Click on screenshot to zoom
Danger level 6
Type: Malware
Common infection symptoms:
  • Slow Computer
  • Installs itself without permissions

Foxy Security

Foxy Security is a German computer application which is meant to help you surf the web securely. However, if you click the download button displayed on foxysecurity.com, you are likely to be presented with a pop-up notification warning you that the publisher of the downloaded installer cannot be verified. If you continue with the installation of the questionable program, you are likely to find browser extensions installed onto Google Chrome, Mozilla Firefox or Internet Explorer browsers. If you are running all three of these web browsers, you can expect plugins to be installed on all of them. Unfortunately, the application is usually installed without permission, in which case Foxy Security removal should be performed as soon as possible.

According to malware researchers, Foxy Security is a browser extension which is a clone of plugins promoted via gb.vondos-internet-security.com and gb.securitascout.com. As mentioned already, these programs can enter the browsers without permission; however, what is worse is that they can connect to the Internet without permission as well. If you do not delete Foxy Security timely, the program is likely to connect to remote servers secure2.foxysecurity.com and true-secure.com. This connection can be used to send user data related to browsing activity, the operating system and active web browsers. Note that this activity is initiated as soon as the computer is turned on because Foxy Security installs bupService (bup.exe) which has an autostart and launches together with the system startup.

Sometimes it can be difficult to identify and delete Foxy Security because the extension may be installed using several different names, including Securita Scout or simply Bho.dll (usually on Internet Explorer). It has been discovered that the suspicious application can be identified as Trojan.Spy.YPK as well. This is how authentic malware detection and removal software can locate the suspicious program running on the computer. The application earns the name of a Trojan because it can be installed silently, and it may work in a different manner than you expect. Even though the plugin is supposed to guard your virtual security, it would not be surprising to discover Foxy Security breaching it instead.

We recommend that you scan the computer immediately after you delete Foxy Security using the manual removal guides below. It is possible that this application will enter the operating system bundled with unreliable advertisement supported software. Use a legitimate security tool to remove existing malware and to create a shield which other computer infections attacking in the future could not breach.

Foxy Security Removal Guide

Remove from Windows XP:

  1. Move to the left of the Task Bar and click Start.
  2. Select Control Panel and double-click Add or Remove Programs.
  3. Remove the undesirable program and scan the operating system.

Remove from Windows Vista or Windows 7:

  1. Open the Start menu from the Task Bar.
  2. Select Control Panel and click Uninstall a program.
  3. Right-click the program you wish to delete.
  4. Select Uninstall and scan the operating system.

Remove from Windows 8:

  1. Right-click on the Metro UI screen and select All apps.
  2. Open the Control Panel and click Uninstall a program.
  3. Right-click the program you wish to delete and select Uninstall.
  4. Scan the computer.
Download Spyware Removal Tool to Remove* Foxy Security
  • Quick & tested solution for Foxy Security removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Foxy Security

Files associated with Foxy Security infection:

bup.exe
foxy_security.exe
FoxySecuritySetup.exe
bho.dll

Foxy Security DLL's to remove:

bho.dll

Foxy Security processes to kill:

FoxySecuritySetup.exe
foxy_security.exe
bup.exe
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.