Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,099,600 0%
2 Conduit Search/Toolbar 875,439 0%
3 Adware.LinkSwift 630,029 0%
4 Hijacker 608,359 0%
5 PUP.Optimizer Pro 554,232 0%
6 V9 Redirect Virus 536,791 0%
7 PUP.InstallCore 527,398 0%
8 PUP.SupTab 471,997 0%
9 Babylon Search/Toolbar 423,458 0%
10 WeDownload Manager 416,203 0%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

Kovter Ransomware


The Kovter Ransomware is a malware threat that carries out a common Police Ransomware scam in order to steal money from unsuspecting computer users. The Kovter Ransomware is a relatively new Police Ransomware Trojan, first detected in 2013 in the wild. Like most Police Trojans, the Kovter Ransomware displays a fake message from the police intending to trick the victim into paying a 'penalty' in order to stay away from jail time. Like other Police Rasomware, the Kovter Ransomware has a Winlocker component that allows the Kovter Ransomware to block access to the infected computer. However, the main reason why the Kovter Ransomware has attracted the scrutiny of malware researchers is...

Posted on April 10, 2013 in Ransomware

CIBS Pol Virus (Ransomware)


The CIBS Pol Virus is a police ransomware Trojan that belongs to the Urusay family of malware. This police ransomware Trojan is classified as a Winlocker because it blocks access to the victim's computer by displaying a full-screen message that claims to be an alert from the police. CIBS Pol Virus is a well known scam that is in no way connected to the police force. Instead, the CIBS Pol Virus is used by criminals to scam inexperienced computer users so that they will hand over their money out of fear of prosecution, jail time and severe fines. If your access to your computer is blocked by the CIBS Pol Virus, ESG security researchers strongly advise against following the steps...

Posted on February 21, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus


The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

GameHug Arcade

The GameHug Arcade software is recognized by security researchers as adware that is promoted as a gaming distribution platform in freeware packages. The GameHug Arcade adware application is designed to push numerous advertisements in your web browser, and it can install and add-on, a Browser Helper Object, and a browser extension to perform its operations. Computer users infected with the GameHug Arcade adware experience pop-up ads, banners, in-text hyperlinks and ad boxes by GameHug Arcade. You might want to remember that adware applications functions as monetization engines to their creators by presenting you with an abundance of ads and turn your clicks into pay-per-click revenue. Therefore, the GameHug Arcade adware may not show you secure online resources and malicious third parties may use services of GameHug Arcade as part of a malvertising campaign. In order to avoid cyber...

Posted on March 6, 2015 in Adware

Search Module Plus

Security experts consider the Search Module Plus browser tool by Gobzoo Ltd. as a Potentially Unwanted Program (PUP) with adware capabilities. The Search Module Plus software is distributed among computer users by bundling the app with free software installers because most users prefer to install software via the 'Express' or 'Typical' option. The Search Module Plus program might change your home page, default search provider, and DNS settings as well as install an add-on and a Browser Helper Object. Additionally, the Search Module Plus adware may insert a registry key in Windows to auto-start with your OS at every system boot-up. Security experts add that Search Module Plus may launch a background service that would enable it to display ads, banners, and pop-ups on all web pages the user visits. You might want to keep in mind that the Search Module Plus program functions as a...

Posted on March 6, 2015 in Browser Hijackers


The SpeedTray software may be promoted in freeware packages as a valuable addition to your software tools, but it is perceived by security researchers as adware. The SpeedTray adware might use a Browser Helper Object, an add-on, and a browser extension to push many marketing materials inside your web browser. The ads by SpeedTray may take the form of banners, in-text hyperlinks and contextual and transitional ads. Additionally, the SpeedTray adware may collect data the online resources you engage in order to generate tailor-suited ads. Also, you might want to keep in mind that the SpeedTray adware may not provide you with safe ads, and you may be exposed to potentially harmful software. The SpeedTray adware serves its creators by monetizing your clicks on ads that may clutter your web browser. Computer users that want to free their web browser from ads by SpeedTray may want to...

Posted on March 6, 2015 in Possibly Unwanted Program

The pop-up may appear in the web browser of computer users that are infected with adware. If you are presented with pop-ups by, you might be connected to several phishing web pages, and you may wish to avoid clicks on resources by The pop-up may offer you to install an update to your Adobe Flash Player, but it may prove to be a harmful software in disguise. The adware that propels pop-ups from on your screen may have been automatically installed along with a freeware application downloaded from the web. Security researchers remind web surfers to avoid downloading software from pop-up windows by and to use a reputable anti-malware application to secure their online activities.

Posted on March 6, 2015 in Browser Hijackers

Computer users that experience pop-ups from may be connected to phishing websites. The pop-ups are generated by adware on your PC that may offer you to install potentially harmful software that may allow remote access to your OS. The adware related to may have used a freeware installer as a vessel to enter your system because the majority of users prefer the 'Express' or 'Typical' option during the installation process. As mentioned before, clicks on content by are not advisable, and you may want to use a reliable anti-spyware shield to secure your online browsing and clean your computer.

Posted on March 6, 2015 in Browser Hijackers

If you are experiencing pop-up windows by, you might want to know that you are infected with adware. The domain that is registered to the IP address is recognized to communicate with phishing websites. The adware affiliated with may have entered your system by tagging along with free application installers as a browser extension, an add-on, and a Browser Helper Object. Security experts remind web surfer to avoid downloading software from pop-ups as it may prove to be harmful. The installation of a reliable anti-malware application can clean your OS and protect you from all cyber threats associated with the domain.

Posted on March 6, 2015 in Browser Hijackers

RevJet Ads

The RevJet plugin is classified by security analysts as adware because it pushes numerous marketing materials in the web browser that may slow it down and prevent the user from comfortable online experience. Additionally, the RevJet adware uses web beacons and tracking cookies to determine what type of ads the user may be attracted to. Web surfers concerned with their privacy online may want to know that the RevJet adware collects information about their preferred websites, their clicks on the web and their search queries. You might be interested to know that the RevJet adware might have entered your PC by embedding with a freeware setup file that most users install via the 'Express' or 'Typical' option. A careful read of the 'Privacy Policy' of RevJet reveals that it may collect personally identifiable information and data from social media in order to help its advertisers to provide...

Posted on March 6, 2015 in Possibly Unwanted Program

PlayerStubWrapper Ads

Web surfers infected with adware might experience ads by PlayerStubWrapper and may want to know that PlayerStubWrapper may have arrived on their PC by embedding with freeware. The PlayerStubWrapper adware functions as a private advertisement platform for its developers, and it is programmed to push banners, pop-ups and ad boxes in your web browser. Security experts note that adware such as the PlayerStubWrapper may use a browser extension, a Browser Helper Object, and an add-on to facilitate its operations. The PlayerStubWrapper adware monetizes clicks on ads, and it may collect information about your preferred web pages in order to determine what type of ads may interest you the most. The ads by PlayerStubWrapper may cover your browser surface, and you may want to install a trustworthy anti-spyware tool to clean your system.

Posted on March 6, 2015 in Possibly Unwanted Program is a domain that is connected to several malicious online locations and adware developers use it do display pop-up windows on PCs infected with adware. Also, security researchers note that the IP address of corresponds with many phishing websites that are used to steal log-in details. The adware affiliated with may show you a pop-up notification in your web browser that suggest you to install an Adobe Flash Player or Java software update, and you might want to avoid downloading the aforementioned update. Adware may have arrived at your system by incorporating with freeware installers that most computer users don't bother to install via the 'Custom' or 'Advanced' option. The adware and cyber threats associated with can be evaded by installing a...

Posted on March 6, 2015 in Browser Hijackers

The domain is used by adware developers to present users with a pop-up that suggest them to install a potentially harmful update to their Adobe Flash Player. The adware related to may feature links to phishing websites and clicks on the pop-up are not advisable. Moreover, the IP address of is recognized in communications between several malicious online resources and caution is advised. Adware may have entered your PC, but bundling with freeware installers that many computer users prefer to operate via the 'Express' or 'Typical' option. If you are presented with pop-up windows by, you might wish to install a credible anti-spyware shield that can protect you from cyber threats connected to the

Posted on March 6, 2015 in Browser Hijackers


The MixVideoPlayer program may aim to look like a PC version of the renowned MX Player for the Android OS. However, you might want to know that security experts consider it a Potentially Unwanted Program (PUP) with adware capabilities. The MixVideoPlayer software is programmed to display many advertisements in its interface and can use a browser extension, an add-on, and a Browser Helper Object to push ads in your web browser. The MixVideoPlayer app may provide you with very limited video playback options, and it may clutter your web browser with pop-ups and banners. You can install the MixVideoPlayer app on your system automatically when you handle a freeware bundle via the 'Express' or 'Typical' option. Given the nature of operations performed by MixVideoPlayer you might wish to remove all files associated with MixVideoPlayer by using a reliable anti-spyware tool.

Posted on March 6, 2015 in Possibly Unwanted Program


The CryptoFortress encrypting malware is a new ransomware that is the first to introduce the ability to encrypt files on network shares. Another interesting feature of the CryptoFortress ransomware is that it can delete shadow volume copies so that you can't restore your files unless you pay the ransom. Also, the CryptoFortress ransomware uses the RSA encryption to execute its malicious operation and adds the '.frtrss' extension at the end of every file it encrypted. Security researchers note that the CryptoFortress ransomware uses a ransom note very similar to the one of another ransomware called TorrentLocker. Additionally, the CryptoFortress ransomware leaves a ransom demand in the form of a file named 'READ IF YOU WANT YOUR FILES BACK.html.' Web surfers may become infected with the CryptoFortress ransomware by downloading and opening files from spam emails that may refer to...

Posted on March 6, 2015 in Ransomware


Malware analysts use the name Emotet to specify a trojan that can travel in spam emails as a .zip or .exe file that is programmed to inject a malicious DLL directly into the 'explorer.exe' process. Additionally, the Emotet trojan makes a copy of itself that places in the 'APPDATA' folder of Windows to avoid easy detection. Security researchers note that the Emotet trojan can download additional DLL files that may expand its functionality in order to steal usernames and passwords from intercepted web traffic.The information gather by the Emotet trojan is sent to a remote server controlled by its handlers that can instruct it to download and install other malware, as well as uninstall Emotet remotely. Computer users infected with the Emotet trojan are advised to use a renown anti-malware application to clean their PC. In order to avoid infection with the Emotet trojan, it is best not to...

Posted on March 5, 2015 in Trojan


Bartallex is classified by malware researchers as a trojan downloader that functions as a macro in corrupted Microsoft Word Documents. The documents loaded with the Bartallex trojan downloader might pretend to be payment notifications from renown online stores such as Amazon and Ebay. As aforementioned, Bartallex is deployed in spam emails and if you have enabled macro in your office suite it is automatically executed. The Bartallex malware can be detected by security applications as TrojanDownloader:W97M/Bartallex and it should not be underestimated. A successful infiltration of the Bartallex trojan downloader can expose you to viruses, keyloggers, worms and other trojans. Cyber criminals may use the TrojanDownloader:W97M/Bartallex as part of complex attacks that may result in the loss of banking credentials, files being stolen, corruption of documents and remote access to infected...

Posted on March 5, 2015 in Trojan Downloader

The web page can be accessed only from computers infected with adware that is programmed to show pop-ups that might promote potentially harmful software. The pop-up window is presented to web surfers by adware that may have been automatically installed on your machine during the installation of a free application via the 'Express' or 'Typical' option. You might want to keep in mind that the programs promoted on the pop-up may perform many unwarranted changes to your system. Also, security experts note that the adware related to can be used by attackers to invite users to install a remote access application and gain control of PCs. Programs that are downloaded from pop-ups more often than not prove to be security threats that can be used to achieve many malicious goals. The adware related to the...

Posted on March 5, 2015 in Browser Hijackers
1  2  3  4  5  6  7  8  9  10  11  12  Next     Total items: 13315