware. Standard course of action for dealing with fraudulent AV products like AntiVirus PRO 2015 should include...

Protective Antivirus 2015

Posted: March 26, 2015 | Category: Rogue Anti-Virus Programs
Protective Antivirus 2015 is a rogue anti-virus scanner that detects imaginary threats such as nonexistent backdoor Trojans or remote hacking tools automatically. While providing imitations of actual security features, Protective Antivirus 2015 exhorts its users to purchase a registered version of its suite for the removal of all 'detected' threats. As malware researchers have classified Protective Antivirus 2015 as scamware, this program should not be purchased, nor any attempts made to communicate with its developers. However, for your PC's overall safety, removing Protective Antivirus...

Security Defender Pro 2015

Posted: March 24, 2015 | Category: Rogue Anti-Virus Programs
Security Defender Pro 2015, also known as Defender Pro 2015, is a rogue anti-malware program that imitates the features of actual anti-malware suites as a means of extorting money with its software registration requests. The registered version of Security Defender Pro 2015 is no more capable of protecting your system from infections than its unregistered version. However, Defender Pro 2015 may generate believable pop-up alerts that highly resemble the warnings of real PC security suites. Because many members of Security Defender Pro 2015's estimated family of scamware, the family also are...

VaultCrypt

Posted: March 18, 2015 | Category: Ransomware
VaultCrypt is a file encryptor Trojan that uses a combination of Visual Basic scripts, batch files and third-party freeware to encrypt your files, rendering them unusable until you pay a Bitcoin fee to its admins. While previously seen distributed towards Russian PC users, VaultCrypt now is beginning to make headway in Canada and other, English-speaking regions, although much of its well-developed infrastructure still is in a transitional state. Despite the inherent difficulties in recovering files from this threat, paying its ransom is not a course of action malware experts would...

Cryptexplorer.us

Posted: March 16, 2015 | Category: Ransomware
Cryptexplorer.us is a threatening Web domain associated with the activities of backdoor Trojans and some forms of ransomware, such as file encrypting Trojans. Like any threatening site, and even if you make no effort to interact with it, Cryptexplorer.us should be regarded as a direct threat to your PC's safety. Repeated, unwanted contact with Cryptexplorer.us can be resolved with the same anti-malware products malware researchers would advise your using in most cases of infections. Exploring What goes into a Cryptexplorer.us Pop-Up Cryptexplorer.us is just one of many websites with...

EpicScale

Posted: March 9, 2015 | Category: Ransomware
Epic Scale is a cryptocurrency miner that generates Bitcoins and other, digital currencies through using your PC's unallocated resources. While Epic Scale isn't a threat and makes no attempts to hide itself from the PC's users, side effects of its installation may be detrimental. As an extra caveat, recent third-party bundles have included an apparent misconfiguration that installs Epic Scale automatically. A Potentially Unwanted Program may be judged on a case by case basis, but if you have any doubts about the appropriateness of this software's presence, malware experts can suggest...

CryptoFortress

Posted: March 6, 2015 | Category: Ransomware
CryptoFortress is a file encryptor Trojan that uses an RSA encryption algorithm to make your stored data unreadable. After modifying your files, CryptoFortress also places instructions on your hard drive demanding cash payment in return for their restoration. Like other file encryption Trojans, there are zero guarantees of CryptoFortress's keeping its word after receiving payment, which is why malware experts recommend alternative solutions to its attacks. Anti-malware tools in conjunction with good file backup strategies should allow you to both remove CryptoFortress and protect your data...

TeslaCrypt Ransomware

Posted: February 27, 2015 | Category: Ransomware
TeslaCrypt is a file encryptor Trojan that targets data related to video gaming applications and modifies the files to be unusable. After its attack, TeslaCrypt generates multiple decryption instructions, which TeslaCrypt uses to force its victims to pay a fee for the restoration of all affected data. In spite of the unusual choice of targets, TeslaCrypt can be hindered by all the usual security procedures malware experts encourage against all file encryptors. Naturally, removing TeslaCrypt infections from any PC can (and should) use industry-standardized anti-malware solutions. When...

Malware Defender 2015

Posted: February 19, 2015 | Category: Rogue Anti-Spyware Programs
Malware Defender 2015 is a rogue anti-virus scanner that mimics the graphical user interface of Microsoft's Security Essentials software. Harboring Malware Defender 2015 on your computer may result in your being provided with inaccurate information about its overall health. This information may, in turn, lead you to commit to actions needlessly damaging to your machine, your finances or your information. Deleting Malware Defender 2015 is the response malware researchers would advise in all situations, and without indulging in any premium registration offers that this scamware promotes....

Coin Locker

Posted: February 19, 2015 | Category: Ransomware
Coin Locker is a file encrypting Trojan that blocks your use of files of prominent formats while also demanding a ransom to provide you with its 'decryption software.' Like any other Trojan-based extortion attempt, you should ignore Coin Locker's requests and, instead, use appropriate anti-malware products to uninstall Coin Locker. After you've disinfected your PC, you can take any other steps needed to recover your files without charges, such as using a free, third-party decryption tool. The Illicit Locker for All of Your Documents Coin Locker is a Trojan with limited reports of...

FessLeak Ransomware

Posted: February 6, 2015 | Category: Ransomware
The FessLeak Ransomware is a file locker Trojan that uses encryption to make your files unreadable, and then displays a ransom notification to force you to pay for a reversal of the procedure. There are multiple variants of the FessLeak Ransomware with significant structural differences between them; consequentially, having updated anti-malware products can be essential to detecting (and, hence, removing) the FessLeak Ransomware appropriately. Browser security is critical for avoiding the FessLeak Ransomware attacks, which malware researchers have associated with various corrupted Web...
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 2224
Follow Us