Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 2,043,928 -2%
2 Conduit Search/Toolbar 1,400,535 -1%
3 PUP.SupTab 901,744 -1%
4 Adware.SuperWeb 871,113 -2%
5 PUP.InstallCore 863,859 -1%
6 PUP.Optimizer Pro 816,597 -1%
7 Adware.Multiplug 712,317 -2%
8 Qvo6.com Hijacker 638,316 -0%
9 Adware.LinkSwift 635,299 0%
10 Iminent Toolbar 633,528 -1%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

LaSuperba

LaSuperba may be associated with numerous problems that may be caused by PUPs (Potentially Unwanted Programs). LaSuperba may interrupt the computer users' activities when browsing the Web and cause performance problems on affected Web browsers. LaSuperba is linked to an adware that may affect most commonly used Web browsers on the Windows operating system, including Internet Explorer, Mozilla Firefox and Google Chrome. LaSuperba advertisements may take the form of irritating pop-up messages that make it very difficult to use the affected Web browser. In most cases, removing adware associated with LaSuperba will stop LaSuperba advertisements from appearing on affected Web browsers. However, most adware infections do not come alone; the presence of one adware component may indicate the presence of others, all of which may be connected with LaSuperba and similar unwanted content....

Posted on August 31, 2015 in Adware

VirLock Ransomware

Screenshot

The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware

Screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

Search.getmaps.co

The Search.getmaps.co site is operated by Informer Technologies, Inc. and is associated with a browser hijacker that you might see listed in your Extensions Manager as Get Maps. Security analysts suggest that the Get Maps extension is a modified version of My Maps XP that is programmed to work with Search.getmaps.co. Computer users may find the Search.getmaps.co browser hijacker in the company of badware such as DriverUpdate and FastAgain PC Booster . At Search.getmaps.co Web surfers may find useful links to free GPS services such as Google Maps, Bing Maps, MapQuest and Here Maps, but your search terms may be recorded and shared with advertisers without your knowledge. The Get Maps extension might read your browsing and download history to help advertisers find out more about your interests and provide targeted commercials on Search.getmaps.co. The Search.getmaps.co browser...

Posted on February 8, 2016 in Browser Hijackers

Privacy Dr

The Privacy Dr software is a product of EuroTrade A.L. Ltd that is designed to address the needs of users regarding the protection of their privacy. The Privacy Dr software is advertised at Privacydr.com as capable of helping users keep their browsers and IM clients clean from tracking cookies, chat and call logs. PC users are provided with the full version of the Privacy Dr for $39 and can claim a refund if they do not like the application. Security investigators note that the Privacy Dr software comes from the same company behind Registry Dr. , and Privacy Dr may come bundled with it. Computer users that like to try out the Privacy Dr software may be required to pay $59 for the package with Privacy Dr and Registry Dr. You should note that the Privacy Dr software does not provide features you would not find in your browser and IM client. The Privacy Dr program is advertised as...

Posted on February 8, 2016 in Possibly Unwanted Program

Ads by Customer Promos

The Customer Promos program is advertised at Customerpromos.com as been a set of tools to enhance your online experience. That does not say much—does it? Security experts reveal that the Customer Promos program is an adware that may arrive on your PC bundled with free programs such as AnonymizerGadget and BackUpDutyLite . The Customer Promos adware may use JavaScript and appear as a browser plug-in to inject advertisements on the sites you load in Google Chrome, Opera, Mozilla Firefox and Internet Explorer. The ads by Customer Promos may look like banners, floating ad-boxes, and in-line hyperlinks. Additionally, the Customer Promos adware may use ActionScript to load pop-up and pop-under windows when you visit online stores such as eBay, Walmart and Amazon. Security experts note that the Customer Promos adware may read information about your software and hardware configuration...

Posted on February 8, 2016 in Adware

Pdfiler.com

The Pdfiler.com domain is associated with a browser hijacking software that is programmed to show pop-up windows and welcome users to download and install a 'Video Player' that is supposed to be safe. The 'Video Player' that is available on Pdfiler.com may be offered to users as a custom update for the Adobe Flash Player and provide improved HD experiences. Computer users should note that the Pdfiler.com platform is not related to Adobe Systems Inc., and they should not download programs from Pdfiler.com. The 5.135.246.49 IP address of Pdfiler.com is linked to cyber threats like Kuluoz and Dowfeld , and you must not install applications that are promoted via the Pdfiler.com pop-up windows on your screen. Moreover, users may be welcomed to register at video-sharing portals such as FlixBoxHD.com, HDZion.com, CinaPlay.com and HDPorium.com to gain access to movies and music. The...

Posted on February 8, 2016 in Browser Hijackers

Lucid Movies Ads

The Lucid Movies software is promoted on Lucidmovies.com and freeware bundles as a free application that Web surfers can use to access films, music videos, movie trailers and documentaries. You might be interested in installing the Lucid Movies application, but you should know that it is adware. The Lucid Movies adware is developed by the infamous Informer Technologies Inc. that is responsible for the WatchAnyGame and My Shopping XP adware as well. The Lucid Movies adware may place links to IMDB, YouTube, and Rotten Tomatoes on your desktop to provide limited functionality. The main objective of the Lucid Movies adware is to push marketing in your Web browser. The Lucid Movies adware is recognized as an improved version of the ByteMovie adware and may collect information such as your search terms, software configuration and bookmarks collection to show personalized...

Posted on February 8, 2016 in Adware

Movie Megs Ads

Movie Megs is an adware application that, despite its claims, will not let you watch free movies on your computer. According to the software's official Web page, Movie Megs is a free utility that allows its users to watch the newest movies and TV series without having to pay a single cent. However, what the website may not mention is that Movie Megs is classified as adware by the most popular anti-virus software products, and installing this application may change the way your Web browser behaves significantly. The first sign that you'll see if you have Movie Megs on your computer is the appearance of unwanted 'Movie Megs ads' in all running instances of your Web browser. The Movie Megs software extension may include a Web browser extension whose purpose is to inject paid advertisements in the user's Web browser, as well as to collect usage statistics that may be used to boost the...

Posted on February 8, 2016 in Adware

‘.uzltzyc File Extension’ Ransomware

The '.uzltzyc File Extension' Ransomware is a vile computer threat that may be distributed with the help of bogus e-mail messages that may contain a threatening attachment. Some security experts suspect that the '.uzltzyc File Extension' Ransomware may be a new version of CTB Locker , , but these claims are yet to be backed up with reliable evidence. Even if the '.uzltzyc File Extension' Ransomware isn't associated with CTB-Locker, this doesn't make this threat any less threatening. When the '.uzltzyc File Extension' Ransomware infects a computer it may locate and identify the user's potentially valuable files silently, therefore preventing anyone from accessing them. Apart from locking the user's files, the '.uzltzyc File Extension' Ransomware also may delete Shadow Volume Copies to prevent tech-savvy users from attempting to recover their data. When the '.uzltzyc File...

Posted on February 8, 2016 in Rogue Anti-Spyware Program

‘.trun File Extension’ Ransomware

The '.trun File Extension' Ransomware is a newly discovered cyber threat that can encrypt files stored on the user's hard drive with the help of a strong RSA-1024 encryption algorithm. By encrypting the user's valuable data, the '.trun File Extension' Ransomware can prevent the victims from accessing their files. The easiest way to distinguish the files the '.trun File Extension' Ransomware encrypts, is by checking their names – if they include the '.trun' file extension, then you are dealing wth the '.trun File Extension' Ransomware, and you may be in for a lot of problems if you don't have a reserved copy of your most valuable files. The '.trun File Extension' Ransomware operates like other crypto threats, and it always asks the users to pay a ransom fee if they want to restore their data. The amount of the ransom fee is unknown, but the '.trun File Extension' Ransomware does...

Posted on February 8, 2016 in Ransomware

FixPCOptimizer

According to the Web page at Fixpcoptimizer.com, the FixPCOptimizer program is supposed to boost your PC by removing bad registry entries and clean your hard drive from unneeded files. The FixPCOptimizer program is promoted as a system optimizer that can improve your startup time, delete junk files and wipe data, but you may want to reconsider installing it. Security researchers reveal that the FixPCOptimizer program may use fake system error reports to encourage users to purchase it. PC users can use the trial version of FixPCOptimizer to scan their OS for problems and have the chgoice to pay $19,99 for the complete service that FixPCOptimizer provides. The FixPCOptimizer software is classified as a Potentially Unwanted Program (PUP) due to its behavior and the risk of damaging the Windows Registry of users. Moreover, the FixPCOptimizer has a clone named WixPCOptimizer that is...

Posted on February 6, 2016 in Possibly Unwanted Program

My Classifieds XP Ads

The My Classifieds XP Toolbar may be offered to users via freeware bundles and attract them by providing a customized search for coupons and discounts that they can use in local stores. Web surfers can visit Myclassifiedsxp.com and read more about its features, but they will be surprised unpleasantly. The My Classifieds XP Toolbar is and adware that is created by Informer Technologies, Inc. that security-aware users may know for the My Speedtest XP and Bargains Space adware. Moreover, the My Classifieds XP adware-powered toolbar may change your homepage and preferred search provider to Search.myclassifiedsxp.com that is using a custom Yahoo engine. Search.myclassifiedsxp.com is not as powerful as Google, and most search results would be commercials from sponsors of the My Classifieds XP adware. PC users that had the misfortune to install the My Classifieds XP adware may be...

Posted on February 5, 2016 in Adware

Muzik Fury Ads

The Muzik Fury browser extension may appear as an excellent addition to your Web browser because, according to to its description, Muzik Fury would allow you to create custom playlists with music videos from YouTube. The Muzik Fury extension can be found at Muzikfury.thewhizmarketing.com, and you may notice it listed beneath the 'Advanced' or 'Custom' option of many freeware installers. Security researchers alert that the Muzik Fury extension is an adware that should not be allowed to attach code to your Web browser. The Muzik Fury adware is similar to the GoGoGo Radio and Mobius Radio adware and may use ActionScript to load video commercials and prevent you from enjoying the video and audio content online. The Muzik Fury adware is developed by APN, LLC. that is associated with Media Search App and SoundJunkies . The Muzik Fury adware may appear on the 'Control Panel' of...

Posted on February 5, 2016 in Adware

Your Updater

The Your Updater software might show notifications in the bottom right corner of your desktop to welcome you to install updates and patches for programs that you have installed on your system. You might have installed the Your Updater software when you handled a freeware package with the 'Typical' or 'Express' option. Computer experts reveal that the Your Updater software is developed by Installer Technology Co. that is known for the Open Downloader Manager application. Additionally, the Your Updater software appears to be the next generation of the Open Software Updater that Installer Technology Co. released earlier. Computer users that experience pop-up windows and notifications by Your Updater in their tray area should be vigilant what they install on their PC. The Your Updater software is perceived as a Potentially Unwanted Program (PUP) because it is known to welcome users...

Posted on February 5, 2016 in Possibly Unwanted Program

EasyPhotoEdit Toolbar

The EasyPhotoEdit Toolbar may attract users that like to make photo collages and share their projects with friends. The EasyPhotoEdit Toolbar may provide users with links to Designrfix.com, Instantshift.com, and Photoshoptutorials.ws on their desktop and bookmarks bar. The EasyPhotoEdit Toolbar has an official page at Easyphotoedit.com that you may want to visit to know more about the application. PC users may install the EasyPhotoEdit Toolbar with freeware bundles that may include the RetroGamer Toolbar and Reimage Express . You might want to reconsider installing the EasyPhotoEdit Toolbar because it is an adware that is a creation of Mindspark Interactive Network, Inc. that is behind WebmailWorld and UnzipApp . The EasyPhotoEdit Toolbar adware might change your default search engine and homepage to Home.MyWebSearch.com that is associated with a browser hijacker. You...

Posted on February 5, 2016 in Bad Toolbars

Clash of Cash Ads

The Clash of Cash browser add-on is offered to users that want to shop smart and save a few dollars instead of wasting their budget on things they do not need. The Clash of Cash browser add-on is promoted at Clashofcash.net as a complete online shopping solution that users can use with Google Chrome, Internet Explorer and Mozilla Firefox. You should reconsider installing the Clash of Cash add-on because it is an adware that is designed to block the native ads on the sites you visit and load advertisements from partners only. The Clash of Cash adware might be used to provide users with misleading information and corrupted ads. PC users that are infected with the Clash of Cash adware may be welcomed to buy illicit goods and faulty machinery without the option for a refund. Moreover, the Clash of Cash adware may be registered as a system service and use your computer resources for...

Posted on February 5, 2016 in Adware

TeslaCrypt Ransomware Aggressively Spreads Through Compromised WordPress Sites

Ransomware has been one of the most aggressive types of malware threats we have encountered over the past year. With each new ransomware threat, the reach of cybercrooks effectively collecting ransom fees increases exponentially. As it turns out, cybercrooks spreading new encryption type ransomware threats are initiating campaigns of compromised WordPress sites to spread a variant of the TelsaCrypt Ransomware infection. Researchers at Heimdal Security have discovered instances where a campaign that was known to push the Neutrino Exploit Kit, effectively spreading the Backdoor.Andromeda malware, is being levered to compromised WordPress sites for the purpose of spreading TeslaCrypt Ransomware . We have had first-hand experience with TeslaCrypt Ransomware, and it has been ousted as a threat with a low detection rate essentially allowing it to spread must faster than other similar...

Posted on February 5, 2016 in Computer Security
1 2 3 4 5 6 7 8 9 10 11 1,023