Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,961,342 -1%
2 Conduit Search/Toolbar 1,359,323 -0%
3 PUP.SupTab 858,002 -1%
4 PUP.InstallCore 825,671 -0%
5 Adware.SuperWeb 792,732 -1%
6 PUP.Optimizer Pro 790,563 -0%
7 Adware.Multiplug 672,779 -1%
8 Hijacker 635,150 0%
9 Adware.LinkSwift 634,647 -0%
10 Iminent Toolbar 613,282 -1%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles


LaSuperba may be associated with numerous problems that may be caused by PUPs (Potentially Unwanted Programs). LaSuperba may interrupt the computer users' activities when browsing the Web and cause performance problems on affected Web browsers. LaSuperba is linked to an adware that may affect most commonly used Web browsers on the Windows operating system, including Internet Explorer, Mozilla Firefox and Google Chrome. LaSuperba advertisements may take the form of irritating pop-up messages that make it very difficult to use the affected Web browser. In most cases, removing adware associated with LaSuperba will stop LaSuperba advertisements from appearing on affected Web browsers. However, most adware infections do not come alone; the presence of one adware component may indicate the presence of others, all of which may be connected with LaSuperba and similar unwanted content....

Posted on August 31, 2015 in Adware

VirLock Ransomware


The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware


The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

The domain is deemed as harmful because security analysts have associated it with a browser hijacker. The browser hijacker is designed to perform occasional redirects to and may promote harmful software. The browser hijacker may have arrived on a computer as a browser assistant enclosed with a free software bundle. The browser hijacker can affect Google Chrome, Mozilla Firefox, and Internet Explorer and redirect users when they type a URL address, click on links on a Web page or try to do a search on Google. Security analysts strongly advise against clicking on content or downloading software promoted by Besides the redirections, also may display numerous advertisements from third-party advertisers. These advertisements may direct the computer users to dubious online vendors or...

Posted on May 6, 2016 in Browser Hijackers


JisuCopy is an ad-supported application that is advertised as a necessary helper for online shoppers. However, JisuCopy is considered adware by security experts, due to its aggressive modus operandi and dubious features. JisuCopy may present useful advertisements, coupons and offers to computer users, but these ads may be based on information collected from the affected computer, without its user's acknowledgment. The adware linked to JisuCopy may have arrived on your PC as an additional component of a freeware setup file. The aim of the JisuCopy adware is to display advertisements and pop-ups in your Web browser The JisuCopy adware may not only give you a negative browsing experience, but also create additional problems such as diminishing your computer speed, changing your homepage, redirecting your search engine, and downloading threats. JisuCopy is not an application that you...

Posted on May 6, 2016 in Adware


If you like to be aware of weather changes, or if you are planning a trip and need to know what will lay ahead, you shouldn't trust an application called WeatherChickn to provide the information you need. Since WeatherChickn is an ad-supported application, its real function is to exhibit as many advertisements it can on the computers WeatherChickn manages to get inside. You may have installed WeatherChickn voluntarily, or it may have entered your machine accompanying free software bundles when you didn't use the 'Custom' or 'Advanced' option and wasn't able to see that an additional program was being installed. WeatherChickn is classified as adware because it may use tracking cookies and create numerous ads in your Web browser. The WeatherChickn adware is may place its files in the AppData folder of Windows and attach a Browser Helper Object, browser extension or add-on to Internet...

Posted on May 6, 2016 in Adware

Hoie Ads

The word 'hoje' in Portuguese, means today, so when Portuguese speakers see the ads displayed by an application called 'Hoje Ads' they may click on them hoping to find the best deals for the day. The Hoie adware may get access to your computer bundled with free applications downloaded and installed through the Web. The 'bundling' method is a well-known way for adware, PUPs, and similar parasites enter a computer. This entrance method may occur when you don't notice that an additional program will be installed with the main application. This is why you should choose the 'Advanced' or 'Custom' installation; this way you can uncheck the box that allows the installation of additional offers. Therefore, if you start noticing advertisements labeled ' Powered by Hoje,' it is happening because its related adware has already entered your machine. The Hoie adware may inundate the Web pages...

Posted on May 6, 2016 in Adware

Playback Ads

The Playback application may enter your PC as a drive-by installation of a freeware program. Playback is promoted as an application that can help computer users play videos and listen to music in an easier way. This may seem to be a nice feature to computer users that like to spend their free time enjoying this kind of entertainment, but you should know that Playback may inject numerous advertisements in your Web browser and lead you to suspicious websites. By installing the Playback adware on your PC, you may be presented with links to unsafe online content and your browsing history and bookmarks could be collected and used by Playback to provide you with personalized commercials. Adware such as the Playback may utilize toolbars, plugins, add-ons, Browser Helper Objects and browser extensions to accomplish its intent. Moreover, the Playback adware may launch a background service...

Posted on May 6, 2016 in Adware

Jaku Botnet

The Jaku Botnet is a network of compromised computers that are infected with the Jaku Botnet Trojan, which can operate as a Remote Access Trojan (RAT) and Trojan dropper. Unlike the Pony Botnet and the Lecpetex Botnet , the victim pool of the Jaku Botnet includes no more than twenty thousand users, but can be expanded easily. Additionally, researchers suggest that the Jaku Botnet might be used for targeted espionage and the misappropriation of industrial secrets. The victims of the Jaku Botnet are members of International Non-Governmental Organisations (NGOs), industrial corporations, academic facilities and government agencies. The Jaku Trojan have compromised residents of one hundred and thirty-four countries, and there are large clusters of victims located in Japan, South Korea, Taiwan, USA, and China. The payload of the Jaku Botnet is deployed to users via poisoned files...

Posted on May 5, 2016 in Botnets


Computer users that experience pop-ups from domains like,,, and may be infected with a browser hijacker or a rogue security software like Antivirus Center . Pop-up windows that originate from domains like,,, and are associated with browser hijacking applications predominantly. A browser hijacker on your PC may generate [RANDOMNUMBERS+RANDOMLETTERS].tech and urge you to call phone numbers like 855-910-5732 , 855-790-1710 and 844-436-4253 that are operated by uncertified computer technicians. Calling the phone numbers listed on the [RANDOMNUMBERS+RANDOMLETTERS].tech pop-ups you may risk losing money and being tricked to provided remote access to your computer. PC users that are presented with the [RANDOMNUMBERS+RANDOMLETTERS].tech pop-ups may notice...

Posted on May 5, 2016 in Adware

Backdoor: Win32/Kirts.A

PC users that are presented with a security alert involving the Backdoor: Win32/Kirts.A should not overlook the detection. The Backdoor: Win32/Kirts.A malware is a Backdoor-Trojan that may be used by a third-party to deploy threats on your machine and compromise the security of networks you are part of. The Kirts Backdoor-Trojan has many versions that are labeled following the model Backdoor: Win32/Kirts.[letter indicating a new version]. The Backdoor-Trojans in the Backdoor: Win32/Kirts family of threats are packed as batch files (.BAT file extension) and are loaded with a CMD script that is used to issue commands to the Windows core directly. The Backdoor: Win32/Kirts malware may be spread among users via spam mail, and you should not download and open RAR files that are attached to spam emails. The Backdoor: Win32/Kirts.A malware is designed to connect to remote servers and...

Posted on May 5, 2016 in Backdoors

Social2Search Ads

Computer users that favor social media when it comes to choosing a fast and reliable method for staying connect to their friends may be interested in the Social2Search software. The Social2Search program is advertised as 'a social search engine that gives you access to the knowledge of your friends.' In other words, the Social2Search software allows you to use a custom search engine at to browse content that your contacts like, share and upload to Facebook, Twitter, Instagram, Pinterest, LinkedIn and Google+. The Social2Search application works as a browser extension that might change your default search engine and homepage settings to customize your Internet experience. The idea behind the Social2Search extension may sound great, but you should avoid installing it. Security researchers reveal that the Social2Search program is a custom build of the Wajam...

Posted on May 5, 2016 in Adware

BigSporting Ads

Computer users that feel the need to change their lifestyle and like to practice a sport may be introduced to the BigSporting application. The BigSporting application is promoted at as a tool that can provide PC users with details on how to play soccer, golf, basketball, and volleyball, as well as help them find sports equipment. The BigSporting application also may allow its customers to benefit from updates from ESPN, Yahoo! Sports and NBC Sports. Many users may like to install the BigSporting application simply because it may offer discounts on fitness equipment. Unfortunately, the BigSporting software is adware and may bombard your screen with advertisements and redirect you to untrusted online stores. Security analysts reveal that the BigSporting adware is a modified version of the FitnessLance adware by Informer Technologies, Inc. The BigSporting aware may use...

Posted on May 5, 2016 in Adware


Guardbox is a Potentially Unwanted Program whose installation may change the way your Web browser behaves. The Guardbox software may include a Web browser extension whose purpose is to prevent the user from viewing websites whose content is considered to be unsafe. This includes Web destinations associated with threats, as well pages that are known to distribute illicit content like pirated versions of various software. Although the Guardbox utility may sound like a great thing to have by your side while browsing the Web, there are some concerning things that you should know about this software product. Guardbox may execute automatic actions such as injecting marketing content in the users' Web browser or changing their homepage and search engine to a website affiliated with the Guardbox's publishers. The security features that Guardbox offers are questionable as well, and you...

Posted on May 4, 2016 in Possibly Unwanted Program

Mobef Ransomware

Mobef Ransomware is a dangerous malware threat that is much like recent crypto-ransomware infections that will encrypt files on an infected computer. Mobef Ransomware is able to load on a system mostly from malicious file attachments on spam email messages. When computer users open up such attachments on spam email messages, they will then load the Mobef Ransomware infection. Once Mobef Ransomware is loaded, it may then start to encrypt data and files on the system leaving the infected computer nearly useless for performing basic functions. Additionally, systems infected with Mobef Ransomware may not be able to surf the Internet. The Mobef Ransomware threat is accompanied by a notification message with red lettering claiming that you may obtain a decryption key through payment of the ransom fee. The Mobef Ransomware message may then relay an email address that you are instructed...

Posted on May 4, 2016 in Ransomware


FirstOffer is an adware extension that may use misleading presentations and false claims to trick users into thinking that FirstOffer is a useful Web browser utility that can help save money and time while shopping online. According to FirstOffer's official website and download location, this extension is the perfect tool for avid online shoppers, because FirstOffer can provide them with instant updates regarding the best deals, coupons, and discounts available online. This may seem like a useful offer, but the deals that FirstOffer finds may not be reliable, and this extension may often lead users to shady online markets that must not be trusted under any circumstances. The advertisements that FirstOffer displays may often contain links to affiliate products and services that may not be relevant to the user's interests and likenesses. Overall, the sole purpose of FirstOffer is to...

Posted on May 4, 2016 in Adware is a search engine that features a neat search box and a small collection of links to popular Web destinations. Overall, the page doesn't seem like it is associated with any suspicious activity or applications but unfortunately there's more than meets the eye. Security researchers have detected several browser hijackers whose purpose is to modify a Web browser's settings that may force it to redirect users to The browser hijacker isn't a threatening piece of software, but its presence on a computer may lead to unexpected Web redirects, as well as unwanted modifications to a Web browser's settings. If your Web browser's homepage and new tab page lead you to, then a browser hijacker is the most probable reason for this unexpected occurrence. While using isn't considered to be...

Posted on May 4, 2016 in Browser Hijackers

Bogus Google Chrome Mobile Browser Update Disguised as Data-Stealing Android Malware

Cybercrooks have a knack for finding and exploiting methods to steal valuable data from computer users and mobile device users. In the latest quest of cybercrooks to pilfer personal information from mobile users, a new type of Android malware is being spread as a data-stealing threat that is disguised as a Google Chrome mobile browser update. The security firm Zscaler was able to spot the Android malware and uncover its ability to perform many malicious activities that ultimately collect personal data from an infected Android device. Among those actions, Zscaler found that the new Android malware can monitor browser history, text messages, call logs and collect banking information sent on an infected device. Worst of all, the Android malware collects all of its data and sends it to a remote command and control server, which is where hackers and cybercrooks could obtain the stolen...

Posted on May 4, 2016 in Computer Security
1 2 3 4 5 6 7 8 9 10 11 1,051