Description Screenshot is a search engine site. Although malware experts haven’t seen any evidence that distributes malicious software directly, some PC threats are associated with in their usage of redirect attacks that force your browser to load automatically. If you experience these browser hijackers, anti-malware software should be used to disinfect your computer ASAP. Malware that use browser-hijacking attacks may also be capable of other functions, such as monitoring online transactions, stealing passwords or disabling your browser’s security.

The Questionable Nature of’s Certification

Contrary to what its URL might lead you to expect, is more likely to show you advertisements and affiliated websites rather than accurate and unbiased search results. While malware researchers do recommend that any interaction with be undertaken with caution, they also note that is not guilty, so far, of being a clearly-identified distribution point for PC threats.

However, some PC threats do have ties with, which has been enjoying the benefits of traffic boosts from a range of browser hijackers.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

Browser hijackers may redirect you to through methods such as:
  • Altering your homepage settings to force your browser to load when you first launch the application.
  • Forcing your web searches to be redirected to This can occur when you first try to access a search engine, after you try to use that site’s search features or even after you click a specific search result.

These attacks are often loaded by techniques (such as DNS changes) that aren’t specific to a particular browser, such as Chrome, Firefox or IE.

Getting Your Browser Back the Way You Want It (and Out of’s Clutches)

Redirects to, regardless of the form taken, are just a symptom of infection by malicious software that may include other attack capabilities. Even common browser hijackers are known to create pop-ups, advertisements and unnecessary links that slow down your browser, while some of the most advanced spyware programs have also been known for their inclusion of browser-hijacking functions.

To see to it that all PC threats linked to your redirects are removed, malware research team suggests using Safe Mode to boot your computer before any other action is undertaken. Booting an OS from a source that you can confirm as clean, such as a USB drive, may also be required in extreme cases. Once this is done, you should use any reputable brand of anti-malware program to be able to remove the source of a series of redirects without any serious difficulties. Automatic Detection Tool (Recommended)

Is your PC infected with To safely & quickly detect we highly recommend you run the malware scanner listed below.

Posted: September 27, 2012 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 5/10
Home Malware ProgramsBrowser Hijackers

Leave a Reply

What is 3 + 9 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)