Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,099,600 0%
2 Conduit Search/Toolbar 875,439 0%
3 Adware.LinkSwift 630,029 0%
4 Qvo6.com Hijacker 608,359 0%
5 PUP.Optimizer Pro 554,232 0%
6 V9 Redirect Virus 536,791 0%
7 PUP.InstallCore 527,398 0%
8 PUP.SupTab 471,997 0%
9 Babylon Search/Toolbar 423,458 0%
10 WeDownload Manager 416,203 0%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware

Screenshot

The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware

Screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

Fruit Basket

The Fruit Basket is advertised as a budget-friendly browser tool for online shoppers that has optimized versions for Mozilla Firefox, Google Chrome and Internet Explorer. The Fruit Basket application is perceived by security researchers as a Potentially Unwanted Program (PUP) because it may collect information to help advertisers push commercials in your Web browser. You may want to know that the Fruit Basket software may record your IP address, browser type, OS version and detect your approximate geographical location. The Fruit Basket browser tool may load numerous marketing materials, such as inline text advertisements and transitional commercials. The Fruit Basket application may be installed on all latest versions of Windows via freeware packages and low-quality software distribution platforms. You should note that the Fruit Basket program may read your browsing history and the...

Posted on March 26, 2015 in Possibly Unwanted Program

Browse Pulse

The Browse Pulse browser instrument may appear as a friendly search assistant that can help you dig through your search results for what you need. However, security experts note that the Browse Pulse app is adware designed to show advertisements in your Web client in the form of banners, in-text hyperlinks to sponsored content and contextual and transitional commercials. The Browse Pulse adware is being deployed in freeware installers as an additional tool that can be automatically installed by computer users via the 'Express' or 'Typical' option. You should note that the primary goal of adware is to monetize your clicks and generate pay-per-click revenue for its developers, which may putt your safety at risk. Adware developers may work with evil-minded third parties to promote riskware and Potentially Unwanted Programs (PUPs). Therefore, you may want to consider the ads by Browse...

Posted on March 26, 2015 in Possibly Unwanted Program

NanoCore RAT

The NanoCore RAT designation is used by security applications to specify a remote access Trojan with modular structure. You should note that the NanoCore Trojan may allow attackers to collect your data and online identity by installing a Remote Access Client on your PC. Hackers deploy the NanoCore RAT in spam emails as an attached RTF file that exploits the CVE-2012-0158 vulnerability. Security experts add that the operators of the NanoCore RAT can instruct it to download and run threatening plugins which can expand its functionality. The NanoCore Trojan is primarily used to target companies and private businesses, but its modular structure allows cybercriminals to adapt NanoCore RAT to suit their particular goals. The NanoCore RAT cyber parasite should not be underestimated, and you may wish to avoid spam emails that look like invoices or messages informing you that you won a prize....

Posted on March 26, 2015 in Trojans

‘PacMan’ Ransomware

The 'PacMan' Ransomware is a cryptographic malware that is deployed by cybercriminals via spear-phishing emails. Unlike other notorious ransomware such as TorrentLocker and CryptoLocker , the 'PacMan' Ransomware is programmed to give its victims 24 hours to deliver payment in order to recover their files. It is not advisable to open files and click on links from spam emails because most likely malware may try to appear as a text, video, image and archive in order to be downloaded and opened by users. The 'PacMan' Ransomware can use a strong RSA encryption to lock your files, and you may see 'ENCRYPTED' at the end of your filenames. After it finishes encrypting your data, the 'PacMan' Ransomware displays a note with its text on a white background with a timer, to inform you that you have 24 hours to pay for a decryption key. Security experts point out that the best way to counter...

Posted on March 26, 2015 in Ransomware

Protective Antivirus 2015

The Protective Antivirus 2015 software is advertised as a reliable anti-virus on low-quality software websites, may be promoted by adware and travels incorporated with free application installers. Users may be attracted to install Protective Antivirus 2015 because of its supposedly functional modules for network and home protection. However, Security analysts concluded that the Protective Antivirus 2015 does not provide adequate protection and uses numerous security notifications to convince users to pay for premium features that do not add other layers of protection. The Protective Antivirus 2015 is classified as rogueware that exhibits false detection during a scanning process in order to scare users and invite them to pay for advanced protection. The Protective Antivirus 2015 rogue software may insert a registry key in Windows to auto-start with your OS and may display security...

Posted on March 26, 2015 in Rogue Anti-Virus Program

SkypEmoticons

The SkypEmoticons application can arrive on your PC as a drive-by installation of freeware package, and SkypEmoticons may be promoted to you via a message in Skype from a friend who installed it. The SkypEmoticons application claims to expand the range of emoticons you can use in Skype, but you should note that SkypEmoticons may inject advertisements in your Web browser and Skype client. Security researchers classify SkypEmoticons as adware that may appear as a toolbar attached to the right side of your Skype program. Additionally, the SkypEmoticons adware may use your account to text your friends and advertise itself to them. Most Web surfers are used to seeing advertisements in their Web browsers, but advertisements in your Skype client might be too much for you to tolerate. By installing the SkypEmoticons adware on your PC, you may be presented with links to unsafe online resources...

Posted on March 26, 2015 in Possibly Unwanted Program

LstDownload.net

The LstDownload.net domain is associated with adware powered application that presents users with pop-ups that may promote archive managers, disk utilities, video players, and Bittorrent clients that could be corrupted by hackers. Security experts report that the IP address of LstDownload.net is used in communications of corrupted applications infected with the Sality cyber parasite. You are not advised to download the content provided on the LstDownload.net pop-ups as you might be exposed to harmful software. Often hackers use color themes very similar to popular applications in order to invite web surfers to download nad run the promoted applications. You should remember that the pop-ups by LstDownload.net are generated by adware on your PC and to avoid clicks on potentially harmful websites. The adware associated with LstDownload.net may have entered your computer as a supposedly...

Posted on March 25, 2015 in Browser Hijackers

Ebon Browser

After the installation of freeware via the 'Express' or 'Typical' option computer users may be surprised to find the Ebon Browser on their system. Yoy might want to know that the it is perceived by security researchers as a Potentially Unwanted Program (PUP) because it functions as a marketing platform for advertisers. The Ebon Browser by Ebonmedia Corp. is a custom-build of the legitimate Mozilla Firefox software that is dedicated to displaying various types of ads while you browse the Internet. The Ebon Browser may attract you with a personalized start page resembling the Windows 8 menu, but you should know that your online activities may be obstructed by many banners, ad boxes, and contextual commercials. A careful read of the 'Terms of Use' that accompany the Ebon Browser reveals that it collects several types of data about you. The Ebon Browser can record your entered search...

Posted on March 25, 2015 in Possibly Unwanted Program

KeyPlayer media player

The KeyPlayer media player by KeyDownload is a custom-build of the open-source VLC Media Player and can be promoted to you on low-quality software centers and freeware bundles. The KeyPlayer media player program may attract you with promises to render HD videos smoothly. However, the key feature of the KeyPlayer media player application is to display numerous commercials in your web browser via an add-on, a Browser Helper Object, and a browser extension. Security experts classify the KeyPlayer media player as a Potentially Unwanted Program (PUP) with adware capabilities. Moreover, users report poor performance from the KeyPlayer media player and they had to tolerate many unwanted ads loaded in banners, ad panels and pop-up windows on web pages they visited. Programs such as the KeyPlayer media player may employ tracking technologies to help advertisers push you targeted content. The...

Posted on March 25, 2015 in Possibly Unwanted Program

LolyKey

The LolyKey browser tool may claim that it provides advanced hotkey management but you may wish to know that is it classified as adware. Moreover, LolyKey is often incorporated with other adware in freeware packages, and users may unknowingly install adware via the 'Typical' or 'Expres' option. You may encounter the entry 'LolyKey Browser Add-On' in your 'Programs and Features' panel which indicates that the LolyKey adware is present on your PC. The LolyKey adware serves as a monetization tool for adware developers that earn affiliate marketing commission by displaying ads in your web browser. The LolyKey adware can use its browser integration to read your online history, preferred web resources, and your IP address. The information gathered by the LolyKey can be sent back to its servers for analysis, and you may receive targeted advertisements in your web browser that may take the...

Posted on March 25, 2015 in Possibly Unwanted Program

DoReMe

The DoReMe browser tool may have an amusing name and may offer you to display lyrics for your favorite music videos, but it is perceived as adware. Security experts note that the programming of the DoReMe application dictates to display advertisements in your web client, and not much little code is dedicated to its promoted functionality. The DoReMe adware functions as a tool to generate pay-per-click revenue for its developers by cluttering your web browser with banners, ad boxes and pop-ups. Best keep in mind that adware is not known to apply safety policies regarding the displayed ads and caution is advised. Also, the DoReMe adware may use your browsing history, Web client type and approximate geographical location as a reference in order to display targeted marketing materials. You may be interested to know that the DoReMe aware travels the web embedded with free application...

Posted on March 25, 2015 in Potentially Unwanted Programs

’844-332-7029′ Scam Message

The 844-332-7029 scam message is associated with the Call-844-332-7029.com web page where fake technical is promoted. Computer users infected with adware might be presented with pop-ups that say 'Your personal and financial information might be at risk' and be directed to call 844-332-7029. Security experts remind that the 844-332-7029 scam message is generated by adware on your computer, and you should not be hasty to believe your data is at risk. However, you could have installed adware along with a free application when you handle setup files via the 'Express' or 'Typical' option. You may want to check your web browser for unfamiliar tools because adware is often promoted as powerful browser enhancers. Also, the tech support on 844-332-7029 may claim that it is capable to help you with problems concerning products of leading security applications. The adware related to the...

Posted on March 25, 2015 in Potentially Unwanted Programs

Hover Zoom

Hover Zoom is a browser extension for Google Chrome that started as a safe and valuable tool to view zoomed images on websites when you hover your mouse over pictures. However, the latest versions of Hover Zoom are reported to display commercials from advertisers in the form of banners and in-text hyperlinks to sponsored content. Security analysts conducted an investigation and discovered that the Hover Zoom extension collects information such as your IP address, approximate geographical location and monitors which websites you frequently visit. Additionally, Hover Zoom may use web beacons, Flash cookies as well as HTTP cookies to create a unique profile about your online habits in order to help advertisers generate tailor-suited ads. The behavior of Hover Zoom is typically associated with adware, but the program performs as promised. Therefore, the Hover Zoom browser extension is...

Posted on March 25, 2015 in Adware

Defender Pro 2015

Defender Pro 2015 is a rogue anti-virus application. The Defender Pro 2015 program is known for displaying a menu screen with several options for supposedly cleaning a Windows PC of detected viruses and other malicious threats that is claimed as infections. Computer users who attempt to allow Defender Pro 2015 to clean their system of viruses and such may later discover that Defender Pro 2015 is a bogus security application. The task of Defender Pro 2015 is to deceive and only take a computer user’s money in return for a bogus security application. The enticement of using Defender Pro 2015 mostly comes from it displaying repeated pop-up messages and alerts claiming to have detected several viruses or other threats on the system it is installed on. Eliminating Defender Pro 2015 may be done through the use of a trusted antispyware application so it may never display such deceptive...

Posted on March 24, 2015 in Rogue Anti-Virus Program

Nhczz.updatenow.rivertrail.kim

The Nhczz.updatenow.rivertrail.kim domain is utilized by adware that is programmed to show pop-up windows in your web browser that may suggest you to install video software. The pop-ups by Nhczz.updatenow.rivertrail.kim may feature colors typically associated with the legitimate Adobe Flash Player as a way to present the promoted media player as legitimate. Moreover, the pop-ups by Nhczz.updatenow.rivertrail.kim might host a panel in white and gray that lists instructions how to install the supposedly harmless media player. You should avoid installing software promoted on pop-ups generated by adware because you may grant attackers remote access to your computer. The adware associated with Nhczz.updatenow.rivertrail.kim may have arrived on your PC as a plugin, an add-on, a browser extension and Browser Helper Object that was part of a freeware package. You may be interested to know...

Posted on March 24, 2015 in Browser Hijackers
1  2  3  4  5  6  7  8  9  10  11  12  Next     Total items: 13460