Description Screenshot is a MetaCrawler-based search engine that’s also known for an associated browser hijacker that redirects you to without your permission. Even though malware researchers haven’t confirmed cases of linking to deliberately malicious content, unwanted redirects to and other settings changes should be considered low-level security risks to your browser. As usual, anti-malware scans are the best means of ridding yourself of adware, since’s browser hijacker isn’t associated with a readily-apparent program or browser add-on. – a Fantastic Example of a Needless Middle Man in Online Searches has the basic look of Google, but’s results are all acquired through MetaCrawler (a meta-search engine that gathers results from Google, Bing and other popular search sites). Since there are no features that provides that aren’t available straight from the websites that is ‘borrowing’ content from, there’s no real reason to use, although malware analysts have yet to find any danger in doing so.’s poor showing of content is backed up by poor ratings for trustworthiness and other traits in website-ranking databases, with substantially negative scores that appear to be primarily the result of browser hijack attacks associated with

These hijacks are caused by browser hijacker-based PC threats that are installed through deceptive or concealed means, and their most common symptoms, insofar as malware analysts have been able to determine, include:
  • New tabs for that appear whenever you launch your browser.
  • Having your default search engine locked to – no matter what changes you make to your browser’s settings.
  • Being redirected to after making searches through unrelated search sites.

The home domain from which is derived,, should also be considered equivalent to with respect to the browser-based attacks associated with and the potential dangers involved.

Getting Your Browser the Way You Want it Without Muddying the Works

Browser hijackers that utilize redirects are still active as of this month of 2012, and malware researchers have also confirmed their compatibility with Firefox, Internet Explorer and Chrome browsers.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

Since, unlike many browser hijackers,’s adware doesn’t display obvious browser plugins or programs to be uninstalled, it’s encouraged for you to use anti-malware software to delete any PC threats.

Browser hijacks for and other sites are often used by malware with other abilities to harm your computer. Rootkits that compromise system files, spyware programs that steal confidential information and backdoor Trojans that disable your PC’s security can all be included with browser hijackers for Given these risks, malware experts always encourage you to react to a infection swiftly, even if, by itself, isn’t much of a threat to your computer. Automatic Detection Tool (Recommended)

Is your PC infected with To safely & quickly detect we highly recommend you run the malware scanner listed below.

Posted: September 10, 2012 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 5/10
Home Malware ProgramsBrowser Hijackers

Leave a Reply

What is 12 + 8 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)