Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,489,534 2%
2 Conduit Search/Toolbar 1,139,771 1%
3 PUP.InstallCore 720,243 2%
4 PUP.Optimizer Pro 712,668 1%
5 Hijacker 700,619 -0%
6 PUP.SupTab 666,621 2%
7 Adware.LinkSwift 647,477 -0%
8 V9 Redirect Virus 574,462 0%
9 Babylon Search/Toolbar 511,979 1%
10 WeDownload Manager 445,229 0%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Warning: Over 20,000 Gmail, AOL, and Yahoo Email Accounts Hacked!
A major email security scam has taken place today where hackers compromised over 20,000 Gmail, AOL and Yahoo email accounts and posted the login details of them online. It is apparent that there is a phishing scheme happening where hackers are able to obtain thousands of login credentials from...

More Articles

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

Kovter Ransomware


The Kovter Ransomware is a malware threat that carries out a common Police Ransomware scam in order to steal money from unsuspecting computer users. The Kovter Ransomware is a relatively new Police Ransomware Trojan, first detected in 2013 in the wild. Like most Police Trojans, the Kovter Ransomware displays a fake message from the police intending to trick the victim into paying a 'penalty' in order to stay away from jail time. Like other Police Rasomware, the Kovter Ransomware has a Winlocker component that allows the Kovter Ransomware to block access to the infected computer. However, the main reason why the Kovter Ransomware has attracted the scrutiny of malware researchers is...

Posted on April 10, 2013 in Ransomware

CIBS Pol Virus (Ransomware)


The CIBS Pol Virus is a police ransomware Trojan that belongs to the Urusay family of malware. This police ransomware Trojan is classified as a Winlocker because it blocks access to the victim's computer by displaying a full-screen message that claims to be an alert from the police. CIBS Pol Virus is a well known scam that is in no way connected to the police force. Instead, the CIBS Pol Virus is used by criminals to scam inexperienced computer users so that they will hand over their money out of fear of prosecution, jail time and severe fines. If your access to your computer is blocked by the CIBS Pol Virus, ESG security researchers strongly advise against following the steps...

Posted on February 21, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus


The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Malware, Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

Massive Malvertisement Campaign in Major Ad Vendor Use to Modify Router DNS Settings

Advertising is a necessary evil that webmasters and site owners must consider in order to survive considering it is how most websites earn money. Just about any and every reputable website has some form of advertising, which as of lately, utilize large ad vendors to distribute proper ads to any given site. In recent exploits of advertising networks and vendors, cybercrooks have managed to leverage ads from third-party services to display ads that are malicious eventually serving up a nasty cocktail of malware for users who click on them. Malvertising, a relatively new term that has become synonymous with describing malicious advertisements on the internet , is the in-thing for cybercrooks in their abilities to attack ad vendors and networks with malicious third-party ads . These advertising campaigns have varied from one extreme to the other, and the most recent malvertising...

Posted on October 22, 2014 in Computer Security


Exploit:JS/Dotcaf.A is a threat that may install itself on your computer using known vulnerabilities, freeware programs, e-mail attachments, torrents and may enter the computer bundled with other threats such as HEUR.Trojan.Win32.Generic Virus. Exploit:JS/Dotcaf.A is used by hackers to install Possibly Unwanted Programs or threats on your machine. Exploit:JS/Dotcaf.A opens a backdoor that will be a gateway for third parties to take control of the infected computer. Exploit:JS/Dotcaf.A changes your Web browser settings, adds corrupted codes to your Registry and disables security-related software. Exploit:JS/Dotcaf.A may collect selected data that will be used against the computer user. Exploit:JS/Dotcaf.A is a high-level threat and, as such, should be deleted from the infected computer immediately after been detected to avoid further harm. Computer users should run a deep scan of their...

Posted on October 22, 2014 in Trojans

Pall Mall Ads

Pall Mall Ads is a Possibly Unwanted Program. If installed on your machine, may display countless, unwanted and intrusive advertisements on every Web page that you try to visit. Pall Mall may attach itself on the most favored Web browsers; therefore, it doesn't matter which one you are using. There will be computer users that may consider Pall Mall a useful program and install it, but they need to be aware that Pall Mall performs parallel actions that may not be welcomed. Pall Mall may modify your homepage and browser settings; collects your browsing habits and share the information with third parties; uses your system resources; slows down the system's operation; and may be installed on your computer without your interference. Therefore, it is safer to remove Pall Mall from your computer. To perform its removal, you should use a malware remover.

Posted on October 22, 2014 in Adware


InfoHD is a Possibly Unwanted Program. PUPs may install unwanted toolbars and contain adware that may create some problems on the affected machine. InfoHD usually is installed on your computer bundled with freeware downloaded from third parties or you may have installed it by choice. InfoHD has some features that will make it possible for InfoHD to modify your search settings and homepage. Then, InfoHD will display numerous advertisements and sale offers that, if clicked, will increase traffic on its sponsored websites. These advertisements may attract the computer user's attention since some of them are based on 'leads' provided by InfoHD's adware. But, it may also lead the PC user to compromised websites. It is your choice to keep or not InfoHD running on your computer. Deciding to uninstall InfoHD, you should use an anti-malware device to help you to carry out its elimination...

Posted on October 22, 2014 in Adware


FirSeriaInstaller, or PUP.FirSeriaInstaller, is a Possibly Unwanted Program that if installed on your computer may disrupt your browsing activities. FirSeriaInstaller is often installed on your computer automatically as a part of the installment of free software. FirSeriaInstaller may alter your browser settings and desktop and record your browser searches. FirSeriaInstaller will show numerous pop-ups, fake security alerts and other kinds of advertisements that may slow down the machines' performance. If clicked, these advertisements may redirect your browser to unsafe websites. FirSeriaInstaller is compatible with the most favored Web browsers such as Mozilla Firefox, Google Chrome and Internet Explorer. If FirSeriaInstaller is not letting you have a normal browsing experience, you should uninstall FirSeriaInstaller with a malware removal program.

Posted on October 22, 2014 in Potentially Unwanted Programs


Cooltech, or PUP.Cooltech, is the name of a Possibly Unwanted Program that may be installed on your PC by default. This may happen when an adware is bundled with a free software that the computer user downloads from third parties without paying attention to its installation process. Cooltech also may be installed by the computer user when online shopping. Cooltech displays numerous advertisements that may help computer users with their online shopping, but Cooltech also displays advertisements unrelated to their searches. The reality is that Cooltech will display its advertisements no matter if the computer user wants it or not. Besides, a program that imposes itself to the computer user may be looked at as suspicious. If you consider Cooltech as a necessary tool and is willing to take the risks Cooltech may pose, you may keep it. Otherwise, you should remove Cooltech with a proper...

Posted on October 22, 2014 in Potentially Unwanted Programs


HC-nema is another senseless named adware program advertised as a tool that can improve your Web browsing. HC-nema displays pop-up advertisements such as banners, interstitial ads, in-text links and videos. These advertisements that may be useful to an online shopper have a negative side that is to cover up the Web page that the computer user is trying to visualize. HC-nema also may use system resources to display its sponsored advertisements; therefore, it may slow down the machine's operation and record the computer user's browsing preferences. HC-nema may be installed on a computer by its user, but it may be installed automatically or packed with a free program transferred from the Internet. Although HC-nema is not a threat by itself, the problems it may cause to the affected machine turns HC-nema into a Possibly Unwanted Program. If HC-nema is installed on your machine and you...

Posted on October 22, 2014 in Adware


Some websites promote bundled custom installers, and when computer users download free software from these sites, they may end up with Possibly Unwanted Programs and adware installed on their machines by default. Shopp_upe_1.8 is a clear example of this situation. Shopp_upe_1.8 is an advertisement promoter that may display countless advertisements on an affected machine. These advertisements will appear at any Web page visited by the computer user, which will disrupt the computer user's activities. Shopp_upe_1.8 also collects information about the computer user's browsing preferences and uses a good amount of system resources. If Shopp_upe_1.8 is installed on your machine and you want to erase it, you may need to be helped by a malware remover to accomplish the task.

Posted on October 22, 2014 in Adware


If when navigating the Web you start noticing the appearance of numerous advertisements displayed by HD-vi9.4v07.10, this means that your machine is housing an adware program. HD-vi9.4v07.10 advertisements may appear on any Web page you are logged in, and HD-vi9.4v07.10 may attach itself to Google Chrome, Internet Explorer and Mozilla Firefox. If you are wondering how HD-vi9.4v07.10 entered your computer without your interference, HD-vi9.4v07.10 may have been introduced into your machine when you downloaded a free program that had HD-vi9.4v07.10 bundled with its installation process. You will also notice that HD-vi9.4v07.10 advertisements will be on your way, and you may want to get rid of it. In this case, you should use an anti-malware device that will remove HD-vi9.4v07.10 and its unwanted components.

Posted on October 22, 2014 in Adware


Although WindowSecureScanner's name suggests a security software, WindowSecureScanner is a Potentially Unwanted Program that is intended to serve its sponsors as an advertisement platform. Computer users are always looking for tools that will help them to keep their machines clean and safe. It is why they may download WindowSecureScanner, believing that WindowSecureScanner will detect and remove any program that may harm their machines. But WindowSecureScanner has other ways to enter a computer. WindowSecureScanner may be bundled with a free software that when downloaded by the PC user, will install WindowSecureScanner automatically. The numerous and unwanted advertisements displayed by WindowSecureScanner will use system resources, and your machine may become slow and irresponsive. WindowSecureScanner also may collect information by recording the computer user's online activities. If...

Posted on October 22, 2014 in Adware

Instead of providing accurate search results, is a search engine that floods the computer user's desktop with pop-up advertisements that will overlap any Web page the computer users try to visualize. is compatible with Internet Explorer, Google Chrome and Mozilla Firefox. Some of the pop-up advertisements displayed by are fake update prompts that are meant to induce the computer user to click on them. If clicked, it may activate the installation of adware and PUPs that will increase the amount of advertisements to be displayed on the affected machine. There's only one way to stop's activities; it is by blocking and removing PC threats from the affected computer. It may be required to get the assistance of an anti-malware product to accomplish its removal.

Posted on October 22, 2014 in Browser Hijackers


PUP.Downloader.ZYL is classified as a Potentially Unwanted Program due to the numerous advertisements PUP.Downloader.ZYL may display on the affected computer. Computer users may install PUP.Downloader.ZYL on their machines automatically when downloading free software, especially PDF creators, download managers, movies, games, and videos. PUP.Downloader.ZYL may change custom or default settings of your Web browsers, such as search settings and homepage and monitor the computer user's online activities. The recorded data will be channeled to third parties and may be used for marketing purposes. It is advised to remove PUP.Downloader.ZYL from an affected computer right away. Therefore, computer users should run a malware scanner on their machines to detect PUP.Downloader.ZYL's presence and remove PUP.Downloader.ZYL as well as undo all the changes made by PUP.Downloader.ZYL.

Posted on October 22, 2014 in Potentially Unwanted Programs is linked to a browser hijacker that may affect popular Web browsers such as Google Chrome, Internet Explorer and Mozilla Firefox. Browser hijackers may alter your browser settings and replace your Web page. Browser hijackers linked to may try to exploit vulnerabilities on your privacy settings in order to collect information. may provide search results that will be full of sponsored and unwanted advertisements that, if clicked, may lead to compromised websites. Browser hijackers and adware may slow down your computer's performance and collect information. Browser hijackers is the kind of threat that shouldn't be left unattended on the affected computer. Due to the changes browser hijackers and other threats make to your computer, it is advised to get the help of an anti-malware scanner to identify and undo these changes and...

Posted on October 21, 2014 in Browser Hijackers


Cinpl2.3c, or Ads by Cinpl2.3c is a Possibly Unwanted program that may be installed on a computer through spam e-mails, corrupted websites, infected file sharing network, malicious secondary storage devices, bundled within freeware or shareware programs and other shady ways. Once inside the computer, Cinpl2.3c starts displaying numerous advertisements on any websites the computer user tries to visit. These advertisements are unwelcome and inconvenient, since it may overflow the visited Web page and prevent the computer user from having a satisfying navigation. In addition, Cinpl2.3c may use system resources when displaying its advertisements, which will turn the affected machine into a slow and irresponsive device. Cinpl2.3c should be deleted with an anti-malware program.

Posted on October 21, 2014 in Adware


Itoolbox is classified as a browser hijacker due to the changes iToolbox does on your search provider and homepage. Once installed on your machine, Itoolbox may replace your homepage with The search results provided by may not be reliable, because it may contain sponsored Web pages that, when accessed, may lead to the installation of other adware and PUPs, in addition to numerous advertisements. also uses a tricky resource to attract Internet users and make them click on its advertisements; displays customized advertisements based on information collects from the affected computer. If you're having issues with Itoolbox, you should remove Itoolbox with an anti-malware program.

Posted on October 21, 2014 in Potentially Unwanted Programs
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 12481