Description Screenshot is an obscure search engine site that’s benefited from exceptionally high traffic of late. Unfortunately, this traffic boost isn’t due to a stellar marketing campaign, but is one of the results of a series of redirect attacks that are caused by browser hijackers. Browser-hijacking PC threats may also include rootkit or Trojan components, and malware researchers recommend that you treat any redirect to as a security risk. While, by itself, hasn’t been found to be a danger to your PC, it’s suggested that you maintain a high level of caution around, which may not use the safety or relevance guidelines that more reputable search engines than itself are known to have. You can remove PC threats, including browser hijackers, by using suitable anti-malware programs to scan your computer, although additional steps (such as booting into Safe Mode or booting from a USB device) may also be necessary in some cases.

When is Your Only Choice in Search Engines

While obscure in terms of recorded footprints or online history, has managed to make waves in 2012 due to its traffic surge from browser-hijacked victims. While hasn’t been confirmed as complicit in these attacks, the presence of a browser hijacker is always a danger to your PC that should be remedied by dedicated anti-malware software.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

Hijacks may also promote other sites besides, such as or, a habit that’s particularly common for PC threats that are linked to rings of disreputable search engine sites.

A typical browser hijack to will occur after you click a search engine link, which will redirect your search to, and from there to another destination (which may or may not be what you had in mind). malware analysts also warn to watch for the following symptoms that are closely associated with browser hijackers for and similar sites:
  • Being redirected to when you first attempt to load to an unrelated site or open your web browser.
  • Having your homepage settings to, even if you change these settings back repeatedly.
  • Pop-ups for that appear without your consent or a visible trigger.

Putting an End to the Search for Killing Off’s Browser Hijackers

Since browser hijackers that are linked to may make undesirable system changes, contain multiple components or be used alongside other PC threats, malware research team discourages any attempt to detect a PC threat manually. A thorough scan of your hard drive with your choice of anti-malware scanner will insure that all related PC threats, in addition to’s browser hijacker, are completely detected and removed. If you still experience redirects afterwards, you can try alternative methods (such as a Safe Mode boot) to allow your software to detect all malicious components and settings changes.

While some browser hijackers have been known to limit their attacks to redirects, browser redirects may also be accompanied by other attacks against your PC. Common attacks that malware experts have linked to browser hijackers include backdoor exploits, theft of personal information and the installation of Trojans. Automatic Detection Tool (Recommended)

Is your PC infected with To safely & quickly detect we highly recommend you run the malware scanner listed below.

Posted: March 16, 2012 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 1.00 out of 5)
Loading ... Loading ...
Threat Metric
Threat Level: 5/10

Leave a Reply

What is 11 + 8 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)