Our Malware Research Center provides malware tools, resources and documentation for assisting you in resolving many security related issues in addition to removal of the latest spyware or malware threats.
Must See Videos
What is SpyHunter 4 and How Does It Work?
SpyHunter is a powerful, real-time anti-spyware application designed specially for people like you, not for...
Duration: 2:39
Spyware, Adware, and Trojans violating its victim's PC
This video contains footage of the most infamous and malicious programs on the Web. Spyware, Adware,...
Duration: 2:49
How to Find and Remove Security Tool
Security Tool is a fake anti-spyware program that through the use of deceiving tactics, is able to extort...
Duration: 1:29
To view more videos on how to protect your PC from malware, visit our video library.
Need help understanding computer terms?
To find detailed explanations of computer and Internet terms, please visit our Glossary.
> Visit our Glossary
Malware of The Month

‘.locky File Extension’ Ransomware

Ransomware Infections have become increasingly common in the last few years. Only in the first two months of 2016, computer users have come across hundreds of new ransomware infections and variants of previous ransomware threats. One of the most prevalent threats in this period is TeslaCrypt 3.0,...

‘.micro File Extension’ Ransomware

The '.micro File Extension' Ransomware is a recently released variant of TeslaCrypt, a well-known ransomware threat that has been especially active since the first months of 2015. TeslaCrypt is currently in its version 3.0, which has made the attack stronger and more resilient to removal. The...
Want to learn about security?
Learn all about security threats such as trojans, rootkits, viruses, misleading programs, malware and other types of threats.
> Visit our Threat Database

Malware Trend in the Last 30 Days

See the malware detection rate within a 30-day period. This graph is helpful in visualizing when malware propagation hits its highs and lows.

» To view real-time data and statistics of malware outbreaks from global to local level, visit ESG MalwareTracker.