Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,099,600 0%
2 Conduit Search/Toolbar 875,439 0%
3 Adware.LinkSwift 630,029 0%
4 Hijacker 608,359 0%
5 PUP.Optimizer Pro 554,232 0%
6 V9 Redirect Virus 536,791 0%
7 PUP.InstallCore 527,398 0%
8 PUP.SupTab 471,997 0%
9 Babylon Search/Toolbar 423,458 0%
10 WeDownload Manager 416,203 0%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware


The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware


The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus


The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans


The FastSaler browser tool is advertised in freeware bundles as an instrument for online shoppers to discover amazing deals and cheap products. However, the only thing that is amazing about FastSaler is the amount of advertisements FastSaler can display in your web browser. Security experts classify the FastSaler browser tool as adware because it can use a Browser Helper Object, an extension, and an add-on to push marketing content. Users that were not careful and installed freeware via the 'Express' or 'Typical' option might experience ads by FastSaler in the form of banners, ad panels, coupons and special deals. Moreover, the FastSaler adware can read your browsing history and determine what type of commercials would suit your interests. Security experts remind users that advertisements delivered by adware may contain links to unsafe web locations and online resources. The primary...

Posted on March 27, 2015 in Adware

The pop-up windows by in your web client may invite you to install the LightSpark Player, and a quick search on Google can show that it is a legitimate application. However, you should note that the LightSpark Player is a native Linux application, and its brand is used to invite users to install a potentially harmful software. The pop-up may appear on software centers with a bad reputation and users infected with adware may encounter it on most pages they visit. The domain is associated with adware that could be used by hackers to spread risk are. You may be interested to know that the adware might use a Browser Helper Object, an add-on, and a browser extension to push pop-up windows. Security experts note that adware developers can work with hackers to promote harmful programs. Also, you might wish to...

Posted on March 27, 2015 in Browser Hijackers


The SpeedItUp software by MicroSmarts LLC is advertised to speed up your PC by freeing up space and cleaning temporary files, but security experts perceive SpeedItUp as a Potentially Unwanted Program (PUP). The SpeedItUp app can be downloaded from its official website and is often encountered in freeware bundles as SpeedItUp Free and Speeditup-Checkup. Additionally, the SpeedItUp program is known to travel in the company of the CheckMeUp browser extension which is known to display pop-up windows by in the web browser. The interface of SpeedItUp does not offer much functionality, and it can employ a registry key to boot with Windows and delay the start of your OS. Computer users may want to seek alternatives of the SpeedItUp tool that are not bundled with adware and low-quality search assistants. Keep in mind that the publishers of SpeedItUp Free may update its...

Posted on March 27, 2015 in Potentially Unwanted Programs

Computer users who are presented with a ransom note in Belarussian on the domain should be alerted that they are infected with malware. Security researchers linked the IP address of to the Tufik virus that in this case was used to lock the victim's web browsers and display a ransom note. The note on suggests that the Ministry of Internal Affairs of Belarus have detected unlawful activity and in order to evade legal prosecution the users should pay a fee within 12 hours. Malware researchers point out that the Tufik virus linked to can corrupt your web browsers and prevent you from accessing other pages, and that may convince some users that a government agency is enforcing law regulations. The Tufik virus is deployed as an EXE file and can modify your Windows system files...

Posted on March 27, 2015 in Browser Hijackers

AntiVirus PRO 2015

The AntiVirus PRO 2015 application may be promoted to you by pop-ups and low-quality software distribution platforms. The AntiVirus PRO 2015 may claim that it is designed to protect, but security researchers classify it as a rogue application that is programmed to scare users with numerous notifications of disabled protection functions nad no recent updates. The AntiVirus PRO 2015 scareware may display flashing pop-up windows on your desktop in bright red colors that suggest you to purchase a license to activate full protection. However, you might want to know that the AntiVirus PRO 2015 rogueware does not provide adequate protection and the developers of AntiVirus PRO 2015 use it to invite users to pay for non-existing protection. As mentioned above, the AntiVirus PRO 2015 is distributed like other rogueware such as Protective Antivirus 2015 and Antivirus Defender 2015 and may arrive...

Posted on March 27, 2015 in Rogue Anti-Virus Program

Fruit Basket

The Fruit Basket is advertised as a budget-friendly browser tool for online shoppers that has optimized versions for Mozilla Firefox, Google Chrome and Internet Explorer. The Fruit Basket application is perceived by security researchers as a Potentially Unwanted Program (PUP) because it may collect information to help advertisers push commercials in your Web browser. You may want to know that the Fruit Basket software may record your IP address, browser type, OS version and detect your approximate geographical location. The Fruit Basket browser tool may load numerous marketing materials, such as inline text advertisements and transitional commercials. The Fruit Basket application may be installed on all latest versions of Windows via freeware packages and low-quality software distribution platforms. You should note that the Fruit Basket program may read your browsing history and the...

Posted on March 26, 2015 in Possibly Unwanted Program

Browse Pulse

The Browse Pulse browser instrument may appear as a friendly search assistant that can help you dig through your search results for what you need. However, security experts note that the Browse Pulse app is adware designed to show advertisements in your Web client in the form of banners, in-text hyperlinks to sponsored content and contextual and transitional commercials. The Browse Pulse adware is being deployed in freeware installers as an additional tool that can be automatically installed by computer users via the 'Express' or 'Typical' option. You should note that the primary goal of adware is to monetize your clicks and generate pay-per-click revenue for its developers, which may putt your safety at risk. Adware developers may work with evil-minded third parties to promote riskware and Potentially Unwanted Programs (PUPs). Therefore, you may want to consider the ads by Browse...

Posted on March 26, 2015 in Possibly Unwanted Program

NanoCore RAT

The NanoCore RAT designation is used by security applications to specify a remote access Trojan with modular structure. You should note that the NanoCore Trojan may allow attackers to collect your data and online identity by installing a Remote Access Client on your PC. Hackers deploy the NanoCore RAT in spam emails as an attached RTF file that exploits the CVE-2012-0158 vulnerability. Security experts add that the operators of the NanoCore RAT can instruct it to download and run threatening plugins which can expand its functionality. The NanoCore Trojan is primarily used to target companies and private businesses, but its modular structure allows cybercriminals to adapt NanoCore RAT to suit their particular goals. The NanoCore RAT cyber parasite should not be underestimated, and you may wish to avoid spam emails that look like invoices or messages informing you that you won a prize....

Posted on March 26, 2015 in Trojans

‘PacMan’ Ransomware

The 'PacMan' Ransomware is a cryptographic malware that is deployed by cybercriminals via spear-phishing emails. Unlike other notorious ransomware such as TorrentLocker and CryptoLocker , the 'PacMan' Ransomware is programmed to give its victims 24 hours to deliver payment in order to recover their files. It is not advisable to open files and click on links from spam emails because most likely malware may try to appear as a text, video, image and archive in order to be downloaded and opened by users. The 'PacMan' Ransomware can use a strong RSA encryption to lock your files, and you may see 'ENCRYPTED' at the end of your filenames. After it finishes encrypting your data, the 'PacMan' Ransomware displays a note with its text on a white background with a timer, to inform you that you have 24 hours to pay for a decryption key. Security experts point out that the best way to counter...

Posted on March 26, 2015 in Ransomware

Protective Antivirus 2015

The Protective Antivirus 2015 software is advertised as a reliable anti-virus on low-quality software websites, may be promoted by adware and travels incorporated with free application installers. Users may be attracted to install Protective Antivirus 2015 because of its supposedly functional modules for network and home protection. However, Security analysts concluded that the Protective Antivirus 2015 does not provide adequate protection and uses numerous security notifications to convince users to pay for premium features that do not add other layers of protection. The Protective Antivirus 2015 is classified as rogueware that exhibits false detection during a scanning process in order to scare users and invite them to pay for advanced protection. The Protective Antivirus 2015 rogue software may insert a registry key in Windows to auto-start with your OS and may display security...

Posted on March 26, 2015 in Rogue Anti-Virus Program


The SkypEmoticons application can arrive on your PC as a drive-by installation of freeware package, and SkypEmoticons may be promoted to you via a message in Skype from a friend who installed it. The SkypEmoticons application claims to expand the range of emoticons you can use in Skype, but you should note that SkypEmoticons may inject advertisements in your Web browser and Skype client. Security researchers classify SkypEmoticons as adware that may appear as a toolbar attached to the right side of your Skype program. Additionally, the SkypEmoticons adware may use your account to text your friends and advertise itself to them. Most Web surfers are used to seeing advertisements in their Web browsers, but advertisements in your Skype client might be too much for you to tolerate. By installing the SkypEmoticons adware on your PC, you may be presented with links to unsafe online resources...

Posted on March 26, 2015 in Possibly Unwanted Program

The domain is associated with adware powered application that presents users with pop-ups that may promote archive managers, disk utilities, video players, and Bittorrent clients that could be corrupted by hackers. Security experts report that the IP address of is used in communications of corrupted applications infected with the Sality cyber parasite. You are not advised to download the content provided on the pop-ups as you might be exposed to harmful software. Often hackers use color themes very similar to popular applications in order to invite web surfers to download nad run the promoted applications. You should remember that the pop-ups by are generated by adware on your PC and to avoid clicks on potentially harmful websites. The adware associated with may have entered your computer as a supposedly...

Posted on March 25, 2015 in Browser Hijackers

Ebon Browser

After the installation of freeware via the 'Express' or 'Typical' option computer users may be surprised to find the Ebon Browser on their system. Yoy might want to know that the it is perceived by security researchers as a Potentially Unwanted Program (PUP) because it functions as a marketing platform for advertisers. The Ebon Browser by Ebonmedia Corp. is a custom-build of the legitimate Mozilla Firefox software that is dedicated to displaying various types of ads while you browse the Internet. The Ebon Browser may attract you with a personalized start page resembling the Windows 8 menu, but you should know that your online activities may be obstructed by many banners, ad boxes, and contextual commercials. A careful read of the 'Terms of Use' that accompany the Ebon Browser reveals that it collects several types of data about you. The Ebon Browser can record your entered search...

Posted on March 25, 2015 in Possibly Unwanted Program

KeyPlayer media player

The KeyPlayer media player by KeyDownload is a custom-build of the open-source VLC Media Player and can be promoted to you on low-quality software centers and freeware bundles. The KeyPlayer media player program may attract you with promises to render HD videos smoothly. However, the key feature of the KeyPlayer media player application is to display numerous commercials in your web browser via an add-on, a Browser Helper Object, and a browser extension. Security experts classify the KeyPlayer media player as a Potentially Unwanted Program (PUP) with adware capabilities. Moreover, users report poor performance from the KeyPlayer media player and they had to tolerate many unwanted ads loaded in banners, ad panels and pop-up windows on web pages they visited. Programs such as the KeyPlayer media player may employ tracking technologies to help advertisers push you targeted content. The...

Posted on March 25, 2015 in Possibly Unwanted Program


The LolyKey browser tool may claim that it provides advanced hotkey management but you may wish to know that is it classified as adware. Moreover, LolyKey is often incorporated with other adware in freeware packages, and users may unknowingly install adware via the 'Typical' or 'Expres' option. You may encounter the entry 'LolyKey Browser Add-On' in your 'Programs and Features' panel which indicates that the LolyKey adware is present on your PC. The LolyKey adware serves as a monetization tool for adware developers that earn affiliate marketing commission by displaying ads in your web browser. The LolyKey adware can use its browser integration to read your online history, preferred web resources, and your IP address. The information gathered by the LolyKey can be sent back to its servers for analysis, and you may receive targeted advertisements in your web browser that may take the...

Posted on March 25, 2015 in Possibly Unwanted Program
1  2  3  4  5  6  7  8  9  10  11  12  Next     Total items: 13466