Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,489,534 2%
2 Conduit Search/Toolbar 1,139,771 1%
3 PUP.InstallCore 720,243 2%
4 PUP.Optimizer Pro 712,668 1%
5 Qvo6.com Hijacker 700,619 -0%
6 PUP.SupTab 666,621 2%
7 Adware.LinkSwift 647,477 -0%
8 V9 Redirect Virus 574,462 0%
9 Babylon Search/Toolbar 511,979 1%
10 WeDownload Manager 445,229 0%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Warning: Over 20,000 Gmail, AOL, and Yahoo Email Accounts Hacked!
A major email security scam has taken place today where hackers compromised over 20,000 Gmail, AOL and Yahoo email accounts and posted the login details of them online. It is apparent that there is a phishing scheme happening where hackers are able to obtain thousands of login credentials from...

More Articles

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

Kovter Ransomware

Screenshot

The Kovter Ransomware is a malware threat that carries out a common Police Ransomware scam in order to steal money from unsuspecting computer users. The Kovter Ransomware is a relatively new Police Ransomware Trojan, first detected in 2013 in the wild. Like most Police Trojans, the Kovter Ransomware displays a fake message from the police intending to trick the victim into paying a 'penalty' in order to stay away from jail time. Like other Police Rasomware, the Kovter Ransomware has a Winlocker component that allows the Kovter Ransomware to block access to the infected computer. However, the main reason why the Kovter Ransomware has attracted the scrutiny of malware researchers is...

Posted on April 10, 2013 in Ransomware

CIBS Pol Virus (Ransomware)

Screenshot

The CIBS Pol Virus is a police ransomware Trojan that belongs to the Urusay family of malware. This police ransomware Trojan is classified as a Winlocker because it blocks access to the victim's computer by displaying a full-screen message that claims to be an alert from the police. CIBS Pol Virus is a well known scam that is in no way connected to the police force. Instead, the CIBS Pol Virus is used by criminals to scam inexperienced computer users so that they will hand over their money out of fear of prosecution, jail time and severe fines. If your access to your computer is blocked by the CIBS Pol Virus, ESG security researchers strongly advise against following the steps...

Posted on February 21, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Malware, Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

CouponTime

CouponTime joins the countless adware programs offered on the Internet as helpful browser add-ons. Although displaying numerous commercial offers, coupons and deal to the online shopper, CouponTime's advertisements are annoying, invasive and unwanted. These advertisements also may not be related to your Web searches and even be fake. CouponTime may add itself as a browser add-on to Internet Explorer, Google Chrome and Mozilla Firefox. Besides been used to display sponsored advertisements that, if clicked, may direct the computer user to compromised websites, CouponTime also collects data that, after shared, will show targeted advertisements on the affected computer. CouponTime is distributed by its website coupontime.info. It is advised do not let CouponTime remain on your computer. Removal of CouponTime may be done manually, but the safest method is uninstalling it wit a proper...

Posted on October 17, 2014 in Adware

MalSign.Generic.6E2

MalSign.Generic.6E2 is a Trojan infection that after installed and running on an infected computer will modify your Registry files' data and compromise your system data's files. MalSign.Generic.6E2 takes control of an affected system by injecting harmful codes on it. These codes will be updated constantly to avoid detection. Windows Vista, Windows XP, Windows 7, Windows Server 2008, Windows Server 2003, Windows 98, Windows NT, Windows 95 and Windows 2000 may be affected by MalSign.Generic.6E2's presence. MalSign.Generic.6E2 may redirect the computer user to unsafe websites by displaying numerous unwanted advertisements that when clicked will trigger the redirections. MalSign.Generic.6E2 may be used by third parties to collect crucial data that will be used for profit-oriented advertisements. MalSign.Generic.6E2 also may install other threats, PUPs, browser hijackers, etc. on the...

Posted on October 17, 2014 in Adware

SharkShopper

SharkShopper, or SharkShopper Ads, promises to aid you with your online shopping by displaying coupons, promotions, deals and related advertisements. Although SharkShopper's advertisements may be useful, sponsored advertisements such as the ones displayed by SharkShopper may lead computer users to unsafe websites when clicked. Also, SharkShopper may record your browsing searches and share it with its sponsors. If you have downloaded SharkShopper and are willing to keep this adware-laced program installed on your machine, you should be aware of the problems associated with it. If SharkShopper has entered your computer without your interference and you want to remove this Possibly Unwanted Program from your computer, you should use a good anti-malware application.

Posted on October 17, 2014 in Potentially Unwanted Programs

FoxSales

Computer users that have downloaded FoxSales when looking for a helpful add-on may be surprised when they find out that FoxSales is a disappointing adware program. Besides displaying unwanted advertisements, FoxSales also may enter their computers when they download a no-cost program from a third party automatically. Any program that imposes itself should be looked, at least, as suspicious. FoxSales will not be of any help to the computer user since its main purpose is to display advertisements and collect the computer user's browsing preferences that will be sent to its sponsors as advertisement leads. FoxSales, by itself, is not a threat, but FoxSales is classified as a Possibly Unwanted Program and should be removed from the affected computer. An anti-malware program will hep you to accomplish this task.

Posted on October 17, 2014 in Potentially Unwanted Programs

CutThePrice

Who doesn't want to find good deals when online shopping? For this reason, various online shoppers seek browser add-ons to help them with their online shopping. Browser add-ons may be very useful, but some of them, such as CutThePrice, are adware-laced programs that, although providing advertisements related to your online searches, is not intended to help you. CutThePrice's objective is to display sponsored advertisements, no matter if you want it or not. CutThePrice collects search terms and visited URL to provide accurate leads to its sponsors. CutThePrice may be downloaded from its website, cuttheprice.info, but CutThePrice also may be bundled with free software and spread by InstallRex installers. Since it may not be safe to keep adware on your computer, you should remove CutThePrice and its components with a malware remover.

Posted on October 17, 2014 in Adware

HTML:FakeLock-F [Trj]

HTML:FakeLock-F[Trj] is a Trojan infection that may be acquired when the computer user visits a compromised website that have HTML:FakeLock-F[Trj]'s codes or programs bundled with its search results. In this case, HTML:FakeLock-F[Trj] may be installed on the user's computer automatically. After its installation, HTML:FakeLock-F[Trj] will change the browser settings and open a new tab or replace the browser's homepage. Then, HTML:FakeLock-F[Trj] redirects the computer user to a ransomware site supposedly linked with the Interpol (an Italian law-enforcement entity). One of HTML:FakeLock-F[Trj] actions is to hide itself on Task Manager pretending to be a regular program. HTML:FakeLock-F[Trj] tries to reach the computer's server in order to collect privileged data. HTML:FakeLock-F[Trj] has another curious feature that allows HTML:FakeLock-F[Trj] to erase its cookies, browsing history and...

Posted on October 17, 2014 in Trojans

Complitly

Don't let a program named Complitly mislead you into thinking that its quick links, translations and spelling check may be worth to have Complitly installed on your computer. Although Complitly's features may look very appealing, Complitly is an adware-laced program that will annoy you with frequent and unwanted advertisements, coupons, deals and other related offers. Complitly was developed by Simply Tech. Complitly may be downloaded by the computer user from its website, complitly.com, or may simply enter the computer by joining the installation of freeware. Once inside, Complitly modifies your Web browser settings and home page. The advertisements displayed by Complitly, if clicked, may direct computer users to compromised websites. For that reason, it is advised to uninstall Complitly from the affected computer. An up-to-date malware remover may be required to remove Complitly...

Posted on October 17, 2014 in Adware

ConvertAd

ConvertAd is an advertisement-supported adware program and a clone of CosstMinn, SmartOnes and countless other Possibly Unwanted Programs available on the Internet. Any computer user that have tried to use a browser add-on that displays sponsored advertisements knows that it can be a disappointing experience since the displayed advertisements may be unrelated to their online searches or so numerous that will disrupt their online shopping and other tasks. Another negative feature of ConvertAd is that it may enter a computer stealthily, bundled with free programs downloaded by the computer user or via compromised websites. ConvertAd may collect search terms, websites and URLs and divide the information with third parties. Computer users should get rid of PUPs such as ConvertAd with a malware remover tool.

Posted on October 17, 2014 in Potentially Unwanted Programs

Asnbm.myftpsite.net

Asnbm.myftpsite.net is a browser hijacker that mimics the appearance of popular search engines such as Google, Bing, Yahoo and others. Asnbm.myftpsite.net alters your Web browser's DNS default settings. Asnbm.myftpsite.net uses unfair ways to enter a computer such as through insecure downloads of free software, spam e-mails, corrupted links, music, movies and other shady techniques. As soon as Asnbm.myftpsite.net is installed on a computer, Asnbm.myftpsite.net starts displaying pop-up warnings and advertisements that will prevent you from having a normal browsing activity. These advertisements may match your online searches but, if clicked, may redirect you to unsafe websites that will further aggravate the situation. Browser hijackers have capabilities that allow them to monitor the websites and URLs visited. Other problematic actions may occur when infected with a browser hijacker...

Posted on October 16, 2014 in Browser Hijackers

Trojan:Win32/Ruovs.A

Another high-level threat named Trojan:Win32/Ruovs.A was recently detected by threat researchers. Trojan:Win32/Ruovs.A is a Trojan infection that invades the targeted computer stealthily, and after installed, may perform several actions that will cause severe damage to the infected machine. Trojan:Win32/Ruovs.A is a variant of the nasty Trojan.Zbot and also is detected under the name Trojan.Win32.Reconyc.cibt. By displaying a pop-up update alert, Trojan:Win32/Ruovs.A may induce computer users into downloading threats onto their machines. Trojan:Win32/Ruovs.A may paralyze the computer's system and damage crucial folders and files. Trojan:Win32/Ruovs.A will prevent the computer user from connecting the Internet to avoid detection and removal. Trojan:Win32/Ruovs.A offers a fake virus scanner that, if downloaded, will not close by normal means. Trojan:Win32/Ruovs.A may turn the infected...

Posted on October 16, 2014 in Trojans

Speed Browser

Speed Browser is a program developed by Eager Wire Apps, LLC using the Chromium technology. Speed Browser claims to increase your browser's speed. First of all, Speed Browser is adware or a Possibly Unwanted Program, and second, Speed Browser doesn't deliver exactly what Speed Browser promises. Speed Browser can be downloaded from its related domain, getspeedbrowser.com or may enter the computer packed with the installation of a free programs from third parties. Besides changing your default browser, Speed Browser may be utilized to open some files such as .htm, .html and others. When using Speed Browser, Trovi.com, a site associated with a browser hijacker and related to the Conduit search engine, will be set as your default home page. Since Conduit.com is associated with unsafe online advertisements, and Trovi.com is a suspicious search engine, the computer user will be in bad...

Posted on October 16, 2014 in Potentially Unwanted Programs

Easyslowpcpatch.be

Easyslowpcpatch.be advertisements may appear on your desktop due to a browser extension that may attach itself to the Web browser of your choice, no matter if it is Internet Explorer, Chrome, Mozilla Firefox or another one. Usually, this kind of Possibly Unwanted Program is introduced on the targeted computer via third parties software that have allowed its presence on its installation process. Although Easyslowpcpatch.be is not a threat to the compromised computer, the advertisements displayed by Easyslowpcpatch.be may bring unwanted problems to computer users such as interrupting their normal browsing; collecting advertisement leads by monitoring the computer user's browsing habits; consuming systems resources; and performing other troublesome actions. By reading the Terms and Agreements before installing third party software on their machine carefully, computer users can prevent...

Posted on October 16, 2014 in Browser Hijackers

SaleMaker

If you have downloaded a tool named SaleMaker thinking that SaleMaker will help you when online shopping, think twice. SaleMaker displays online offers, promo codes, coupons, deals and other advertisements, but these advertisements may not match your online searches or be based on browsing information collected by SaleMaker. If you can see unwanted advertisements displayed by SaleMaker and do not remember installing it, SaleMaker may have entered your machine bundled with third party software downloaded from the Internet. SaleMaker is an invasive adware that will display its advertisements on the Web page you are visiting, whether you want it or not. Therefore, if the advertisements displayed by SaleMaker are disturbing your Web browsing and you want to remove SaleMaker, you should choose an anti-malware product to help you to perform this task.

Posted on October 16, 2014 in Adware

TrueDownloader

There is a tool named TrueDownloader that has attributes such as executing more than one download at the same time, delivering a very fast file download, pausing/resuming downloads and more. Since TrueDownloader is an open-source download manager, you can adjust TrueDownloader according to your necessity. While having superb features, TrueDownloader may modify your Web browser features, take control of it and redirect the computer user to undesired places. The amount of advertisements displayed by TrueDownloader may consume system resources, making the infected machine slow and irresponsive. Also, TrueDownloader may monitor your browsing preferences and use collected data to display advertisements based on it. TrueDownloader has some singular sponsored characteristics such as FTP and HTTP. TrueDownloader makes copies of itself and adds it to your hard disk under the name...

Posted on October 16, 2014 in Potentially Unwanted Programs

Diigo

Diigo is an add-on that offers several free products to help computer users to optimize their online experiences. Diigo allows you to access your account using a drop-down menu containing uncomplicated buttons; provides Browser Helper Objects; desktop applications; mobile applications; and extensions that are compatible with Internet Explorer, Chrome, Mozilla Firefox,and Safari. Diigo's products also are compatible with various other operating systems that include Mac OXS, Android and iOS. What may make the products provided by Diigo to be unsafe is that people that used these products have been reporting some symptoms that may be associated with it. These problems include unwanted advertisements; control of the Web content; features that don't work properly; search results sponsored by third parties; and collection of data that may be used for marketing purposes. It has been...

Posted on October 15, 2014 in Adware
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 12437