category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

5 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

6 year ago

Badday Ransomware

Badday Ransomware is one of the many ransomware infections that we have to deal with almost every day. Although there is nothing terribly unique about this program, we still need to inform you about the infection because it is there to rip you off. Thankfully, Badday Ransomware cannot steal your money unless you give it away willingly. Therefore, do not even think of paying anything to these criminals. Remove Badday Ransomware from your computer today, and then invest in a licensed security application that will help you protect your system from similar threats. Your computer’s security is in your hands. This ...

7 days ago

365Stream

365Stream is an extremely suspicious extension created for Google Chrome users, who can install it from chrome.google.com/webstore/detail/365stream/fgnblmibfljldcmglopklipacjjmjije. According to the information available on this Chrome web store page, the PUP (potentially unwanted program) is “offered by” 365-stream.com, but if you go to this website, you are not introduced to the installer of the extension. Instead, this website works as a platform for all kinds of ...

13 days ago

Nesa Ransomware

Nesa Ransomware is not a unique infection. Although the name is new, the infection itself is old, and we have seen it many times before. In the past, it took on many other names, including Meds Ransomware, Dutan Ransomware, or Zatrov Ransomware. According to our research team, all of these threats are part of the STOP Ransomware family, and they appear to have been created by the same attacker, or group of attackers. Needless to say, these infections operate as individual threats, and so all of them have to be analyzed individually too. That being said, they all have ...

13 days ago

Moka Ransomware

When the “.moka” extension is found attached to your files, there is no doubt that Moka Ransomware has invaded your system and encrypted your personal files. The added extension is not the only indicator of the infection. If you try to open the corrupted files, you will see that they are not readable, and that is not an error. The attackers behind the infection have made your files unreadable so that they could demand money from you. Unfortunately, at the time of research, the infection was not “decryptable,” by which we mean that legitimate decryptors that could help did not ...

13 days ago

Saefko

You are unlikely to realize when Saefko slithers in and when it performs highly intrusive and malicious actions. Unfortunately, stealthiness is the strength of this infection, and some victims discover it only when they randomly decide to scan their systems or when they implement security software to guard them. How did you learn about this dangerous Trojan? Regardless of your answer, you need to make sure that you remove Saefko as quickly as you can because every second that this threat exists, your virtual security becomes weaker and weaker. While we are sure that you will be able to ...

13 days ago

Ordinypt Wiper

Reports say that Ordinypt Wiper is targeted at people speaking German. Also, it seems this malicious application is used to attack businesses and not regular home users. As you see, the malicious emails carrying the Trojan appears to be coming from a woman seeking employment. Unfortunately, if victims open data attached to the described emails, their systems become infected. Soon after getting in, the threat should start encrypting various documents and other types of files. The worst part is that even though the malware’s creators may claim they can decrypt affected files, in reality, it is not possible due ...

13 days ago

Monokle

Monokle is a sophisticated malicious application that is used to spy on particular users only. It means that instead of being spread widely, the threat is distributed only among those who may have information or access to data that the hackers behind this malware may want. According to cyber security experts, the malicious application comes from Russian developers who provided tools that interfered with the 2016 US presidential elections. However, specialists describe Monokle as something they have never seen before. That has to do with its capabilities as it appears the malware might do much worse than spy on a ...

14 days ago

Travel Deals Center

Users who receive Travel Deals Center should know that this extension might read their browsing history. Such quality might be undesirable as some users could view it as a violation of their privacy, which is one of the reasons why the application was classified as a potentially unwanted program. To learn the other reasons, for which the plugin fell under this category, as well as other essential details about it, we invite you to take a look at the rest of our article. If you decide Travel Deals Center is not an extension you want to see on your ...

19 days ago

Arsium Ransomware

Arsium Ransomware is a tool designed for hackers who wish to create malicious applications used for money extortion. Usually, threats used for such a purpose encrypt victims’ data and display ransom notes that demand to pay for the needed decryption software. No doubt, if such a malicious application encrypts all of your photos, archives, videos, important documents, and data alike, you might be prepared to do anything to get it back. However, it seems like threats created with Arsium Ransomware cannot encrypt a lot of files. That is at least for now as there is a chance the malicious builder ...

20 days ago

Jack Ransomware

Jack Ransomware is a malicious computer infection, and users often do not realize how they get infected with it. It is usually possible to avoid installing Jack Ransomware on your computer, but it requires awareness from potential victims. We must educate ourselves about the ways these infections spread around. It doesn’t look like the ransomware endemic would end any time soon. So, when you remove Jack Ransomware, you might get attacked by another similar infection. And to avoid that, we have to learn more about them. Therefore, please continue reading this description to find out how ransomware programs spread ...

20 days ago

Predator the Thief

Predator the Thief, also known as Trojan.Predator.A, is a dangerous infection that targets vulnerable Windows operating systems and their careless ...

20 days ago

Fmovies

Fmovies might not look like much, but it is still a potential system security threat that could inadvertently redirect ...

20 days ago

Caleb Ransomware

The name of the malicious Caleb Ransomware comes from the extension that is added to the names of the ...

20 days ago

PyLock Ransomware

PyLock Ransomware is one of those horrible applications you might have already heard about that encrypt valuable files and show ...

20 days ago

Meds Ransomware

Do you know when and how Meds Ransomware entered your operating system? If you let this infection in by ...

20 days ago

DarkKomet

DarkKomet is a threat designed to spy on targeted victims as well as gather sensitive information. The malicious application ...

22 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation