category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

Rush Music Search

Rush Music Search might seem like a useful browser add-on for music lovers, but our specialists warn us it is considered to be a potentially unwanted program (PUP). The classification does not mean it could be harmful, but it suggests the extension could be unreliable or may have undesirable qualities. To be more precise, our researchers who tested it say there is a chance the program might display various pop-ups, banners, or other advertising material from its third-party partners. The bad news is, it is unknown where the ads could originate from, which makes it possible some part of them ...

6 days ago

Super Speedup 2018

Do not allow unreliable software developers to trick you into spending money on Super Speedup 2018. This application – which, we are sure, will be called Super Speedup 2019 next year – does not offer reliable or beneficial services, and investing in it is a total waste of money. Is it malicious? Although it cannot download and execute malware, steal information, hijack your browsers, or do other nasty things malicious programs are known to do, it is not a reliable piece of software. There are plenty of reliable and more beneficial programs you could invest in, and even if ...

6 days ago

Super Tuneup

According to the application’s authors, Super Tuneup has “advanced features and powerful tools help enhance PC speed with ease and improve your experience exclusively.” However, our researchers say even though the program might sound powerful, in reality, it is quite doubtful it can make any visible changes to the system’s performance. If you read the rest of the article, we will explain to you why we believe the tool is more or less useless. Another thing you can find useful is the deletion instructions available a bit below the article. Should you choose to eliminate Super Tuneup, you could ...

6 days ago

Ursnif spam

Users all over the world are being exposed to misleading Ursnif spam emails. These emails use the names, logos, and other credentials of familiar companies, and their purpose is to trick targeted users into letting in the malicious Ursnif Trojan. Different variants of this malware can be recognized by different names, including Gozi or DreamBot. The infection is classified as a banking Trojan, and, needless to say, it is meant to steal sensitive online banking information. Unfortunately, the infection is clandestine and can attack users successfully without them suspecting a thing. According to malware researchers, the threat is most ...

6 days ago

Eredel Stealer Extended

Eredel Stealer Extended is a harmful threat that performs malicious activities on affected users’ computers. Without a doubt, it enters computers without permission, which explains why so many users do not know anything about its presence on their computers. Usually, they realize this nasty threat is active on their computers because they perform a full system scan with an antimalware scanner. Have you found Eredel Stealer Extended installed on your computer as well? You must delete Eredel Stealer Extended right away because this malicious application is a keylogger, as research conducted by specialists working at anti-spyware-101.com have found. It ...

8 days ago

GandCrab 5 LOADER

GandCrab 5 LOADER is a malicious file that might load GandCrab 5 Ransomware if it manages to enter your computer. According to our researchers, the mentioned threat is a RaaS (Ransomware-as-a-Service), which means there might be a lot of slightly different versions of it. However, no matter which variant you receive, the ransomware would encrypt your files and most likely display a ransom note asking to pay for decryption. Therefore, encountering GandCrab 5 LOADER could make all of the files located on the computer useless. Naturally, to avoid coming across such malicious data, we will tell you where it ...

8 days ago

Gator

One could think that Gator is a dangerous computer infection, considering how much attention this little piece of software is getting. However, the truth is that this cookie is an annoying nuisance that should be removed from your system as soon as possible. Although it will not infect you with malware or anything like that, it could eventually expose you to corrupted content. Interacting with corrupted content can easily lead to malware infections, so you need to be careful about the websites you open on your browser. Should you have more questions about computer security and how to ensure it, ...

13 year ago

NetMeterX

NetMeterX is identified as a potentially unwanted program (PUP) that is likely to reach your operating system using a software bundle. This bundle might carry both harmless and malicious programs, which is why caution is required. If you have executed the installer already, the first thing you must do is inspect your operating system. Without a doubt, a legitimate malware scanner will warn you about the necessary removal of NetMeterX, but you might also learn that you need to delete other threats. Can you identify them yourself, without the help of a malware scanner? You definitely might succeed at ...

11 days ago

Yourhope@airmail.cc Ransomware

Yourhope@airmail.cc Ransomware is the newest variant of Scarab-Bomber Ransomware. This variant also encrypts data on affected computers and then demands a ransom, so we could say that it does not differ much from its predecessor. Some ransomware infections only pretend that they lock files, but Yourhope@airmail.cc Ransomware is not one of them. All your documents, music, pictures, videos, and other important files will be completely encrypted if it ever happens that you encounter this threat. In most cases, users encounter it after opening a malicious email attachment. Usually, spam emails are the ones that hold malicious email attachments, so ...

11 days ago

Matrix-THDA Ransomware

Matrix-THDA Ransomware shares similarities with our previously researched versions of Matrix Ransomware family, for example, Matrix-NOBAD Ransomware. This malicious application also encrypts user’s files same as the previous variants, but it renames and marks them with a new extension called .THDA. As you continue reading our article, we will provide examples of how the malware may rename victims’ files as well as tell you more details about the infection like where it could come from or how it works. Another thing we would like to mention from the start is the threat leaves a ransom note that suggests victims can ...

11 days ago

Scrabber Ransomware

HiddenTear is an open-source ransomware infection whose source code is used to create new crypto-threats by malicious software developers. Scrabber ...

11 days ago

PointRoll

PointRoll is an old tracking cookie associated with the PointRoll company. The company is now part of Sizmek Inc., which ...

12 year ago

xzet@tutanota.com Ransomware

In this report, we will talk about xzet@tutanota.com Ransomware that can encrypt user’s files to make them unusable. According ...

13 days ago

CastVPN

CastVPN works as a virtual private network (VPN). However, in reality, your browsing might not be as private as you ...

14 days ago

InstallCore

If you have downloaded anything using InstallCore, you need to check if the applications and programs you downloaded are not ...

14 days ago

Mediaplex

Mediaplex sounds like a serious business until you learn that it is a tracking cookie. This means that this little ...

13 year ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation