category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

2 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

3 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

3 year ago

Developer Mode Extensions

Developer Mode on Google Chrome is an advanced mode allowing software developers to test their apps. Are you a software developer? Have you activated it willingly? If yes and yes, you do not need to worry about the “Disable developer mode extensions” pop-up alert you see in the top-right corner of your web browser. It is the opposite if you are sure you have not enabled this mode yourself because this might indicate that some kind of malicious Google Chrome extension has been added to the list of add-ons. In such a case, you must immediately open the Add-ons ...

2 days ago

Top5news.org

Top5news.org is one more devious program that should not be active on your operating system. That is so because it has been categorized as a one more suspicious search engine that does not exhibit any valuable features. In fact, it is fully capable of changing your web browser's default settings in a silent manner. It goes without saying that this is annoying and causes frustration every single time you decide to surf the web. On top of such invasive functionality, this search engine could turn out to be the reason your PC could get infected with other undesirable or even ...

2 days ago

Googlescan.ru

Googlescan.ru is a suspicious search engine that you might recognize as a browser hijacker if it has corrupted your web browser without your permission. Whether you face this search engine after having your homepage or default search provider hijacked, or you are redirected to it, our research team strongly recommends deleting it immediately. Even if it might be possible to use this search tool without jeopardizing your virtual security, it is way too unpredictable, and, unfortunately, we cannot guarantee that you will not face any threats. On the contrary, it is much more likely that you will be exposed to ...

2 days ago

MyNewsWire Extension

If you notice a new search website with news-related features on a fake toolbar, it is possible that MyNewsWire Extension has sneaked onto your system. We have categorized this threat as a browser hijacker because it is capable of changing your browser settings, including homepage, new tab, and default search provider. Although it is possible that you knowingly install this browser extension if you want "local and global news at your finger tips" but we do not believe that this is how most users get infected with this potential threat source. In fact, this extension can present to you potentially ...

2 days ago

FileFrozr Ransomware

FileFrozr Ransomware is a malicious computer infection that can affect anyone out there. Its creators are not responsible for spreading the program around because the ransomware is available for sale at its official website. There, it is promoted as a “great security tool that encrypts most of your files in several minutes.” Of course, it could be a security tool if you wanted your data encrypted and protected against some espionage campaign, but the problem is that programs like FileFrozr Ransomware are used to extort money from individual computer users and corporations, as they desperately scramble to get their data ...

2 days ago

Windows 7 Support - Case ID Fake Tech Support

Windows 7 Support - Case ID Fake Tech Support may pop up while you are surfing the Internet and may mislead you with its pop-up windows into believing that your computer is under attack and that you should call a given phone number to fix this. As a matter of fact, you should ignore this fake alert because its only goal is to push you into a corner where your only chance to find a solution would seem to be actually calling this supposed technical support number. Apart from being a totally fake warning, this type of threat is also ...

3 days ago

Chrysaor Targets Android Devices

Chrysaor Targets Android Devices If you are one of 1.6 billion people who use Android, there is an infection you need to beware of, and it is known by the name “Chrysaor.” This threat is believed to have been created by NSO Group Technologies, which is infamous for a malicious piece of software called “Pegasus.” This one, however, is a threat to iOS users. According to Android representatives, the dangerous threat is not spreading widely, and it is believed that it was created for targeted attacks. Considering that only a few dozens of Android systems have been found to be ...

3 days ago

Cryptobyte Ransomware

If you ever happen to encounter a program that goes by the name Cryptobyte Ransomware, be sure to stay away from it at all costs. It is crucial to do so since it is yet another file-encrypting program. Having it active on your PC could have disastrous outcomes as you might lose huge amounts of your personal data in just a few moments. Such applications are crafted by cyber crooks to make illegal profits; usually, users are urged to pay a huge ransom in return for their locked data. To have a better understanding of the inner workings of this ...

3 days ago

Tables

If you have noticed an increasing number of third-party advertisements and redirections to questionable pages while going online, it is possible that a malicious browser extension called Tables has managed to sneak onto your system. This risky application can appear on your system without your knowledge and disguise itself as a legitimate extension. Due to its capabilities, we have classified it as an adware program. This infection can expose you to a flow of potentially unreliable third-party advertisements and websites, which can drop further malware threats onto your machine or you could also be scammed if you engage with the ...

3 days ago

Search.searchctp.com

If you are wondering why your web browser's settings were modified without your consent, you must know that it could be a doing of a browser hijacker. One such application goes by the name of Search.searchctp.com. If, unfortunately, it is active on your personal computer, be sure not to waste any time and conduct its complete removal since it exhibits no valuable features whatsoever. In fact, having this browser hijacker active on your personal computer will have a hugely negative effect on the way you experience the web. Furthermore, it could also prove to be quite dangerous because it might ...

4 days ago

Kill Jeeperscrypt Ransomware

Kill Jeeperscrypt Ransomware can infiltrate your computer without your knowledge and cipher your most important files in a short time ...

4 days ago

Kindest Ransomware

If your desktop has been locked and you see a warning message telling you that you have been hacked, it ...

4 days ago

Schwerer Ransomware

Schwerer Ransomware is known to be new encryption malware. It has been developed in April, 2017, and it poses a ...

5 days ago

CoNFicker Ransomware

CoNFicker Ransomware is an extremely dangerous malware. Thus, being aware of its existence and staying away from it is ...

5 days ago

Microcosm New Tab

Microcosm New Tab is a new questionable browser extension that only works in Google Chrome. As its name clearly ...

5 days ago

Search.searchlwradar.com

Your browser loads Search.searchlwradar.com, but the results you receive are provided through yahoo.com? If so, you most likely encountered ...

5 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation