category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

0day Ransomware

0day Ransomware was created to encrypt your personal files so that cyber criminals – who created the infection – could demand a ransom payment in return for a decryptor. This threat encrypts personal files, and it should evade all system files, which means that even if it encrypts every single personal file on the computer, it will not crash, and the ransom demands will be delivered without a glitch. Some ...

8 days ago

Bisquilla Ransomware

Bisquilla Ransomware is a new threat that our malware research team rushed to inspect as soon as possible. The good news is that this is the first version of this malware, and it is not capable of causing great damage. Although it should be capable of encrypting files – which was found when analyzing the infection’s code – at this moment, it does not do that. Instead, it launches two separate windows that do not offer a great deal of information. Due to this, we doubt that this version of the threat will see the light of day. That being ...

9 days ago

Mogera Ransomware

Mogera Ransomware is ready to encrypt your files and ruin your day, which is why you have to be ready to defend your operating system against it. If you are not currently dealing with this dangerous file-encryptor, focus on securing your system and your personal files. Installing legitimate anti-malware software is, by far, the best thing you can do because it can protect your system and automatically delete the incoming threats before they are executed and before they can cause damage. To add an added layer of protection for your personal files, we recommend backing them up. When you have ...

9 days ago

Godzilla Loader

Godzilla Loader is a Trojan infection that can lead to severe computer security issues. Trojans often enter systems pretending to be something they are not, and their functionality depends on what the developers program it to do. Thus, the Trojan activity palette ranges from spying to ransomware installation. When you are ready to remove Godzilla Loader, you will probably see that there is a lot more malware on your system than you have initially thought. Thus, the best way to deal with these intruders is by investing in a licensed security application that would remove them all at once. It is quite ...

9 days ago

MediaStart

MediaStart might look like a pretty cool tool, but our research team says that it is a potentially unwanted program. What does it mean? It means that the application is not a direct computer security threat, but it might have certain features that can be deemed undesirable. What’s more, it is possible to add this extension to your browser accidentally, so if that is really the case, it is about time you remove MediaStart from your system. While you are at it, you should also scan it with a security tool to make sure it is absolutely safe. To put it ...

15 days ago

1-844-665-5111 Pop-Ups

1-844-665-5111 Pop-Ups are fake alerts that try to convince users there is something wrong with their system. The notifications may claim someone hacked into the computer and could be trying to steal sensitive information from it. To solve this, the messages may ask to enter a computer’s username and password and to call Microsoft's technical support. Needless to say, the given telephone number (1-844-665-5111) connects not with Microsoft’s technicians, but with scammers. Such people could try to persuade you to pay for their services or buy expensive tools from them. Therefore, if you notice such alerts, we recommend getting ...

15 days ago

FORMA Ransomware

FORMA Ransomware is a dangerous program that was released a few months ago. This ransomware infection seems to be targeting computer users in Poland, but there is no telling where else it might go. Ransomware infections are really frustrating computer security threats because it is often hard to revert the damage they cause. Even so, users should remove FORMA Ransomware and other similar infections immediately because no one should tolerate these threats. You might also want to find out more about file recovery options because this program clearly encrypts personal files, and you need to get your data back. Like ...

15 days ago

Trojan.DarktrackRAT

Trojan.DarktrackRAT is one of those infections that can slither into your system behind your back and make a really good nest over there. What’s more, it can avoid detection for a while because it works in the system’s background, and users seldom realize they have this program unless they regularly scan their computers with security tools. So, the bottom line is that if this Trojan is present on your system, you have to remove Trojan.DarktrackRAT today. Scroll down to the bottom of this description for the manual removal instructions or continue reading the entry to find out more about this ...

15 days ago

GottaCry Ransomware

Although GottaCry Ransomware has the presence of a real file-encrypting infection, our research team has found that it might fail to function exactly as intended. The sample that was tested in our internal lab did NOT encrypt files; although it was discovered that the threat could potentially delete files and directories. Instead, it acted as a screen-locker. At this point, it is not known how this infection could spread, but we recommend being extremely cautious about the emails you open, the files/programs you download, and the security updates you skip. Without a doubt, this is not the kind of ...

15 days ago

Skymap Ransomware

The clandestine Skymap Ransomware uses stealth techniques to slither into your operating system, and you are most likely to be tricked into executing it via a misleading spam email message. The threat could also cling to more desirable software introduced to you via a bundled downloader, or it could be downloaded by a malicious Trojan already active on your operating system without your notice. Unfortunately, if this malicious infection succeeds at concealing itself, you might not get a chance to delete it before it starts encrypting your personal files. This process is relatively silent too, and you are likely to ...

15 days ago

Krypton Stealer

Krypton Stealer is the kind of infection that was built to steal information. Unfortunately, the information this malware can ...

15 days ago

Ox4444 Ransomware

Ox4444 Ransomware looks similar to GlobeImposter Ransomware, which is why our researchers believe the applications could be related. The new ...

22 days ago

XUY Ransomware

XUY Ransomware might look like a vicious threat, but in reality, it is not as scary as it might appear ...

22 days ago

Boris HT Ransomware

Boris HT Ransomware is a computer infection that was still in development at the time of research. It means ...

22 days ago

ChaCha Ransomware

There is nothing funny or entertaining about ChaCha Ransomware. In fact, if you face this malicious infection, your entire operating ...

22 days ago

Game Jungle

Game Jungle is a browser extension that offers you to check out all sorts of online games. If that is ...

22 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation