Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,931,922 -2%
2 Conduit Search/Toolbar 1,352,045 -1%
3 PUP.InstallCore 944,161 -7%
4 PUP.SupTab 849,662 -1%
5 PUP.Optimizer Pro 784,361 -1%
6 Adware.SuperWeb 762,279 -3%
7 Adware.Multiplug 660,310 -2%
8 Adware.LinkSwift 634,569 -0%
9 Hijacker 634,111 -0%
10 Iminent Toolbar 608,263 -1%
Download as CSV
More Info

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles


LaSuperba may be associated with numerous problems that may be caused by PUPs (Potentially Unwanted Programs). LaSuperba may interrupt the computer users' activities when browsing the Web and cause performance problems on affected Web browsers. LaSuperba is linked to an adware that may affect most commonly used Web browsers on the Windows operating system, including Internet Explorer, Mozilla Firefox and Google Chrome. LaSuperba advertisements may take the form of irritating pop-up messages that make it very difficult to use the affected Web browser. In most cases, removing adware associated with LaSuperba will stop LaSuperba advertisements from appearing on affected Web browsers. However, most adware infections do not come alone; the presence of one adware component may indicate the presence of others, all of which may be connected with LaSuperba and similar unwanted content....

Posted on August 31, 2015 in Adware

VirLock Ransomware


The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware


The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware


The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar


MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware


ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Live Security Platinum


Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer


DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans


The TrumpKard is an adware program that was developed by TrumpKard, Inc and seems to offer a useful way for computer users prevent the exhibition of unwanted content from the Web. However, TrumpKard will display countless advertisements on the screen of the computers it is installed, without taking into consideration the computer user's will. TrumpKard may affect the main Web browsers including Internet Explorer, Google Chrome and Mozilla Firefox and the ads that may be by TrumpKard may be entitled 'Ads powered by TrumpKard,' 'RocketTab powered by TrumpKard,' 'Brought to you by TrumpKard' and similar titles. These advertisements may appear as boxes that will have inside pop-up ads, coupons, advertising banners and similar ads. It is not a recommended action to click on the TrumpKard ads. They can direct computer users to unsafe websites or promote fake software and updates. The...

Posted on May 24, 2016 in Adware

The is an adware program that may start displaying numerous advertisements on the Web pages the computer user is visiting. These advertisements, when clicked, may lead to the installation of unsafe products such as fake security programs, updates, etc. may be introduced to your computer bundled with cost-free programs downloaded from unknown sources. The developers of free programs may allow adware programs to be added to their applications as a way to maintain it operative, and the computer user may not be aware that an additional program will be installed together with the one they need. For this reason, it is fundamental that the computer users use the 'Advanced' or 'Custom' installation because this way they can see all the details about the program they want to install and opt out the undesirable ones. The presence of on...

Posted on May 24, 2016 in Adware


AppData is adware/Potentially Unwanted Application that may display numerous pop-up advertisements and messages on the computer user's machine. These advertisements may offer numerous products on well-known online shopping websites, coupons, hyperlinks and similar content on the websites the computer user wants to visit. After its installation, AppData may insert and add-on, browser extension or plug-in to the used Web browser, no matter if it is Google Chrome, Mozilla Firefox or Internet Explorer. These extensions are meant to display pop-up ads and banners. AppData may run various background processes that may decelerate the machine's performance. AppData may display annoying pop-up advertisements and windows that may match the computer users' surfing routine because AppData may collect their browsing history. AppData may be used to make a profit from commercial ad clicks or...

Posted on May 24, 2016 in Adware


HotLaps is another program fueled by adware that tries to induce online shoppers to install it believing they can get the best deals for the merchandise or service they are looking for. HotLaps offers competitive prices, coupons, instant deals and more. Although HotLaps displays numerous advertisements on your screen, its main objective is not to help the online shopper, but to create pay-per-click earnings for its developers. Also, the ads displayed by HotLaps may become annoying due to their intrusiveness and quantity. HotLaps also may be introduced into a computer by a method named 'bundling,' which consists of adding an adware-related program to the installation of a popular third-party free program that the users may install unknowingly when they choose a 'Quick' installation instead of the 'Advanced' or 'Custom.' HotLaps may affect Google Chrome, Internet Explorer, Mozilla...

Posted on May 24, 2016 in Adware


Computer users that are looking for a tool that can make their machines have a faster execution may be attracted by a program named Jangoram because the Jangoram application is advertised as a download optimizer. However, Jangoram is an ad-supported program which main goal in not the best interest of computer users, but to display as many ads as it can on their machines. Jangoram also may be installed on a computer when its user skips some details on the installation of a free program. Some ad-related program may be included on it, and the computer users may allow its installation unknowingly. Adware-laced programs such as Jangoram may create various problems on the computers they are installed. Jangoram targets Mac computers. Therefore, Jangoram may affect Safari mostly, although other Web browsers may be affected too. Once inside a computer, Jangoram can collect the computer...

Posted on May 24, 2016 in Browser Hijackers is a site supported by advertisers. may hijack the computer users' Web browser’s automatically, replace their homepage, prevent access to some Web resources, and redirect them to unsafe Web pages that may contain corrupted links and threats. Websites such as may be distributed via the 'bundling' method, and their main function is to lead as much traffic as possible to their sponsored domains, which will generate profits for them. may deliver fake notifications offering 'needed' updates and unwanted pop-ups. Any page you try to visit may be flooded by the commercial ads displayed by may modify your browser settings to replace Google Chrome, Internet Explorer, Mozilla Firefox and Microsoft Edge. may monitor the websites you visit to collect information. Due to the presence of...

Posted on May 24, 2016 in Browser Hijackers is not a trustworthy domain because it can gain access to your system automatically. While you are downloading free applications, you may also install unknowingly. Its presence in the installation of the main program may not be hard to identify if you install the desired program correctly and pay attention during the setup process. This way, you can notice the option to install and uncheck the box that allows its installation on your machine. can generate countless pop-up advertisements once it gets access to your Internet Explorer, Mozilla Firefox and Google Chrome. may enable the installation of additional adware, threatening software and other parasites. The pop-up ads and links provided by may redirect you to unknown or threatening websites. The objective of the ads...

Posted on May 23, 2016 in Browser Hijackers

While browsing the Internet, no matter if you are using Internet Explorer, Mozilla Firefox, Edge or Google Chrome, you may get, which will direct you to its related commercial websites. This means that your machine is affected by an adware program that may have entered automatically, bundled with a recently installed free-of-charge application. The advertisements displayed by related websites can take different shapes: boxes, pop-up windows, in-text ads, banners and similar advertisements. Besides the unwanted redirections and ads, the adware may make your Internet connection to be slower or freeze your browser so that your interface is not updated any longer. may collect information such as IP address, the Web pages you like to visit, your Internet searches and more. is...

Posted on May 23, 2016 in Browser Hijackers

Computer users that are affected by the browser hijacker report that they may be presented with numerous advertisements that will appear on their machines automatically. Every time you search for information or try to watch online videos, will pop up in a new tab and show countless commercial products, which may become extremely annoying.Once gets inside your computer, it may hijack your Web browser, including Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer. To make the ads appealing to the users, the browser hijacker may read the Meta tags of the pages they visit to show specific commercials and improve the number of clicks. Browser hijacks may enter a computer bundled with third parties application because otherwise no one will install these programs on their computers willingly. This is the kind of...

Posted on May 23, 2016 in Browser Hijackers

The pop-up advertisements displayed by that are appearing on your machine are created by an adware. may have been installed on your computer automatically and may mess up with several functions. Some of the pop-up ads exhibited by may try to induce you to install a fake update, which may end up in the installation of a threat. Some adware programs may be installed on a computer through the bundling method, which consists in adding its program to a free and popular software and is one of them. When the user installs the main program without paying attention to additional applications that may be included with it, they may end up with an unwanted program. The advertisements may try to make you buy its sponsored products so its developers can make a profit. These ads may appear as coupons, discount codes, price...

Posted on May 23, 2016 in Potentially Unwanted Programs

Is your Web browser behaving strangely and redirecting you to pop-up advertisements exhibited by If this is happening, your machine may be hosting an adware. The adware program linked to is designed to produce pay-per-click revenue for its creators and gather information such as your browsing habits and search terms. The adware linked to may inject banners into visited Web pages, turn the Web page text into hyperlinks, install additional PUPs and adware and created pop-up windows offering unsafe software or fake updates. The advertisements may change your browser setting automatically to show spam ads and lead you to sponsored websites. It may enter your machine through network vulnerabilities or corrupted commercial pages. also may have found its way to your computer the last time you manipulated a...

Posted on May 23, 2016 in Browser Hijackers

Zyklon Ransomware

A new ransomware Trojan called Zyklon Ransomware is attacking computer users. The most efficient method of deployment used by the Zyklon Ransomware is via spam emails containing a threatening attachment. However, file sharing networks, spam bots, social media spam, fake Java or Flash updates, etc. also may be infection vectors. The modus operandi of the Zyklon Ransomware is the same as most ransomware Trojans; the Zyklon Ransomware can make your files totally unemployable until you have the key to decrypt them by changing the files extensions to .zyklon. After infecting a computer, the Zyklon Ransomware will exhibit a ransom note in your desktop, explaining why you can't use your files and how to pay the demanded ransom to get your files back to normal. The Zyklon Ransomware uses the AES-512 cipher, which is a very strong encryption method and targets the following file types: PNG...

Posted on May 23, 2016 in Ransomware

Shujin Ransomware

The Shujin Ransomware is a Trojan encryptor that looks like to be crafted to infect and extort Chinese computer users. The Shujin Ransomware, as other ransomware Trojans, encrypts its victim's files and demands the payment of a ransom. The ransom notes that the Shujin Ransomware displays are written in Chinese. Another tell tail is that the computer users should use the Baidu search access the Tor browser and not another popular search engine. The Tor browser provides anonymity to its users, and the browser will give access to an undisclosed site that makes clear to the computer users how they can decrypt the files encrypted by the Shujin Ransomware. To get back the encrypted data, the infected computer user needs to download a decryption tool and obtain a machine code. After that, the infected computer users need to submit the machine code to the decryption site. Then the user...

Posted on May 23, 2016 in Ransomware

SNSLocker Ransomware

Computer users that believe they have inherited hundreds of dollars from a distant relative because they opened a spam email informing them about this may be infected with the SNSLocker Ransomware. The SNSLocker Ransomware is an Encryption Trojan that is made by a threat author going under the alias Saad Nabil Soufyane, hence—SNSLocker. The SNSLocker cryptomalware is written in the PHP programming language and is designed to take advantage of the .NET framework that is present on PCs since version Windows NT 4.0. Virtually, the SNSLocker Ransomware can run on almost all architectures that support the Windows OS. Computer users that are compromised by the SNSLocker Trojan might notice that their desktop wallpapers are changed to a ransom note. The message by the SNSLocker Ransomware may come in the form of a PNG image that is titled "WARNING! YOU ARE SO F*CKED!" and feature a picture...

Posted on May 20, 2016 in Ransomware

SeginChile Ransomware

Citizens of Chile and neighboring countries are experiencing attacks with a new type of cryptomalware that decrypts the victim's data for free. Your eyes do not deceive you—the first version of the SeginChile Ransomware provides free decryption to users that visit the site and enter their unique ID. The SeginChile Ransomware is programmed to infect Spanish-speaking users and use AES-256 encryption algorithm to lock files that feature the following extensions: .ASP, .ASPX, .CSV, .DOC, .DOCX, .HTML, .JPG, .JPEG, .MDB, .ODT, .PDF, .PHP, .PNG, .PPT, .PPTX, .PSD, .SLN, .SQL, .TXT, . XLS, .XLSX, .XML. Spam Email is the Preferred Method to Spread the SeginChile Ransomware The SeginChile Ransomware is a Trojan that may be packed as a corrupted executable that may appear as a PDF and DOC file attached to spam email. In the case with the SeginChile Ransomware,...

Posted on May 20, 2016 in Ransomware
1 2 3 4 5 6 7 8 9 10 11 1,056