Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,099,600 0%
2 Conduit Search/Toolbar 875,439 0%
3 Adware.LinkSwift 630,029 0%
4 Qvo6.com Hijacker 608,359 0%
5 PUP.Optimizer Pro 554,232 0%
6 V9 Redirect Virus 536,791 0%
7 PUP.InstallCore 527,398 0%
8 PUP.SupTab 471,997 0%
9 Babylon Search/Toolbar 423,458 0%
10 WeDownload Manager 416,203 0%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

Kovter Ransomware

Screenshot

The Kovter Ransomware is a malware threat that carries out a common Police Ransomware scam in order to steal money from unsuspecting computer users. The Kovter Ransomware is a relatively new Police Ransomware Trojan, first detected in 2013 in the wild. Like most Police Trojans, the Kovter Ransomware displays a fake message from the police intending to trick the victim into paying a 'penalty' in order to stay away from jail time. Like other Police Rasomware, the Kovter Ransomware has a Winlocker component that allows the Kovter Ransomware to block access to the infected computer. However, the main reason why the Kovter Ransomware has attracted the scrutiny of malware researchers is...

Posted on April 10, 2013 in Ransomware

CIBS Pol Virus (Ransomware)

Screenshot

The CIBS Pol Virus is a police ransomware Trojan that belongs to the Urusay family of malware. This police ransomware Trojan is classified as a Winlocker because it blocks access to the victim's computer by displaying a full-screen message that claims to be an alert from the police. CIBS Pol Virus is a well known scam that is in no way connected to the police force. Instead, the CIBS Pol Virus is used by criminals to scam inexperienced computer users so that they will hand over their money out of fear of prosecution, jail time and severe fines. If your access to your computer is blocked by the CIBS Pol Virus, ESG security researchers strongly advise against following the steps...

Posted on February 21, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

TechSquare

TechSquare is adware that may display unwanted ads when the computer user is visiting online shopping and social networking websites. If the computer user clicks on the pop-up advertisements displayed by TechSquare, adware may send computer users to suspicious websites. TechSquare may target and be installed on Internet Explorer, Mozilla Firefox and Google Chrome. When installed on the PC, TechSquare may change browser settings and substitute the default homepage and search engine with a questionable website. TechSquare may display a variety of pop-up ads and sponsored links associated with the computer user's surfing activities. TechSquare may keep track of the computer user's browsing activity, and transmit gathered information to third-parties.

Posted on March 2, 2015 in Adware

Perfect Navigator Ads

Perfect Navigator is adware that may show annoying pop-up ads labeled 'Ads by Perfect Navigator'. Perfect Navigator may slow down the computer system and show messages by Perfect Navigator at the bottom of each website the PC user visits. Perfect Navigator may lead to PC problems on the computer. Perfect Navigator may typically come bundled with other free software that the computer user can download from the Web. Some free downloads do not reveal PC users that other software will also be installed, and the computer user may notice that he has installed Perfect Navigator inadvertently. If the computer system is affected by Perfect Navigator, the PC user may also see some hyperlinks inserted to websites that the computer user visits. Some highlighted words with double underline may be added that may show Perfect Navigator pop-ups advertisements if the computer user moves a mouse over...

Posted on March 2, 2015 in Adware

Web United Ads

Web United is adware that may display annoying pop-up advertisements and messages on the desktop of the PC. The pop-up messages of Web United might be produced with the goal of delivering targeted advertisements, and they may be used to promote certain questionable websites. Web United may typically come bundled with various freeware that computer users can download from the Internet. Some downloads of free applications do not inform PC users that other programs will also be installed, and PC users may later notice Web United and other apps have been installed on the computer. Web United may display pop-up messages and advertisements while surfing the Web.

Posted on March 2, 2015 in Adware

ActSys

ActSys is adware that may show a variety of random pop-up advertisements on the PC while the computer user is surfing the Internet. ActSys can enter Internet Explorer, Mozilla Firefox and Google Chrome web browsers. When ActSys invades the computer system, it may start showing annoying pop-up advertisements while the PC user is surfing shopping-related websites, social networking or some other popular websites. If the PC user clicks on any pop-up advertisements delivered by ActSys, he may get unwillingly redirected to dubious websites. ActSys may enter the PC through bundled freeware. Computer users may avoid downloading ActSys if they are careful while installing other freeware and unchecking all options that offer to install additional unidentified programs.ActSys may grab details about the computer user's browsing habits. ActSys may then transmit this data to third parties for...

Posted on March 2, 2015 in Adware

GOSafer

GOSafer is adware that may come packaged with free programs that computer users download from the Internet. In order to evade GOSafer, PC users should pay more attention to the installation process of free programs. Usually, computer users should find the check mark that agrees to install GOSafer and deselect it. This can be done by choosing 'Custom' or 'Advanced' installation method of free programs. While being installed, GOSafer may display numerous unwanted pop-up ads, offers, discounts and coupons. GOSafer may keep track of the computer user's browsing routine with the aim to display targeted ads. GOSafer may also result in forced browser redirects to suspicious websites that it may be promoting.

Posted on March 2, 2015 in Adware

FreePriceAlerts Ads

FreePriceAlerts is adware that is known for displaying random pop-up ads that may present computer users with coupon or shopping savings. The FreePriceAlerts app may load on a system from installing a previously downloaded freeware application. FreePriceAlerts may alter system settings to get the ability to display annoying pop-up advertisements. Removal of FreePriceAlerts should be a priority to restore your system to normal operation without having the interruptions from FreePriceAlerts.

Posted on March 2, 2015 in Adware

Cash Reminder Ads

Cash Reminder is an adware program that is known for displaying various deals or online shopping savings. Through the 'Ads by Cash Reminder' pop-ups, you may be presented with several links to supposedly receive coupons or online deals when surfing popular online shopping sites. In some cases, Cash Reminder may display these ads at random causing interruptions when you are surfing the Web. Also, you may be redirected to unwanted sites that may spread other unknown programs through the links of Cash Reminder. It is best that you eliminate adware activities from taking place by removing Cash Reminder or any related components that may have loaded with previously downloaded freeware applications.

Posted on March 2, 2015 in Adware

Volaro Ads

Volaro is adware that displays pop-up ads when shopping online. Disabling 'Ads by Volaro' may not solve the adware problem. Uninstalling and reinstalling Internet browser may not help as well. Volaro can be found on Internet Explorer, Mozilla Firefox and Google Chrome. Like other adware that's being distributed on the Web as of late, Volaro is found bundled with freeware such as free video file converters, codecs and similar apps. When the PC user chooses to install a free application, it might have additional toolbars, browser extensions and add-ons incorporated in the installation wizard. These are marked as optional programs, but if the computer user does not uncheck the check box for adding them, he may end up having unpleasant system modifications.

Posted on March 2, 2015 in Adware

Lizard Squad Hacker Group Suspected to Have Hijacked Lenovo.com Domain

Hackers groups are always on the lookout for their next victim just like an avid hunter seeking the next meal to place on his dinner table. The hacker group known as Lizard Squad has been recently suspected of being responsible for hijacking the Lenovo.com domain. As you may already know, Lenovo.com is the home page belonging to the world's largest personal computer vendor, Lenovo. In recent news, Lenovo has been under fire for pre-bundling their laptop computers delivered shipped September 2014 to December 2014 with the Superfish software. As you may know, Superfish was discovered to be a malicious add-on and root cause for rogue security certificates that could relinquish personal data transmitted over the internet. Computer security experts believe in the recent hijacking of Lenovo.com that the Superfish incident was a trigger to initiate an attack on the website. In...

Posted on February 27, 2015 in Computer Security

TeslaCrypt

TeslaCrypt is ransomware that demands payment of $500 USD in Bitcoins or $1000 USD in PayPal My Cash Cards to decrypt your data. The TeslaCrypt ransomware encrypts your files with the AES encryption algorithm. Additionally, the TeslaCrypt ransomware will replace your wallpaper with a ransom warning and add another file called 'HELP_ TO_DECRYPT_YOUR_FILES.txt.' The computer user will need a specific decryption key to getting back the encrypted files. The TeslaCrypt ransomware can be found attached to spam emails or corrupted websites. You may want to follow the standard safety policies regarding the attachments to spam emails that advise users not do download such files. Protection from the TeslaCrypt ransomware and other malware can be attained by the installation of a reputable anti-malware solution.

Posted on February 27, 2015 in Ransomware

Win32/Nuqel.BD

The cyber threat Win32/Nuqel.BD is classified as a worm that is part of the Nuqel, malware family. The Win32/Nuqel.BD worm is specialized in obstruction of the normal operation of programs and download and execution of other malware. Worms such as Win32/Nuqel.BD can spread via email and copy itself to removable devices and shared folders. Web surfers may become infected with the Win32/Nuqel.BD by opening links from spam emails or download and run attached files from spam. The Win32/Nuqel.BD worm can place its files with 'Read Only' label in 'System32' and 'APPDATA' folder of Windows. Security analysts note that Win32/Nuqel.BD can insert a registry key in Windows to ensure that it will auto-start at every system boot-up. The Win32/Nuqel.BD worm can disable system utilities such as the Windows Task Manager, msconfig.exe, and regedit.exe. Computer users infected with the Win32/Nuqel.BD...

Posted on February 27, 2015 in Worms

Adware.Generic6.QDX

Computer users notified of the Adware.Generic6.QDX infection might want to know that it is a general name used by security solutions to specify adware. Security experts note that adware often arrives on PCs by bundling with free software installers that many users don't bother to handle via the 'Advanced' or 'Custom' option. The Adware.Generic6.QDX cyber threat may appear as a Browser Helper Object, an add-on and a browser extension depending on what web applications you have installed on your system. The Adware.Generic6.QDX can collect information about your favorite websites and preferred online resources in order to personalize the marketing materials presented to you. The Adware.Generic6.QDX might show pop-ups loaded with ads and banners that may cover your browser surface. If you want to secure your online activities and purge Adware.Generic6.QDX from your PC, you might want to...

Posted on February 27, 2015 in Adware

Search Better Ads

The Search Better browser tool by APN, LLC functions as a private ad platform that monetizes clicks on ads, and it is deemed by security researchers as adware. Search Better is another adware such as the RadioRage Toolbar , Local Crime Watcher Toolbar and EasyPDFCombine Toolbar that are connected to Ask.com. Adware developers often promote the services of Ask.com, and the Search Better adware may set Ask.com as your homepage and default search engine. Moreover, the Search Better adware might push advertisements in your web browser by using a browser extension, an add-on and a Browser Helper Object. The Search Better adware can be automatically installed on your PC during an 'Express' or 'Typical' installation of a freeware package. The ads by Search Better may take the form of pop-ups and pop-unders as well as contextual and transitional ads and banners. Many users might not...

Posted on February 27, 2015 in Possibly Unwanted Program

Alwaysnewsoft.my-software.info

Despite what the Alwaysnewsoft.my-software.info domain name suggests it is used by adware to display pop-windows and promote Potentially Unwanted programs (PUPs). The Alwaysnewsoft.my-software.info pop-up window may appear every time you launch your web browser thanks to a registry key in Windows. Web surfers can be noted that the adware related to Alwaysnewsoft.my-software.info might use a Browser Helper Object, an add-on, and a browser extension to perform its activities. You may be interested to know that adware is often embedded with free application installers as an extra tool. Security experts remind that adware can be automatically installed on your system when you install freeware via the 'Express' or 'Typical option. The Alwaysnewsoft.my-software.info pop-up should not be trusted because it may lead you to install potentially harmful software or direct you to visit unsafe web...

Posted on February 27, 2015 in Browser Hijackers

NexusBooster

The NexusBooster browser enhancer is classified by security analysts as adware infection that is being used by retailers as a marketing engine. The marketing materials by the NexusBooster adware may take the form of in-text hyperlinks to sponsored products and services, banners, ad boxes and pop-windows loaded with ads. You might wish to know that the NexusBooster adware can be found in free software installers promoted as a helpful app when you use the 'Advanced' or 'Custom' option. The ads by NexusBooster may appear related to your browsing activities because the NexusBooster adware can use tracking cookies. The NexusBooster adware may install a browser extension, a Browser Helper Object, and an add-on to facilitate its operations. Computer users can use a trusted anti-malware tool to remove the NexusBooster adware from their PC and secure their online browsing.

Posted on February 27, 2015 in Possibly Unwanted Program
1  2  3  4  5  6  7  8  9  10  11  12  Next     Total items: 13274