Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,546,974 4%
2 Conduit Search/Toolbar 1,160,702 2%
3 Hijacker 751,272 5%
4 PUP.InstallCore 743,978 4%
5 PUP.SupTab 731,399 7%
6 PUP.Optimizer Pro 723,159 3%
7 Adware.LinkSwift 653,645 1%
8 V9 Redirect Virus 584,276 1%
9 Babylon Search/Toolbar 528,341 2%
10 WeDownload Manager 451,364 1%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Warning: Over 20,000 Gmail, AOL, and Yahoo Email Accounts Hacked!
A major email security scam has taken place today where hackers compromised over 20,000 Gmail, AOL and Yahoo email accounts and posted the login details of them online. It is apparent that there is a phishing scheme happening where hackers are able to obtain thousands of login credentials from...

More Articles

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

Kovter Ransomware


The Kovter Ransomware is a malware threat that carries out a common Police Ransomware scam in order to steal money from unsuspecting computer users. The Kovter Ransomware is a relatively new Police Ransomware Trojan, first detected in 2013 in the wild. Like most Police Trojans, the Kovter Ransomware displays a fake message from the police intending to trick the victim into paying a 'penalty' in order to stay away from jail time. Like other Police Rasomware, the Kovter Ransomware has a Winlocker component that allows the Kovter Ransomware to block access to the infected computer. However, the main reason why the Kovter Ransomware has attracted the scrutiny of malware researchers is...

Posted on April 10, 2013 in Ransomware

CIBS Pol Virus (Ransomware)


The CIBS Pol Virus is a police ransomware Trojan that belongs to the Urusay family of malware. This police ransomware Trojan is classified as a Winlocker because it blocks access to the victim's computer by displaying a full-screen message that claims to be an alert from the police. CIBS Pol Virus is a well known scam that is in no way connected to the police force. Instead, the CIBS Pol Virus is used by criminals to scam inexperienced computer users so that they will hand over their money out of fear of prosecution, jail time and severe fines. If your access to your computer is blocked by the CIBS Pol Virus, ESG security researchers strongly advise against following the steps...

Posted on February 21, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus


The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Malware, Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans


UniCoupons is an adware program that may be known for its ability to load up pop-up or banner type advertisements. The UniCoupons ads may be made up of ones attempting to offer various coupon deals or ways in which computer users may be able to save money shopping on the internet. The UniCoupons ads may be intrusive where they will display when computer users are surfing the internet. Additionally, UniCoupons ads may cause reduced performance in some web browsers making it hard to load some web pages with several media resources to load at full speed. Removal of the UniCoupons program and associated plugins or components is essential to stop the UniCoupons ads from displaying and causing unwanted issues.

Posted on September 19, 2014 in Adware


Backdoor.Betwem is a deceptive backdoor Trojan horse that may end up on a vulnerable system that does not have many security protection measures in place. When loaded on a computer, Backdoor.Betwem is apt to running in the background where it could go undetected for a long time while it performs unknown malicious actions. The backdoor functions of Backdoor.Betwem may allow remote attackers to connect to an infected system. In doing so, remote hackers may be able to steal or gather data from the infected computer’s hard drive and use it in cases that lead to identity theft or other serious issues. Putting a rest to these potential issues is a situation that may require complete removal of Backdoor.Betwem, which can be done through use of an antimalware application.

Posted on September 19, 2014 in Backdoors

Poup Alerta Ads

Poup Alerta Ads are part of an adware application that could be loaded on a PC due to the user installing random freeware apps or bundled software programs obtained from the internet. The Poup Alerta Ads are commonly ones displayed as pop-ups or banners when you are surfing the internet where they attempt to offer services or products through the internet. The use of Poup Alerta Ads may result in redirects on your web browser potentially loading up sites and pages that have questionable content or prove to be completely unwanted by the majority of computer users. Stopping Poup Alerta Ads may require finding its components and taking the proper precautions and actions to remove them from the affected computer and installed web browser applications.

Posted on September 19, 2014 in Adware is a browser hijacker and a web site that could alter web browser settings causing the page to load up automatically as the default home page. With this happening, the site may load up upon opening a new web browser window. The page itself may appear as a generic search engine that uses a custom yahoo search to return results. The thing about the results through is that many of them have associated sponsored links or advertisements listed. Use of those links or ads may cause additional redirects to other sits proving to have questionable content. Putting a stop to the actions of taking place may involve finding all related components of and removing them from the affected computer and web browser applications.

Posted on September 19, 2014 in Browser Hijackers


Backdoor:Win32/Plugx.K is a dangerous backdoor Trojan horse that may be a gateway for hackers to infiltrate an infected PC. Through this infiltration a remote hacker may be able to use Backdoor:Win32/Plugx.K for accessing the infected computer where they could steal data stored on its hard drive. Through this access hackers may also be able to perform other malicious actions on the system that lead to many other serious issues over the internet. Allowing Backdoor:Win32/Plugx.K to run on a computer, where it could run in the background and go undetected for long periods of time, is not suggested. It is best that Backdoor:Win32/Plugx.K be detected and removed through use of an updated antispyware application.

Posted on September 19, 2014 in Backdoors

Super Optimizer

Super Optimizer is a fake security application known to be a potentially unwanted program. Through using Super Optimizer a computer user may be confused as to why the program does not complete its promised functions of optimizing their PC. Usually this is due to not registering a copy of Super Optimizer or paying for a purchased version which will yield poor results in most cases. The Super Optimizer program may not be trusted after it is ousted as being a scam more or less attempting to extort money from unsuspecting computer users.

Posted on September 19, 2014 in Potentially Unwanted Programs


CloudGuard is a program that acts much like an add-on component in an attempt to offer up services to help you with securing your computer or devices. The CloudGuard app is able to display random advertisements on a computer after it is used or initiated. Usually the loading of CloudGuard will take place after installing random freeware programs or bundled software applications. When that takes place, CloudGuard is apt to displaying random ads as pop-ups or banners sometimes when surfing the internet where they prove to be intrusive and annoying for some computer users. The CloudGuard program must be completely removed to stop the ads that it generates on any affected computer. In most cases CloudGuard can be eliminated through use of an updated and trusted antispyware tool.

Posted on September 18, 2014 in Adware


Trojan:Win32/Joinkjot.A is a Trojan horse that may be similar to other threats designed to obtain logins to online accounts. Trojan:Win32/Joinkjot.A may uses aggressive money extortion techniques and other methods to ultimately gain money from unsuspecting computer users or allow a remote attacker access to the infected computer. Those who may encounter the Trojan:Win32/Joinkjot.A Trojan on their computer are highly advised to remove it immediately using antispyware software. Removal of Trojan:Win32/Joinkjot.A will ensure your system and stored data is not compromised by an unknown hacker that seeks to gather data from infected computers. Use of that information can lead to serious issues like identity theft.

Posted on September 18, 2014 in Trojans


StormWatch was created by the Weather Protector LLC company where it is known to be a questionable program that supposedly offers ways to view the weather and weather alerts on a Windows PC desktop. The StormWatch program may be loaded automatically by means of installing random freeware or bundled software applications from the internet. When loaded, StormWatch may then run in the background where it may render several advertisements or messages on the screen. Use of the ads generated from StormWatch may cause unwanted site redirects or loading of pages that have questionable content and offers. Stopping the activities of StormWatch may require complete removal of the StormWatch program and all of its components.

Posted on September 18, 2014 in Rogue Anti-Spyware Program


AllSaver is an adware program that may load up as a browser extension where it will cause various advertisements to be displayed. The AllSaver ads are usually ones that attempt to offer better online shopping experiences or attempt to give users random coupon deals or ways to save money by shopping on the internet. Use of the AllSaver ads may lead to web site redirects on your web browser to pages that have questionable content. The AllSaver ads may also cause slowdowns of web browsers where they can no longer load some pages at full speed due to the AllSaver ads and its installed components. Loading of AllSaver may take place due to installing random freeware apps or bundled software. Stopping the AllSaver ads may be an experience that is successfully mastered through use of an antispyware program.

Posted on September 18, 2014 in Adware


Backdoor.Miniduke!gen4 is a computer Trojan horse that may attempt to open up a backdoor access where remote hackers could access an infected computer. The Backdoor.Miniduke!gen4 infection may be loaded on a system without any indication to the computer user. Additionally, after loaded Backdoor.Miniduke!gen4 will run in the background going mostly undetected while it performs malicious activities that eventually could lead to data on the hard drive of an infected system being stolen. Basically, Backdoor.Miniduke!gen4 could be used to lead to issues like identity theft or obtaining online account login credentials for things like online banking accounts. It is extremely important to detect and safely remove Backdoor.Miniduke!gen4 using the proper antispyware tool so it does not lead to these serious issues.

Posted on September 18, 2014 in Backdoors is a site that is classified as a browser hijacker due to its actions of causing redirects or displaying unwanted and annoying sponsored links. The site may be one that is automatically loaded on some systems as a default home page due to installing random freeware or bundled software. Through computer users may notice various links or internet search results sent through a customized yahoo search. It is important to eliminate the components to prevent the automatic loading of the home page or causing redirects to other questionable sites that may have unwanted content that lead to other unknown sites.

Posted on September 18, 2014 in Browser Hijackers

FB Photo Zoom

FB Photo Zoom is a program that attempts to offer random services for helping computer users preview images at full size over Facebook. The FB Photo Zoom program is known to be loaded without a computer user’s permission sometimes due to installing random freeware programs or bundled software. When loaded, FB Photo Zoom may then load up pop-ups or attempt to offer its services in aggressive manors where the computer user is aggravated with the notifications mostly when surfing the internet. Web browser habits may be tracked by FB Photo Zoom and redirects could take place loading up unwanted sites and pages. Removal of FB Photo Zoom may require use of an antispyware tool to safely detect all components related to FB Photo Zoom and remove them automatically.

Posted on September 17, 2014 in Potentially Unwanted Programs is a site that is apt to providing a means of searching the internet in addition to providing quick link buttons for popular social sites and other pages. The site has been deemed as a browser hijacker due to it having components that will automatically load as a default home page on several web browser applications. Through the use of computer users may notice several advertisements or sponsored links. Use of those ads or links on may cause redirects to other unwanted sites or pages that contain questionable content. In the efforts to stop from loading automatically it may require the use of an antispyware program designed to detect and remove browser hijackers from a Windows PC.

Posted on September 17, 2014 in Browser Hijackers


TrojanDownloader:Win32/Banload.AXI is a deceptive computer threat and Trojan horse that may be prone to downloading other unknown and potentially malicious software and files onto an infected computer. The TrojanDownloader:Win32/Banload.AXI threat may be a gateway for remote hackers to infiltrate the infected system and then steal data from its hard drive. Through the use of TrojanDownloader:Win32/Banload.AXI a remote attacker could control certain activities over the internet and eventually lead to issues like identity theft that the computer owner may be liable for. It is essential to remove TrojanDownloader:Win32/Banload.AXI by use of a trusted antimalware application.

Posted on September 17, 2014 in Rogue Anti-Spyware Program
1  2  3  4  5  6  7  8  9  10  11  12  next     total items: 12275