category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

MediaStart

MediaStart might look like a pretty cool tool, but our research team says that it is a potentially unwanted program. What does it mean? It means that the application is not a direct computer security threat, but it might have certain features that can be deemed undesirable. What’s more, it is possible to add this extension to your browser accidentally, so if that is really the case, it is about time you remove MediaStart from your system. While you are at it, you should also scan it with a security tool to make sure it is absolutely safe. To put it ...

4 days ago

1-844-665-5111 Pop-Ups

1-844-665-5111 Pop-Ups are fake alerts that try to convince users there is something wrong with their system. The notifications may claim someone hacked into the computer and could be trying to steal sensitive information from it. To solve this, the messages may ask to enter a computer’s username and password and to call Microsoft's technical support. Needless to say, the given telephone number (1-844-665-5111) connects not with Microsoft’s technicians, but with scammers. Such people could try to persuade you to pay for their services or buy expensive tools from them. Therefore, if you notice such alerts, we recommend getting ...

5 days ago

FORMA Ransomware

FORMA Ransomware is a dangerous program that was released a few months ago. This ransomware infection seems to be targeting computer users in Poland, but there is no telling where else it might go. Ransomware infections are really frustrating computer security threats because it is often hard to revert the damage they cause. Even so, users should remove FORMA Ransomware and other similar infections immediately because no one should tolerate these threats. You might also want to find out more about file recovery options because this program clearly encrypts personal files, and you need to get your data back. Like ...

5 days ago

Trojan.DarktrackRAT

Trojan.DarktrackRAT is one of those infections that can slither into your system behind your back and make a really good nest over there. What’s more, it can avoid detection for a while because it works in the system’s background, and users seldom realize they have this program unless they regularly scan their computers with security tools. So, the bottom line is that if this Trojan is present on your system, you have to remove Trojan.DarktrackRAT today. Scroll down to the bottom of this description for the manual removal instructions or continue reading the entry to find out more about this ...

5 days ago

GottaCry Ransomware

Although GottaCry Ransomware has the presence of a real file-encrypting infection, our research team has found that it might fail to function exactly as intended. The sample that was tested in our internal lab did NOT encrypt files; although it was discovered that the threat could potentially delete files and directories. Instead, it acted as a screen-locker. At this point, it is not known how this infection could spread, but we recommend being extremely cautious about the emails you open, the files/programs you download, and the security updates you skip. Without a doubt, this is not the kind of ...

5 days ago

Skymap Ransomware

The clandestine Skymap Ransomware uses stealth techniques to slither into your operating system, and you are most likely to be tricked into executing it via a misleading spam email message. The threat could also cling to more desirable software introduced to you via a bundled downloader, or it could be downloaded by a malicious Trojan already active on your operating system without your notice. Unfortunately, if this malicious infection succeeds at concealing itself, you might not get a chance to delete it before it starts encrypting your personal files. This process is relatively silent too, and you are likely to ...

5 days ago

Krypton Stealer

Krypton Stealer is the kind of infection that was built to steal information. Unfortunately, the information this malware can gather and place into the hands of cyber criminals is very sensitive, and victims can face serious security issues because of it. At this point, it is not clear who created this malware or how it is distributed, but there is a possibility that it could be sold on underground hacking forums. This is how malware builders often sell their products, and, unfortunately, many different individuals are willing to invest in them. Due to this, many different parties could be ...

5 days ago

Ox4444 Ransomware

Ox4444 Ransomware looks similar to GlobeImposter Ransomware, which is why our researchers believe the applications could be related. The new variant seems to be capable of encrypting not only personal data, like photos or documents but also executable files. Therefore, after the malware performs the encryption process the victim might notice that his games and applications are crashing. Another thing that ought to hint the system was infected with this malicious application is the .Ox4444 extension that should be on all affected files, e.g., document.docx.Ox4444. To learn more about this threat, we invite you to read the rest of our ...

11 days ago

XUY Ransomware

XUY Ransomware might look like a vicious threat, but in reality, it is not as scary as it might appear to be. Our researchers tested the malicious application and revealed it does not ruin the computer’s Master Boot Record (MBR) or system’s Registry files even though its note could say different. Nonetheless, it is true what is said about the user’s data. The threat encrypts targeted files with a strong encryption algorithm. The only good news is that the malware locks data only in particular locations, which means a huge part of the victim’s data might remain unaffected. If ...

11 days ago

Boris HT Ransomware

Boris HT Ransomware is a computer infection that was still in development at the time of research. It means that it may not function properly, but some infection samples might as well encrypt target files, too. The bottom line is that you need to remove Boris HT Ransomware from your computer. Although it is not hard to delete this infection, you might face some problems trying to restore your files. Perhaps the best way to restore your files is to transfer them to your computer from an external backup. Unfortunately, not all users have file backups, and they might be ...

11 days ago

ChaCha Ransomware

There is nothing funny or entertaining about ChaCha Ransomware. In fact, if you face this malicious infection, your entire operating ...

11 days ago

Game Jungle

Game Jungle is a browser extension that offers you to check out all sorts of online games. If that is ...

11 days ago

EnybenyCrypt Ransomware

EnybenyCrypt Ransomware can display a message with rude and inappropriate language, which might make receiving it even more unpleasant ...

11 days ago

bizarrio@pay4me.in Ransomware

bizarrio@pay4me.in Ransomware belongs to the GlobeImposter Ransomware family since it works in a manner that is similar to all ...

11 days ago

Delphi Ransomware

Delphi Ransomware is a twisted ransomware infection that comes forth having only one purpose in mind: financial gain. This dangerous ...

11 days ago

WebCobra

WebCobra is one of those threats that use infected computers’ resources to generate money for their developers. Usually, such malicious ...

12 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation