SpyHunter

Malware Remediation Utility

  • Detect & remove the latest malware threats.
  • Malware detection & removal definitions are updated regularly.
  • Technical support & custom fixes for hard-to-kill malware.
* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy/Cookie Policy & Discount Terms. See more details and alternative free offer.
Play

Top Security News

White House Issues Official Guidance for Cyberattack Protection The White House's official website put up concise and clear guidance for protection against "potential cyberattacks" on March 21, 2022. The informational release contains some general information,...
Data-Wiping 'HermeticWiper' Malware Hits Windows Computers Amid Russian Ukraine Invasion The Russian invasion of Ukraine has stirred relations across the globe among many countries for many reasons. Amid the Russian invasions into Ukraine with many looming uncertainties, the hackers...
New Report Shows 1,100% Surge in MacOS Malware A shocking report that was just published by Atlas VPN shows that new malware infections developed specifically for macOS saw a whopping increase of almost 1,100% verses 2019. The report, which was...

Top Articles

Anti-Malware Lab

Anti-Malware Lab screenshot

Are you getting alerts from Anti-Malware Lab? Don't be tricked, Anti-Malware Lab is a not a real security application. It is a kind of program known as a rogue anti-malware application. These kinds of programs pretend to be genuine anti-malware utilities to trick you into buying them. Specifically, Anti-Malware Lab's interface is designed to mimic the interface for a typical Windows Security scanner. Anti-Malware Lab takes over your computer, to make you think it has a malware infection. Then, it will prompt you to buy Anti-Malware Lab to get rid of the supposed infection. Don't fall for it; Anti-Malware Lab is nothing but a scam. How Anti-Malware Lab Enters Your Computer Surprisingly, it...

Posted on July 6, 2011 in Rogue Anti-Spyware Program

Keylogger Zeus

Zeus Keylogger is a malware program that is designed to steal a computer user's private information. A keylogger is a program that is used to record every key that is pressed on the infected computer's keyboard. Zeus Keylogger also has the capacity to take the recorded data and relay it to a third party. A hacker can take all of this information and isolate online passwords, credit card information, and online banking data. To protect your privacy, out team of PC security researchers recommends using an anti-malware program to identify and remove Zeus Keylogger. How Zeus Keylogger Steals Your Personal Information Zeus Keylogger is specifically engineered to target financial information. This nasty spy program contains an extensive list...

Posted on August 16, 2011 in Keyloggers

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the app modifies the "new tab" settings so that the corrupted browsers launch the program's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they are using the regular...

Posted on July 3, 2015 in Browser Hijackers

How to Fix Mac Error Code 43 When Copying Files

How to Fix Mac Error Code 43 When Copying Files screenshot

Getting an OS system error message while working on a project can be quite an unpleasant surprise. Whether relating to MS Windows, or Mac OS, such a bug is always bound to disrupt your normal computer work. While some errors tend to be system-specific, others can affect both Windows and Mac-based systems, albeit designating totally different problems. The so-called Code 43 error message, for example, is primarily associated with device driver problems in Windows PCs, on the one hand, and file transfer issues on Mac machines, on the other. If you are using Windows and looking for a way to fix this specific error, click here for a guide with possible solutions. If you are a Mac user,...

Posted on January 30, 2019 in Issue

KMSpico

KMSpico screenshot

KMSpico is a software made to illegally activate Windows 10 and other Windows operating systems for free. This software is unsafe and has no connection to the Microsoft Corporation. Instances of KMSpico may open the way to further malware infections, installation of Potentially Unwanted Programs (PUPs) and more. There are many websites online that offer versions of KMSpico. Nearly all of them bundled with adware, malware and more. This may quickly put a computer at risk without the consent of the user. What does KMS stand for? KMS stands for Key Management Service, a technology used by Microsoft to activate services on a local network. This is done to remove the need for connecting each...

Posted on February 7, 2019 in Potentially Unwanted Programs

Newsbreak.com

Newsbreak.com screenshot

At first glance, the Newsbreak.com website appears to be a useful tool that would provide its visitors with the latest news. However, this is one of the countless bogus websites online that do not provide any content of value, and instead, seek to benefit from their visitors using various shady tricks. Spams Users with a Constant Flow of Advertisements Upon visiting the Newsbreak.com page, users will be asked to permit the site to display Web browser notifications. Keeping in mind that this fake page poses as a legitimate news website, many users may be tricked to allow browser notifications thinking that they will be alerted for the latest breaking news. However, this is not the case,...

Posted on February 3, 2020 in Browser Hijackers

Segurazo

Segurazo screenshot

The Segurazo application, a/k/a SAntivirus, presents itself as a helpful, genuine antivirus tool capable of bringing considerable benefits to those who give it a chance. However, in reality, Segurazo is far from helpful and is certainly not as trustworthy a tool as one would expect from an antivirus application. Instead of effective threat detection and real-time protection, SAntivirus will bombard you with dozens of falsely exaggerated security reports in a relentless effort to urge you to buy the premium version of this dodgy tool. Segurazo As a Drive-By Download In general, malware actors tend to distribute Potentially Unwanted Programs (PUPs) by smuggling them into software bundles...

Posted on March 6, 2020 in Potentially Unwanted Programs

DarkSide Ransomware

DarkSide Ransomware screenshot

DarkSide Ransomware is a type of malware that is created for the purpose of extorting money from computer users through holding their PC for hostage. The task of DarkSide Ransomware accomplishing its money extortion scheme starts with it encrypting files, which takes place after loading on a system often due to the user opening a malicious spam email attachment. The DarkSide Ransomware is known to encrypt many files and append them with similar file extensions. While each file encrypted by DarkSide Ransomware can be easily identified and found, they cannot be accessed or opened due to undefeatable encryption. Due to such, a computer user wanting to get their system back to normal...

Posted on August 13, 2020 in Ransomware

How to Check Storage on Mac

Mac devices are often regarded to be finely tuned and possess harmonious systems that combine both hardware and software components. Unfortunately, one drawback that has been often associated with these devices is that it is notoriously difficult, and sometimes impossible, to upgrade individual hardware components, such as getting a bigger SSD to store more videos, photos, movies, etc.  This means that Mac users may need to pay more attention to their Mac storage space, how much is still available, and if they will need to delete some existing files to make room for new content. As a result, knowing how to check your Mac's storage quickly could be a handy skill.  Checking Disk Space on Mac Locate and click on the Apple menu in the...

Posted on February 15, 2022 in Issue

Top 20 Countries Found to Have the Most Cybercrime

Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm, Symantec, has discovered specific factors that determine why a certain country is plagued with cybercrime more so or less than another which allowed them to come up with a ranking for each. Symantec has ranked 20 countries that face, or cause, the most cybercrime. In compiling such a list, Symantec was able to quantify software code that interferes with a computer's normal functions, rank zombie systems, and observe the number of websites that host...

Posted on July 9, 2009 in Computer Security

Yt1s.com

The Yt1s.com page offers its visitors the ability to download YouTube content to their devices. Users can even choose the desired format of the produced file, such as mp3, mp4 and 3gp. It should be noted that taking advantage of such websites, goes against the ToS of the YouTube platform and could fall into copyright infringement. In addition, websites such as Yt1s.com, often utilize rogue advertising networks. As a result, whenever users land on the page, they would be greeted with questionable and intrusive advertisements. The advertisements could contain seemingly enticing offers that lead to online shops (both legitimate and fraudulent ones), promote tactics and fake giveaways, cause redirects to phishing schemes, or try to convince...

Posted on April 13, 2022 in Browser Hijackers, Rogue Websites

Discord Shows Black Screen when Sharing Screen

When it launched, Discord was a VoIP platform geared towards the gaming community. However, in the following years, it expanded its scope, added numerous new features, and became one the biggest social platforms with over 140 million active monthly users. Currently, users can send private instant messages, start VoIP and video calls, stream their computer screens, and organize in communities called servers centered around specific interests.  The ability to start sharing their computer screen quickly and effortlessly is without a doubt one major reason drawing people towards the Discord platform. However, some users may encounter an issue when trying to use the feature with Discord displaying a black screen instead of the intended...

Posted on June 21, 2021 in Issue

More Articles

ArguePatch

The Sandworm APT (Advanced Persistent Threat) group has expanded its threatening arsenal with a new version of their loader malware known as ArguePatch. Sandworm is believed to be behind some of the most disruptive attack operations. Since the start of the war in Ukraine, the group has been focused on targets within the country particularly. The ArguePatch loader was deployed as part of the Industroyer2 attack chain. The Industroyer2 threat can compromise industrial control systems (ICS) and be leveraged against a Ukrainian energy provider to disrupt the country's energy grid. In addition, ArguePatch has been deployed in numerous attacks delivering the data-wiping malware CaddyWiper. The new version of ArguePatch was analyzed by...

Posted on May 23, 2022 in Malware, Advanced Persistent Threat (APT)

Silenthill24.biz

Users that find themselves encountering the Silenthill24.biz website should be careful. The page has been observed to exploit various misleading or clickbait messages, as part of an online tactic. This behavior is not an isolated occurrence, as countless other websites have already been put on the Internet to perform essentially the same scheme. The goal of the fraudsters is to trick visitors into unknowingly subscribing to the page's push notifications. The push notification feature is a legitimate browser functionality that is intended to give users a way to receive important or relevant updates from the sites they are interested in. However, sites like SIlenthill24.biz use the browser permissions associated with the feature to run...

Posted on May 23, 2022 in Rogue Websites, Browser Hijackers

'CAETANO FORMULA' Email Scam

Cybersecurity researchers have uncovered another spam email campaign that is delivering malware threats. The threat actors responsible for this threatening operation appear to be targeting users in Europe mainly, with the goal of obtaining confidential or sensitive information from the infected devices.  The lure emails used in the "CAETANO FORMULA" email scam are designed to appear as a confirmation for a new order or purchase from CAETANO FORMULA, a representative for the Renault and Dacia automobiles in Portugal. The email message claims that users must confirm their new order, implying that they will need to open the attached file and make sure that all of the supposed information in it is correct. However, once the file is executed,...

Posted on May 23, 2022 in Ransomware

Watchvideo.pro

Watchvideo.pro is an untrustworthy website, whose sole reason for existing is to take advantage of its visitors by running various online tactics. In the vast majority of cases, these dubious pages exploit the legitimate push notifications browser feature to run unwanted and intrusive ad campaigns. For the tactic to work, the deceptive website must lure users into pressing the displayed 'Allow' button and unknowingly enabling the page's push notifications.  It should be noted that the exact fake and misleading messages shown to each user could vary based on specific parameters, such as their IP addresses, geolocation, browser type and more. Indeed, some of the potential misleading scenarios could involve the site pretending to do a...

Posted on May 23, 2022 in Rogue Websites, Browser Hijackers

TeamBot Dropper

Cybersecurity researchers have caught an attack campaign that uses a new dropper malware named TeamBot. Droppers are typically small malware threats that are deployed in the initial stages of the infection stage. Their role is to establish a foothold within the breached system, before fetching and executing the far more threatening next-stage payloads. Details about TeamBot and the associated malicious operations were revealed in a report by security researchers. According to their findings, TeamBot was used in attacks against a narrow set of victims described as individuals connected to embassies or governmental financial bodies from several European countries. The researchers also have identified several different malware threats being...

Posted on May 23, 2022 in Malware

IntegerLocator

Mac users should be on the lookout for another intrusive application that might be trying to sneak itself onto their devices. Named IntegerLocator, this dubious program has been classified as adware belonging to the ever-growing AdLoad family. Adware applications may possess some functionality but their primary goal is to deliver various unwanted and untrustworthy advertisements to the devices they are installed on. It should be noted that many deceptive applications known as PUPs (Potentially Unwanted Programs) try to hide their installation from the user's attention by being placed inside software bundles or outright fake installers. However, once activated on the Mac, IntegerLocator's presence will become noticeable almost...

Posted on May 23, 2022 in Mac Malware, Adware, Potentially Unwanted Programs

Horsemagyar Ransomware

The Horsemagyar Ransomware is a malware threat capable of locking users out of their own data. When deployed to a computer, the threat initiates an encryption algorithm with a strong cryptographic algorithm. This ensures that the affected data will be close to impossible to restore without the decryption key possessed by the hackers. Once it has been executed, the Horsemagyar Ransomware will create a unique ID string for the victim. The string will be added to the original names of all locked files. In addition, the threat also will add 'spanielearslook' followed by '.likeoldboobs.' Despite this seemingly unprofessional message, the damage that the Horsemagyar Ransomware could cause should not be underestimated. After all targeted...

Posted on May 23, 2022 in Ransomware

Industrial Spy Market Ransomware

Cybercriminals are targeting companies and corporate entities with a new ransomware threat. Tracked by cybersecurity experts as the Industrial Spy Market Ransomware, the threat is capable of leaving the data on the breached devices in a completely inaccessible state. The goal of the attackers is to extort hefty amounts of money from their victims in exchange for their assistance in the restoration of the encrypted files. Unlike most ransomware threats, Industrial Spy Market does not modify the original names of the files it locks and instead, leaves them intact. When all targeted filetypes on the infected system have been encrypted, the malware will create a new file on the desktop named 'readme.html.' Opening the file will present the...

Posted on May 23, 2022 in Ransomware

VoltageTask

VoltageTask joins the numerous other deceptive and intrusive applications that try to take advantage of Mac users. These applications are commonly distributed through underhanded methods. Indeed, most Mac users do not recall ever allowing their installation on their devices. That is because the applications may have been installed as part of a shady software bundle or even as an outright fake installer/updater. Based on this behavior, these applications are classified as PUPs (Potentially Unwanted Programs). At the same time, VoltageTask's primary function is the delivery of unwanted advertisements to the user's Mac, making it an adware application. Adware is an ever-growing category of applications designed to monetize their presence...

Posted on May 20, 2022 in Mac Malware, Adware, Potentially Unwanted Programs

Predator Mobile Malware

Government-backed threat actors are using a mobile malware threat tracked as Predator, to infect the mobile devices of select targets. The origins of the Predator threat have been linked to a commercial surveillance company called Cytrox. According to the findings of CitizenLab, Cytrox was first established as a North Macedonian start-up. Since then the company has established a corporate presence in Israel and Hungary and is believed to have supplied spyware and zero-day exploits to its clients. A report by Google's TAG (Threat Analysis Group) has confirmed that these threat actors are located in multiple countries across the world, including Egypt, Greece, Spain, Armenia, Côte d’Ivoire, Madagascar, and Indonesia. Details about Predator...

Posted on May 20, 2022 in Mobile Malware, Spyware

Saitama Backdoor

Cybersecurity researchers have uncovered a new backdoor threat that is being spread via weaponized email attachments. Named the Saitama Backdoor, the purpose of the threat is to establish a foothold on the targeted system and allow the attackers to further expand their reach with next-stage payloads. The Saitama Backdoor threat is written in .NET and exploits DNS protocol, as means of communicating with its Command-and-Control (C2, C&C) servers. Once deployed to the system, the threat can recognize and execute over 20 incoming commands from the attackers. The threat actors can utilize Saitama to collect various system information, such as IP address and OS version, as well as details about the currently active user, including their...

Posted on May 20, 2022 in Backdoors

Aytonus.com

Aytonus.com is an untrustworthy website, whose purpose appears to be the propagation of online schemes. It should be noted that some deceptive websites can change the content or the fake scenarios they show, based on certain parameters, such as visitors' IP addresses, geolocation and possibly more. One of the confirmed tactics encountered on Aytonus.com is a variant of 'Hackers are watching you!' This scheme is leveraged against Apple users and relies on misleading security alerts to scare the unsuspecting victims into downloading a promoted application. The first step of the tactic involves showing a pop-up window claiming that the user has received multiple important system notifications about issues regarding their device. The main...

Posted on May 20, 2022 in Rogue Websites

BlockAll

The BlockAll browser extension also encountered as 'BlockAll - block ads,' advertises itself as a convenient tool that will improve users' browsing experience by reducing the number of advertisements encountered on the Internet significantly. Unfortunately, once installed on the system the true colors of the application are revealed almost instantly - BlockAll is an intrusive ad-supported program that cybersecurity experts have classified as being adware. Indeed, the application is designed to deliver various intrusive advertisements on the systems it is installed on, likely generating profits for its operators in the process. When dealing with the advertisements delivered by adware, hoax websites, or other similarly untrustworthy...

Posted on May 20, 2022 in Potentially Unwanted Programs, Adware

Juicycelebinfo.com

Juicycelebinfo.com is not a website that users should trust. In fact, it is extremely unlikely for people to open the website willingly. This fact becomes less surprising when it is revealed that Juicycelebinfo.com doesn't contain information about recent celebrity news stories. Instead, the main goal of the page is to take advantage of its visitors and try to lure them into enabling its push notifications. Unscrupulous people have been exploiting the legitimate push notifications browser feature via countless deceptive websites, and more appear to be emerging every day. These hoax websites operate in a virtually indistinguishable way. Users are shown various misleading advertisements and clickbait messages, creating a false impression...

Posted on May 20, 2022 in Rogue Websites, Browser Hijackers

WORLD GRASS Ransomware

Cybercriminals are using a destructive malware threat to lock users out of their own data. The threat is tracked as the WORLD GRASS Ransomware, and its encryption algorithm is strong enough to make the restoration of the affected files without assistance from the attackers nearly impossible. Victims will be left unable to open or use any of the documents, PDFs, pictures, databases, archives, etc. that were stored on the infected device. It should be noted that the WORLD GRASS Ransomware also can be encountered as EarthGrass and EarthGress.  Among its intrusive actions, the threat also will modify the names of the files it encrypts. More specifically, victims will notice that the locked files now have '.34r7hGr455' appended to their...

Posted on May 20, 2022 in Ransomware
1 2 3 4 5 6 7 8 9 ... 1766