category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

Daily File Converter

Have you ever wanted to convert a file? If you have, you probably scoured the web to find help. Daily File Converter might have crossed your path in that way. The application could have also been presented to you using a free software bundle, or you could have been redirected to its download page via ads or suspicious websites. Officially, the extension – which we classify as a PUP, or potentially unwanted program – is introduced to users at dailyfileconverter.co, as well as the Chrome web store (chrome.google.com/webstore/detail/daily-file-converter/ongfoliaholloncjjgkaadofljjaibig). At the time of research, only users who had Chrome and Firefox ...

1 days ago

Power Speedup 2018

Power Speedup 2018 is a program that, most likely, will be replaced with Power Speedup 2019, Power Speedup 2020, etc. This kind of software is not meant to be extremely unique or even well-established. The goal that the creator has is to convince as many Windows users as possible that the simple services are worth the money that is asked for them. It would not be fair to identify this application as a malicious threat that offers completely fictitious services. On the other hand, it is not a reliable program that can provide users with accurate information either. It lies ...

1 days ago

Liverealdeals.com

Liverealdeals.com is an advertising domain that might be displayed to you in the form of a pop-up, or you might experience redirections to this website. In most cases, users encounter Liverealdeals.com because they enable notifications for this domain on their Google Chrome and/or Mozilla Firefox browsers; however, in some cases, the appearance of Liverealdeals.com with the commercial content might indicate that some kind of malicious application has been installed on your computer and now opens the Liverealdeals.com advertising network with advertisements automatically. If you find it impossible to close Liverealdeals.com, i.e. you encounter it again the next time you ...

3 days ago

bkp@cock.li Ransomware

bkp@cock.li Ransomware is yet another file-encrypting threat that claims the user’s files were locked due to a security problem with his computer. While it is possible, the PC might not have been infected if it was better-protected, but the truth is usually such malicious applications enter systems because users launch infected data unknowingly. If you want to know more about the malware’s distribution and the ways you could avoid receiving such threats in the future, you should read our full article. What’s more, since our researchers recommend not to pay a ransom, but to erase bkp@cock.li Ransomware, we will add ...

3 days ago

castor-troy-restore@protonmail.com Ransomware

It looks like DCRTR Ransomware has now a new version that is called castor-troy-restore@protonmail.com Ransomware. What victims should know about it is the malicious application does not erase itself after encrypting files. Unfortunately, it creates a copy of its launcher and a couple of Registry Entries to make the system launch it automatically after a restart. It means leaving the malware unattended might endanger files you could receive or create on the infected computer. Therefore, our researchers advise not to leave it unattended. The threat’s ransom note may threaten not to remove castor-troy-restore@protonmail.com Ransomware and demand to pay a ...

3 days ago

Power Cleaner 2018

It looks like Power Cleaner 2018 is one of those PC optimizers that claim to be able to speed up computers by cleaning their Registry files. However, most specialists agree it is highly doubtful erasing old Registry data could make any visible improvements on the computer’s performance. Therefore, if you encounter this application, we would advise you not to trust it. According to our researchers, the tool falls under the classification of potentially unwanted programs. If it is unwanted on your device as well, we encourage you to get rid of Power Cleaner 2018 manually while following the deletion ...

3 days ago

IT.Books Ransomware

IT.Books Ransomware is a malicious program made while borrowing code from threats like Jigsaw Ransomware and an open source file-encrypting application called Hidden Tear. According to our researchers, it encrypts most of the data located on the infected computer, so the malware’s victims could lose a considerable amount of files. Moreover, it might not only encrypt the files but also delete them bit by bit until the user pays a ransom. Unfortunately, the hackers ask quite a lot as the displayed ransom note mentions the user has to pay around 600 US dollars in Bitcoins. Needless to say, we ...

5 days ago

goDownload Search Plus

Do not install the Google Chrome browser extension named goDownload Search Plus on your computer if you are not ready to find your default search provider changed. The browser extension promotes the Search Plus search provider, which is described as a powerful search tool that offers a variety of unique features and search tools at the Chrome Web Store. As you have probably understood, it can be downloaded directly from the Chrome Web Store. Also, it is promoted on http://www.musixlib.com/?t=gozooms. Of course, some other alternative distribution methods might be used to spread it too. No matter where you get this ...

8 days ago

MVP Ransomware

MVP Ransomware is an infection that you might encounter if you speak Russian. That means that your operating system’s language, your keyboard, and, probably, your geographical location must fit certain conditions. The infection could be silently spread via unsecure RDP channels, and smart spam emails could be used to trick you into executing it yourself. The emails should be presented in Russian too, and the misleading messages should be followed by malicious attachments or links that hide the launcher. Regardless of how the infection enters your operating system, it can be extremely damaging. The first task for the infection ...

8 days ago

Rektware Ransomware

Rektware Ransomware is one of the most recent researchers’ discoveries. It has all the typical features of a ransomware infection, but specialists say that it is quite an interesting piece of malware. Unlike other threats that lock files on victims’ computers, this malicious application does not assign a standard extension to users’ personal files after the encryption, but, instead, it generates a new extension for every new victim. If your files have already been encrypted Rektware Ransomware, you have only two options: 1) you can delete the ransomware infection from the system immediately and then recover data using alternative data ...

8 days ago

LIGMA Ransomware

Which version of the malicious LIGMA Ransomware attacked your Windows operating system? The ...

9 days ago

CobInt Trojan

CobInt Trojan is a dangerous malicious application whose successful entrance does not promise anything pleasant. As its name suggests, malware ...

10 days ago

Go.bonefreeze.com

Go.bonefreeze.com is a browser hijacker that can affect any major browser out there. Users often add this application to their ...

10 days ago

EverydayMemo Toolbar

EverydayMemo Toolbar is considered to be a potentially unwanted program, also known as PUP in short. Our researchers say the ...

10 days ago

Suri Ransomware

Suri Ransomware can encrypt all types of files, but according to our researchers who tested this malware, it targets ...

11 days ago

KCTF Locker Ransomware

KCTF Locker Ransomware is a threat that was developed for the CyberSecurity Capture The Flag (CTF) competition. In other ...

11 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation