SpyHunter

Malware Remediation Utility

  • Detect & remove the latest malware threats.
  • Malware detection & removal definitions are updated regularly.
  • Technical support & custom fixes for hard-to-kill malware.

Try SpyHunter (FREE)!*

* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

Top Security News

Beware: Cybercriminals Leveraging Coronavirus to Exploit Computer Users and Spread Malware It hasn't taken a lot of time for threat actors to realize the social engineering opportunity that the novel coronavirus (2019-nCoV) has presented them. The respiratory infection that originated in...
Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria There's no doubt that the Coronavirus has created a worldwide hysteria and pandemic from having a negative impact on many economies to pressing government officials to hold conferences addressing...
Hackers Exploiting Coronavirus Fears To Push Malware As the Covid-19 pandemic goes into full swing, we see increasing numbers of hackers and nation-state actors trying to exploit the global fears for their own gains, spreading malicious software...

Top Articles

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the malicious app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the malicious app modifies the “new tab” settings so that the corrupted browsers launch the malware's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they...

Posted on July 3, 2015 in Browser Hijackers

How to Fix Mac Error Code 43 When Copying Files

How to Fix Mac Error Code 43 When Copying Files screenshot

Getting an OS system error message while working on a project can be quite an unpleasant surprise. Whether relating to MS Windows, or Mac OS, such a bug is always bound to disrupt your normal computer work. While some errors tend to be system-specific, others can affect both Windows and Mac-based systems, albeit designating totally different problems. The so-called Code 43 error message, for example, is primarily associated with device driver problems in Windows PCs, on the one hand, and file transfer issues on Mac machines, on the other. If you are using Windows and looking for a way to fix this specific error, click here for a guide with possible solutions. If you are a Mac user,...

Posted on January 30, 2019 in Computer Security

Shlayer Trojan

Shlayer Trojan screenshot

The Shlayer Trojan is a cyber-threat aimed at Mac users who might be interested in trying out application stores other than the official App Store by Apple. The Shlayer Trojan might be promoted to the users as an independent application delivery platform that offers discounts on premium software. The Shlayer platform was reported of delivering harmful programs, unwanted browser extension, unrequested Internet settings modifications, promoting questionable shopping helpers and distributing supposedly free premium applications. The Shlayer Trojan was recognized by computer security researchers in January 2019 when the users started reporting fake Adobe Flash updates to Web browser vendors....

Posted on February 15, 2019 in Mac Malware, Trojans

CoronaVirus Ransomware

CoronaVirus Ransomware screenshot

The CoronaVirus Ransomware (also called CoronaVi2022 Ransomware) is a file-locker, which was released in the wild recently, and it seems that its author has opted to use the name of the Coronavirus (also known as COVID-19), which is a disease that is threatening users worldwide. Just like the disease it is named after, the CoronaVirus Ransomware also threatens users worldwide, but in a different way – it will try to encrypt their files, and also overwrite the contents of their drive's Master Boot Record (MBR). The latter operation may cause a lot of trouble, since the victims' computers will not load their operating system and, instead, they will display a copy of the CoronaVirus...

Posted on March 12, 2020 in Ransomware

Hackers Spreading Malware via Coronavirus Maps Online

Hackers Spreading Malware via Coronavirus Maps Online screenshot

The ongoing outbreak of the coronavirus is now disrupting business across the world, but apparently cybercriminals have no days off, since they're just as active as they were before the beginning of the outbreak. It appears they are now capitalizing on the fears of the people regarding the pandemic. It was back in January that the hackers started using the coronavirus threat as a focus of an email campaign that infected users with malware, and now they are expanding their operations to coronavirus outbreak maps that follow the number of infections and deaths across the world. Many organizations are feeling the pressure from these attacks, such as John Hopkins University who created...

Posted on March 11, 2020 in Computer Security

APT Attack Spreads Malware Using Coronavirus Theme

APT Attack Spreads Malware Using Coronavirus Theme screenshot

The APT (Advanced Persistent Threat) group was spotted sending out spear-phishing emails that allegedly have detailed information about COVID-19, a.k.a. Coronavirus, but instead, they infect the victims with a custom remote access Trojan (RAT). The group is using the coronavirus pandemic to infect unsuspecting victims with a previously unseen malware. The malware is dubbed 'Vicious Panda' by researchers, with the attackers using it in a campaign at the moment. Researchers managed to find two Rich Text Format (RTF) files that were targeting the Mongolian public sector during the outbreak. Once the files are open, a unique and custom-made remote access Trojan is executed. It develops a list...

Posted on March 16, 2020 in Computer Security

Top 20 Countries Found to Have the Most Cybercrime

Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm, Symantec, has discovered specific factors that determine why a certain country is plagued with cybercrime more so or less than another which allowed them to come up with a ranking for each. Symantec has ranked 20 countries that face, or cause, the most cybercrime. In compiling such a list, Symantec was able to quantify software code that interferes with a computer's normal functions, rank zombie systems, and observe the number of websites that host phishing sites, which are designed to trick computer users into disclosing personal data or banking...

Posted on July 9, 2009 in Computer Security

Top 5 Popular Cybercrimes: How You Can Easily Prevent Them

Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles, the days of robbing banks in person are gone and now it all takes place behind a screen of a computer connected to the Internet. The Internet can be the most useful tool in business, school or every-day life. At the same time, the Internet can make someone's life a living hell in the event that one becomes the next victim of a cybercrime. A large percentage of the world's population that uses computers over the Internet are aware of cybercrime and the consequences that they may face if they succumb to a cybercriminals' trap. Others who have no clue as to the dangers they...

Posted on October 12, 2010 in Computer Security

AntiMalware

AntiMalware screenshot

A typical deceptive campaign is disguising harmful threats as legitimate security programs in order to steal money from inexperienced victims. AntiMalware is a particularly short-named version of this campaign, with clones with names such as Active Security and Total Security. AntiMalware uses an interface that is very similar to the Windows Defender and legitimate Microsoft security programs, to make the victim believe that AntiMalware is a legitimate anti-malware application. Observing AntiMalware's design, you will quickly spot authentic-looking Windows and Microsoft Security Essentials logos as well as a layout that may seem familiar to most users of legitimate Microsoft Security...

Posted on November 9, 2009 in Rogue Anti-Spyware Program

More Articles

Appearereque.club

The administrators of the Appearereque.club website use a tactic called 'Please Click Allow to Continue' to seize the Web browser notifications of their visitors. This is a trick that is used by numerous dodgy Web pages online. Once you open the Appearereque.club website, you will see a prompt asking you to click on the 'Allow' button. The Appearereque.club site would state that this is a necessary security check that every user needs to complete before they are granted access to the content of the page. This is not the truth. The security check is fake, and clicking the 'Allow' button will permit the Appearereque.club page to present you with notifications via your Web browser. The Appearereque.club site will not use this permission mindfully and will spam you with advertisements that may promote various overpriced services and...

Posted on July 8, 2020 in Browser Hijackers

Ytiesbortionrh.club

The Ytiesbortionrh.club website is an empty page whose goal is to hijack the Web browser notifications of its users. This online tactic is called 'Please Click Allow to Continue.' Numerous low-quality websites online utilize this simple con. If you open the Ytiesbortionrh.club website and attempt to browse the content it claims to host, you will see a prompt that will require you to click 'Allow.' This shady website will request that you have to prove that you are not a robot by clicking 'Allow' before you are granted access to the page. However, this is a bogus security check. If you follow the Ytiesbortionrh.club site's instructions, you will subscribe to the notifications of this dodgy Web page. The Ytiesbortionrh.club website will use your Web browser notifications to bombard you with unwanted advertisements. It is advisable to...

Posted on July 8, 2020 in Browser Hijackers

Findmedia.biz

Countless shady websites online run a low-level tactic called the 'Please Click Allow to Continue.' Typically, such websites do not host any content but would claim to do so to mislead users into visiting them. A perfect example of this is the Findmedia.biz website. You should not waste your time with this Web page, as it has nothing to offer you. If you launch the Findmedia.biz page, you will see a prompt at the top of your screen, which requests you to click 'Allow' immediately. The website will present users with a fake video player that will appear to be loading a video. The Findmedia.biz page will ask the user to click on the 'Allow' button to watch the video. However, there is no video to be viewed. Clicking 'Allow' will subscribe you to the Web browser notifications of the Findmedia.biz website. This will result in the...

Posted on July 8, 2020 in Browser Hijackers

Burstsearch.com

Burstsearch.com is the domain name of a basic search aggregator that does not appear to pose a threat to its users' data or safety. However, this basic search engine is not likely to provide you with the high-quality service that established search aggregators like Google, Yahoo and Bing can. Despite the fact that the Burstsearch.com search engine is not unsafe in any way, it is associated with multiple PUPs (Potentially Unwanted Programs). These PUPs would pose as useful tools that would enhance users' browsing quality, but their only goal is to promote the Burstsearch.com search engine. Usually, when the user installs a PUP of this type, the application would tamper with the user's settings and set up the Burstsearch.com website as their default new tab page to boost its traffic. If you are being redirected to the Burstsearch.com...

Posted on July 8, 2020 in Browser Hijackers

Medievable.com

The Medievable.com website has no content to offer its users despite its claims. Fake Web pages like the Medievable.com site would claim to host interesting content to trick users into browsing the promised content. However, computer users will be highly disappointed when they visit the Medievable.com page. The Medievable.com site runs a tactic known as 'Please Click Allow to Continue.' This is a simple trick that the administrators of numerous shady websites use. When the user opens the Medievable.com website, they will be asked to click on the 'Allow' button, which shows up at the top of their screen. The Medievable.com site will claim that clicking the 'Allow' button is necessary for the users to prove that they are not robots. This is a lie, and following the instructions of the Medievable.com website will lead you to permit the...

Posted on July 8, 2020 in Browser Hijackers

ScalableSkill

ScalableSkill is the name of a shady application that targets Mac computers exclusively. If you do not remember installing the ScalableSkill app on your Mac, it is likely because it may have come in a free software bundle or via a bogus installer. The goal of this dodgy utility is not to better your browsing quality but to help an affiliated search engine generate traffic. This is why once the ScalableSkill utility is installed on your Mac, you will notice that all your search queries are redirected to the 'Safe Finder' search aggregator. This search engine is associated with many PUPs (Potentially Unwanted Programs), just like the ScalableSkill application. The 'Safe Finder' search engine is not likely to offer you the high-quality service you may be used to as a Google, Bing, or Yahoo user. The ScalableSkill application gains...

Posted on July 8, 2020 in Mac Malware

ProductiveOperation

The ProductiveOperation application is a Mac utility that may market itself as a tool that will enhance your browsing quality. However, you can rest assured that the primary goal of the ProductiveOperation application is not to optimize your browsing quality but to promote an affiliated low-quality search aggregator. Once you install the ProductiveOperation app, you may notice that you are redirected to an unfamiliar website as soon as you open a new tab in your Web browser. The purpose of the ProductiveOperation application is to force users into using the 'Safe Finder' search engine every time they want to execute a search query online. This search aggregator is not likely to provide you with high-quality service. Unfortunately, it can prove to be rather tricky removing the ProductiveOperation application manually from your Mac and...

Posted on July 8, 2020 in Mac Malware

Zeromax Stealer

Zeromax Stealer is the name of a new hacking tool that is available for purchase on several online hacking forums. The Zeromax Stealer tool is offered as a malware-as-a-commodity to anyone who is willing to pay the asked price. Malware developers often take this approach instead of using their creations themselves. This is because this scheme allows them to generate cash from their hacking tools without engaging in illicit behavior, which helps them avoid having a target on their backs. The creators of the Zeromax Stealer are promoting this hacking tool as a utility that is designed to go after data related to online services that process payment transactions such as PayPal, eBay, Amazon, Booking, AirBNB, Expedia, etc. The Zeromax Stealer also appears to target various cryptocurrency wallets, as well as traditional financial...

Posted on July 8, 2020 in Trojans

Bmtf Ransomware

Bmtf Ransomware is a new file-encrypting Trojan discovered in the wild by malware analysts. After dissecting the Bmtf Ransomware, researchers found that this data-locker is a copy of the infamous Dharma Ransomware. Propagation and Encryption To make it more probable for the victim to consider paying a ransom fee, the Bmtf Ransomware is likely targeting a very expansive list of filetypes. This indicates that all .pdf, .doc, .docx, .txt, .ppt, .pptx, .xlsx, .xls, .mp3, .midi, .mid, .wav, .mp4, .mov, .webm, .mpeg, .jpg, jpeg, .svg, .gif, .png, .rar, .zip, .db, and various other filetypes will be encrypted by the Bmtf Ransomware securely, as soon as it compromises the targeted computer. When the Bmtf Ransomware encrypts a file, it will change its name. This file-locker appends a '.id-.[dfgkbtprz@aol.com].bmtf' extension to the newly...

Posted on July 8, 2020 in Ransomware

WastedLocker Ransomware Targets US Newspaper Company

WastedLocker Ransomware Targets US Newspaper Company screenshot

According to Symantec, the cybercriminals behind WastedLocker ransomware have begun targeting dozens of newspapers operated by a US media company. The attackers send phishing emails with fraud messages about software updates, aimed at employees of the newspapers. The emails contain the fake update SocGholish, which delivers malicious payloads. Symantec didn't name the newspapers or their parent company in the report. The attackers were going after the employee devices, looking to infect them, so they can compromise the corporate networks and install the WastedLocker ransomware, the report shares. Symantec warned the media company of what was going on, and the malicious code was removed...

Posted on July 8, 2020 in Computer Security

Rtionwritty.info

There are many useless, empty websites online that run a tactic known as 'Please Click Allow to Continue.' One of the countless sites that utilize this trick is the Rtionwritty.info page. If you try to view the content on the Rtionwritty.info website, you will be greeted by a prompt at the top of your screen. The prompt in question would ask you to press 'Allow.' This dodgy Web page would claim that you need to click on the 'Allow' button to prove that they are not robots. The Rtionwritty.info website will state that unless this 'security check' is completed, the user will not be allowed to access its content. However, if you follow the instructions of the Rtionwritty.info website, you will permit it to send you notifications via your Web browser. This will quickly become very tiresome because the Rtionwritty.info page will use this...

Posted on July 7, 2020 in Browser Hijackers

Calelderlyi.info

Calelderlyi.info is the domain name of a fraudulent, empty website that is not worth your time. This Web page is likely to market itself as a platform that hosts exciting content, but you can be sure that these claims are false. Once you open the Calelderlyi.info site, you will see a prompt that will urge you to click on the 'Allow' button that will appear on your screen. This shady website will claim that this is a necessary security test that you need to complete before you are granted access to the page's content. Unfortunately, this is a lie. This is not a security check, and you will not prove that you are a legitimate user by clicking 'Allow.' Instead, you will subscribe to the notifications of the Calelderlyi.info website automatically. Many legitimate websites use Web browser notifications mindfully, but rest assured that this...

Posted on July 7, 2020 in Browser Hijackers

Crimson Ransomware

Crimson Ransomware is the name of a file-locking Trojan that appears to be propagated alongside a threatening malware called STRRAT. Users who have fallen victim to the Crimson Ransomware should not worry too much as they can undo the impairment that has been done to their data rather easily. Luckily, the Crimson Ransomware creators are not highly-skilled as this is not a threat, which is capable of encrypting files. The Crimson Ransomware does not encrypt any data – instead, it simply appends the '.crimson' extension to the names of the affected files. This means that the Crimson Ransomware users' systems have been compromised can simply remove the '.crimson' extension from the names of their files and they will be back to normal. However, despite the fact that the Crimson Ransomware is not a very harmful threat, it is important to...

Posted on July 7, 2020 in Ransomware

Fakesky Malware

The Fakesky Malware is a threat that targets Android devices, and which security analysts first identified over three years ago – in 2017. Initially, the activity of the Fakesky Malware was focused on users located in Japan and South Korea. However, over time, the Fakesky Malware campaigns expanded and began targeting users from all around the globe. Cybersecurity researchers have identified copies of the Fakesky Malware in the United States, Germany, Switzerland, France, Taiwan, China and more. It would appear that the Fakesky Malware is being distributed via bogus copies of popular applications hosted on dodgy platforms, as well as fake text messages. When the Fakesky Malware compromises the targeted Android device, it will begin the attack by distributing phishing text messages to every individual who is immediately present on the...

Posted on July 7, 2020 in Malware

Triada Android Trojan

The Triada Android Trojan is a malware that first appeared back in 2016. Soon after it first emerged, the Triada Android Trojan was spotted on devices produced by a long list of Chinese phone brands. Among the brands in question are iLife, Prestigio, Leagoo and Mito. So far, malware researchers have not been able to determine whether the mobile devices' manufacturers were aware of the presence of the Triada Android Trojan. This is an exceptionally threatening infection vector as the majority of users would never suspect that their brand-new device has a Trojan installed on it before they ever got to use it. Initially, the Triada Android Trojan may not be able to cause a lot of harm. This is because the default modules of the Triada Android Trojan would only allow it to obtain information regarding the compromised device's hardware and...

Posted on July 7, 2020 in Trojans
1 2 3 4 5 6 7 8 9 10 11 1,467