Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 2,044,407 -2%
2 Conduit Search/Toolbar 1,615,669 -2%
3 PUP.SupTab 1,082,707 -2%
4 PUP.InstallCore 946,171 -2%
5 PUP.Optimizer Pro 931,788 -1%
6 PUP.SuperWeb 928,549 0%
7 Adware.Multiplug/Variant 882,069 -1%
8 Iminent Toolbar 744,996 -1%
9 Hijacker 655,634 -1%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware


The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware


The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus


The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans


Often incorrectly referred to as a virus, InetStat is a PUP (Potentially Unwanted Program) that is used to generate income at the cost of computer users. Although a few computer users do install InetStat thinking that InetStat is a useful utility, most of the time they may install InetStat automatically, because InetStat is bundled with other software. According to its description, InetStat is a download manager that is designed to monitor download and upload speed on the user's Web browser. However, download managers are among the most common ways of distributing PUPs, and InetStat is not an exception. InetStat has a propensity for inserting advertisements into the affected computer's Web browser. Because of this, malware analysts strongly advise computer users to avoid InetStat and remove this PUP if InetStat has already been installed on their computers. InetStat can be Easily...

Posted on May 1, 2015 in Possibly Unwanted Program is a low-quality search engine that has been associated with a particularly troublesome Web browser hijacker. is an adware that may take over a Web browser in order to force computer users to visit and related websites repeatedly. may be distributed by bundling with low-quality software downloads. Many free programs are bundled with adware installers that install and other adware as a way of generating revenue. Although not considered threatening, many PUPs (Potentially Unwanted Programs) like may have symptoms very similar to viruses and Trojans. Fortunately, PUPs are not destructive or pose a serious threat to your data, merely making it very annoying to use the affected Web browser. applies a tactic that may make it very difficult to use...

Posted on May 1, 2015 in Browser Hijackers

There have been numerous reports involving is a low-quality Brazilian search engine. However, computer users have reported that has been linked to suspicious behaviors that make it seem as if is linked to threats or browser hijacker activities. In fact, is suspicious because is linked to a PUP or Potentially Unwanted Program. is just one of countless low-quality search engines that are designed to take over a Web browser and redirect computer users to advertising material, hijacking their Web browser and online searches. Malware analysts consider these types of components as PUPs, and they may be linked to low-quality Web browser extensions or add-ons. How Low-Quality Web Browser Add-ons Linked to are Distributed The most common way in which low-quality Web browser extensions linked...

Posted on May 1, 2015 in Browser Hijackers


CrossBrowser is a Web browser that is specifically designed to expose computer users to unwanted advertisements, websites and software. While most advertisers deliver low-quality Web browser add-ons and extensions to carry out their misleading tactics, it is less common for them to create a specific Web browser designed to carry out these tasks. Curiously enough, CrossBrowser is exactly that: a Web browser that is designed to carry out the same tasks that an adware or PUP (Potentially Unwanted Program) in the form of a Web browser extension would usually carry out. CrossBrowser may Enter a Computer Using Questionable Techniques CrossBrowser is based on Chromium, a Google Chrome clone that may be used to create customized versions of this Web browser or to provide compatibility with operating systems such as the Linux variants. CrossBrowser itself is a Chromium-based browser that...

Posted on May 1, 2015 in Browser Hijackers

Fast Start

er users have been complaining that their homepages or their starting tabs on their Web browsers have been replaced or augmented by the inclusion of an application called Fast Start. Fast Start is a PUP (Potentially Unwanted Program) that may affect most Web browsers. Most complaints involving Fast Start include Google Chrome or Mozilla Firefox since Fast Start may add additional new tabs to the affected Web browsers, making them more difficult to use effectively. Fast Start may change your Web browser home page and new tab page automatically. Fast Start is not a dependable search engine, although Fast Start is advertised as an effective start and search tool for Web browsers. Fast Start is considered a browser hijacker and adware because Fast Start may take over a Web browser in order to expose computer users to advertising material automatically. The Symptoms Caused by Fast...

Posted on May 1, 2015 in Potentially Unwanted Programs is a deceitful website, which poses as a trustworthy and effective search engine that supposedly will provide reliable online results and help your browsing activities. In truth, is associated with browser hijackers and adware. These browser hijackers may replace your Internet browser and prevent you from achieving your needed tasks. They may alter your default homepage and search engine, and redirect your search results to questionable Web pages containing sponsored advertisements. Threats linked to may also download and install additional threats and decrease your PC's performance. To avoid irritating redirects to, you should remove all browser hijacking infections by using a genuine anti-malware application.

Posted on May 1, 2015 in Browser Hijackers is linked to a browser hijacker that may affect online users by replacing their Web browsers with may impact Internet Explorer, Google Chrome and Mozilla Firefox. is not a threatening website, but it might be utilized to profit from unsuspecting PC users. Adware related to may pester the computer user's desktop with its sponsored pop-up advertisements. Browser hijackers related to may disseminate through freeware and shareware downloaded by the computer user.'s associated websites may take control of the affected Web browser and reroute its search results to unwanted websites such as

Posted on May 1, 2015 in Browser Hijackers


GettingApps is the kind of application that can provide more problems than benefits when installed on a computer. For this reason, security researchers have classified GettingApps as a Possibly Unwanted program since it will be the computer user who will decide to keep or remove it from the computer. GettingApps usually enters a computer bundled with third parties free apps or GettingApps may be installed by the computer user. Once inside a computer, GettingApps may change the browser settings, collect information about the user's preferences, decrease the Internet speed and prevent the computer user from having a regular browsing experience due to the vast amount of unwanted advertisements GettingApps displays. GettingApps may affect Mozilla Firefox, Internet Explorer and Google Chrome.

Posted on May 1, 2015 in Potentially Unwanted Programs is a deceptive and confusing website that is related to browser hijackers and adware. will replace any Web browser used by the computer user with, and the Yahoo search engine will be the unique option for the users to do their online searches. However, typing any search term in the Yahoo search, they will be redirected to a website named If the computer users insist on using the replaced search engine (, they will get numerous advertisements that will match their queries, which means that their browsing information was collected and used to generate these advertisements. If computer users install a third-party, free program or visit a hacked website, their start page and search results may be hacked and replaced with Browser hijackers connected with may not ask the PC user's permission when...

Posted on May 1, 2015 in Browser Hijackers is related to a browser hijacker and masquerades as a useful search provider. Also, is linked to adware that may infiltrate a computer bundled with free programs that can be accessed for download on the Web. Browser hijackers and adware associated with may affect the Internet Explorer, Google Chrome or Mozilla Firefox Web browsers. Computer users should be very prudent when downloading a free product into their machines because these products may embrace additional applications that can be installed on the computer automatically. Computer users should always uncheck options that offer the installation of unknown programs. Browser hijackers and adware associated with may replace the default homepage and search engine with, or open it as a new tab window. These security threats may also add numerous sponsored...

Posted on May 1, 2015 in Browser Hijackers

Alpha Crypt

Alpha Crypt is ransomware designed by scammers to extort money from innocent web users. A bogus pop-up notification used by Alpha Crypt claims that your computer has been blocked because you were performing illegitimate online actions, such as downloading and dispersing forbidden/pirated content, sending spam emails or visiting malicious websites. An operating camera is added to the scary warning message of Alpha Crypt, which claims that your videos, files and images will be recorded for your identification. The deceptive pop-up notification used by an operating camera is created by a ransomware Trojan, which locks the corrupted PC and asks the victim to pay a ransom via Ukash or Paysafecard to unlock the computer. However, if the computer user pays the ransom, he/she will not be allowed to restore access to the PC. A ransomware Trojan will still leave the computer completely locked...

Posted on April 30, 2015 in Ransomware


The CasinoRewards binary is recognized as adware by security experts because it serves as a private ad platform for adware developers to earn pay-per-click revenue. The CasinoRewards adware is programmed to use banners, ad panels, video ads, pop-up and pop-under windows as well as transparent layers loaded with links to sponsors. Users infected with the CasinoRewards adware may be redirected to visit potentially harmful domains where your cyber security may be at risk. Moreover, the CasinoRewards adware may use tracking cookies, read your browsing history and detect your IP address in order to display related ads. The CasinoRewards may use a browser plugin, an extension, and an add-on to execute its operations, and you might notice CasinoRewards listed on the 'Programs and Features' list in the 'Control Panel' of Windows. You should note that the CasinoRewards adware may promote...

Posted on April 30, 2015 in Adware

PayYou Browser

The PayYou software service by Kromtech Alliance Corp. comes in two forms, an extension and a web browser suite that are promoted to allow you to earn real money during your everyday browsing activities. The PayYou web browser is custom build of the Mozilla Firefox application and displays advertisements while you surf the web. The PayYou browser extension does not differ from the Internet client, but its advantage is that it is built upon the Crossrider platform and can be attached to other web browsers. However, both PayYou tools use DOM storage data, HTTP and session cookies, read your browsing history and download list in order to generate custom-made commercials. You should note that the PayYou software is considered by security analysts as a Potentially Unwanted Program (PUP) with adware functionality that will display many banners, ad panels, pop-ups and pop-unders during your...

Posted on April 30, 2015 in Adware

‘’ Pop-Ups

You might want to know that the pop-ups in your web browser are propelled by adware on your computer. Security analysts advise users not to click on pop-ups by adware because they may be redirected to potentially harmful domains and insecure online resources. The adware associated with the domain may have arrived on your computer as a browser extension part of a freeware bundle that you installed via the 'Express' or 'Typical' option. The pop-ups allow adware developers to earn pay-per-click revenue, and you may be offered to fill out countless surveys and see promotional offers. However, you should keep in mind that the pop-ups are generated by adware, and it is not a good idea to click on links provided by Additionally, the IP address of is related to advertisers...

Posted on April 30, 2015 in Browser Hijackers

‘’ Pop-Ups

The domain is employed by adware developers that strive to earn pay-per-install revenue by promoting supposedly legitimate updates to the Java platform and the Adobe Flash Player. Users that install freeware via the 'Typical' or 'Express' option may install adware that shows pop-ups by in their web browser. If you are presented with pop-ups by you should not trust them because the Java platform and the Adobe Flash Player have built-in update features and updates from other sources are not legitimate. Therefore, the pop-ups in your web browser may suggest you to install harmful software. You should note that the IP address of is related to phishing websites that are used by cybercriminals to hijack user log-ins. Moreover,

Posted on April 30, 2015 in Adware
1 2 3 4 5 6 7 8 9 10 11 916