category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

3 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

4 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

4 year ago

Zip Cruncher

Zip Cruncher is promoted as a tool for compressing and uncompressing .zip and .rar files, i.e. archives. It seems to be a beneficial application, but if you are about to install it on your computer, we suggest that you find a more reliable program and install it on your PC instead. It is because Zip Cruncher is a typical potentially unwanted application, according to researchers at pcthreat.com, which automatically means that this piece of software is definitely not one of those applications that can be trusted fully. One of the reasons it has been categorized as a potentially unwanted ...

3 days ago

Your Windows Computer Is Infected With Viruses

Pay no attention to the “Your Windows Computer Is Infected With Viruses” alert because it is not legitimate. It was not created by your operating system or by your anti-malware software – if it exists at all – and, instead, it is the creation of virtual schemers. It appears that the purpose of this misleading notification is to trick you into visiting an unreliable scam page or downloading malicious software. If you have never faced scams or malicious installers in the past, it might be difficult for you to recognize danger. Have you downloaded anything represented via the fake security ...

3 days ago

Scarab-Leen Ransomware

Scarab-Leen Ransomware may mark all your files with the .leen extension, for example, garden.jpg.leen, birthday_party.avi.leen, etc. Data that have it should be encrypted with a secure encryption algorithm, which means it should become useless. The bad news is if you have no backup copies the only other way to restore locked data is with a decryption tool and sadly, it is in the hands of the cybercriminals behind this malicious program. They expect their victims to pay ransoms to get such tools and decrypt their data, but we would strongly advise against it. No doubt, there is a chance the ...

3 days ago

Ember Relax Background

Ember Relax Background might offer you a relaxing experience, but we are not sure how it can be relaxing to have a potentially dangerous application on the system. As you see, the extension falls under the classification of potentially unwanted programs. Such software is not considered to be malicious, but it may have undesirable qualities or might introduce the user to content that could be possibly harmful. Thus, if you are planning on installing this application or already have it on your Google Chrome, we would advise you to think about removing it. Naturally, if you continue reading our ...

3 days ago

Search.heasysportsaccess.com

If you are a sports fanatic, you probably know every single extension and tool that can help you access information fast. Search.heasysportsaccess.com is a search tool that is represented by an extension called “Easy Sports Access.” Both the extension and the search tool are meant to help you access sports-related content directly from the homepage of your web browser, and you might have downloaded it expecting great services. Unfortunately, the extension is pretty useless because its only incentive is to take over your browser, and the hijacker that does that simply displays a few easy-access links. We do not ...

4 days ago

Scarab-Walker Ransomware

Scarab-Walker Ransomware appears to be another threat from the Scarab Ransomware family. As with previous variants, it encrypts user’s files with AES encryption algorithm and leaves a message offering decryption tools in exchange for paying a ransom. According to the ransom note, the sum should be paid in Bitcoins and to get further instructions on how to send it the user is asked to contact the malicious program’s developers through email. The thing is agreeing to pay the ransom could end up badly since the hackers behind the malware may not deliver the promised decryption tools even if the ...

4 days ago

PresidentialBuzz Toolbar

If you have downloaded PresidentialBuzz Toolbar, you must be really interested in the White House politics. This application (for Internet Explorer users) or extension (for Firefox and Chrome users) is meant to provide you with the latest info from the president of the United States, Donald Trump. When you install this potentially unwanted program (PUP), every time you launch the browser, you are introduced to easy-access links to sites that you are likely to be interested in. Besides that, a section of the PUP’s home page is dedicated to showing live tweets from the @POTUS Twitter account, which, of ...

4 days ago

RSA-4096 Ransomware

RSA-4096 Ransomware might seem like a unique infection, but, in fact, it is identical to a well-known threat, TeslaCrypt Ransomware. We have already shown how to delete this threat via a report that was created after analyzing it. This report, of course, analyzes the newest variant. Just like all other threats from the same family, this infection can exploit security vulnerabilities and backdoors to slither into Windows operating system without being recognized or even noticed. In some cases, the threat could be downloaded by other infections or dropped using unauthorized remote access to the system silently. In other cases, victims ...

4 days ago

Aurora Ransomware

It is not that easy for Aurora Ransomware to invade operating systems because it usually has to go through the human barrier, which means that it has to trick the owner/user of the system to let it in. According to our malware researchers, this particular threat is most likely to use RDP (Remote Desktop Protocol) connections to slither in, and if remote access is unattended and vulnerable, malware could be dropped silently. That being said, malicious installers and corrupted, misleading spam emails could be used for distribution purposes also, and if this is how the threat got in, you can ...

4 days ago

ImpaqSpeed

Not all programs that enter your computer behind your back are malicious, but it also does not mean that you have to tolerate them. ImpaqSpeed is a potentially unwanted program that does not pose big security threats, but if you are not sure why this application is on-board, perhaps it would be for the best to remove it. Luckily, it is not complicated to uninstall ImpaqSpeed from your system, so you should do it ASAP. After that, be sure to check whether your computer is absolutely safe and clean because it is always better to be safe than sorry. ImpaqSpeed ...

4 days ago

Stabers.club

Stabers.club is a search tool you might find set as your new default search provider on all your browsers. ...

4 days ago

Mr.Dec Ransomware

Mr.Dec Ransomware is a malicious computer infection that will encrypt most of your personal files with the intention to ...

4 days ago

System Activation Key Has Expired

If a message claiming that your System Activation Key Has Expired is ever displayed to you during your browsing ...

4 days ago

Mac Ads Cleaner

If you are reading because you are interested in installing Mac Ads Cleaner onto your operating system, we can ...

5 days ago

Mapmywayfree Toolbar

Mapmywayfree Toolbar is a suspicious browser extension that falls under the classification of potentially unwanted programs. Our researchers came ...

5 days ago

Butler Miner Trojan

Butler Miner Trojan is a malicious application that might only bring problems to you. Specifically speaking, it might be the ...

5 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation