Threat Database

Every day new computer threats threaten and harm computers around the world. Many computer threats including viruses, adware, trojans, rogue anti-spyware programs and other malware can be installed onto your computer without your knowledge, potentially damaging files on your hard drive. Our threat database provides you with detailed threat analysis on different types of computer threats to help you understand how to remove and avoid them.

Our threat database is updated on a continual basis to provide our users with information specific to threats affecting their computer. Each day our threat research team analyzes data from a wide array of threat types. Here computer users are able to decipher types of well-known threats as well as new and emerging harmful software. The information on the threat database provides data to detect and remove all known types of malware threats.

Най-актуалният зловреден софтуер през последните 2 седмици

Име на заплахата Ниво на заплаха Псевдоним Брой откривания Дата
LQQW Ransomware Неприложимо N/A September 2, 2021
Zeppelin Ransomware Неприложимо N/A August 6, 2021
Payfast Ransomware Неприложимо N/A August 6, 2021
CLEAN Ransomware Неприложимо N/A August 11, 2021

Как можете да откриете Threat Database? Проверете за Threat Database със SpyHunter!

SpyHunter е мощен инструмент за отстраняване и защита на зловреден софтуер, предназначен да помогне на потребителите да получат задълбочен анализ на сигурността на системата, откриване и премахване на широк спектър от заплахи като Threat Database, както и индивидуална услуга за техническа поддръжка.

* Безплатният Remover ви позволява, при условие на 48-часов период на изчакване, едно отстраняване и премахване за намерени резултати. Прочетете нашите EULA , Политика за поверителност, Политика за бисквитки и Специални условия за отстъпки . Вижте още подробности за безплатното премахване на SpyHunter.

Категории на заплахи

Ние непрекъснато събираме и анализираме данни, за да откриваме нововъзникващите тенденции при нови заплахи за злонамерен софтуер. Потърсете различните видове заплахи, предоставени по-долу, за да идентифицирате и проучите конкретна заплаха, която може да зарази компютъра ви.

В момента в базата данни на заплахите са изброени 27,964 заплахи.

Тип заплаха Описание на заплахата
Advanced Persistent Threat (APT) An Advanced Persistent Threat (APT) is a computer threat actor, most often operated or sponsored by nation-states. The aim of these groups aims at unauthorized access to computer networks for extended periods. The term may also be used...
Adware What is adware and is it malicious? Adware is usually associated with a pop-up or pop-under advertisements but can also secondarily perform other free services. The problem with most adware tools is the hidden intent or behaviors,...
AOL Parasites AOL Parasites To talk about AOL parasites, we have to cover the program those infections affect first. AOL stands for America Online, which is a web portal and online service provider. It was acquired by Verizon Communications in...
Backdoors A backdoor (also known as a trap door or wormhole) in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext while attempting to remain undetected. Backdoors...
Banking Trojan What Is a Banking Trojan? A banking trojan is a type of trojan infection that comes with a specific function. Just like any other trojan out there, it pretends to be something it is not in order to get into the target system....
Botnets If you use a computer and have access to the Internet, chances are high you've heard of a bot or botnet, but do you really know what each means and what they do? First of all, bot is a term that is short for robot. No, tiny robots (well,...
Browser Helper Object What is a Browser Helper Object? A Browser Helper Object (or BHO) is a type of plug-in that works on the Internet Explorer browser. It is a DLL module or an independent part of a program that can perform an individual function. The...
Browser Hijackers What Is a Browser Hijacker? A browser hijacker is a type of unwanted and usually malicious software that enters target computers and modifies default browser settings. These programs balance on the borderline between legitimate and...
Browser Plugins What Is a Plugin? A plugin is a piece of software that adds a particular feature to a program, thus expanding its functions and abilities. If a program supports plugins, it means you can customize it. The term plugin might be...
Cookies Computer cookies are used to personalize your online experience. Despite their benign name and useful purpose, however, cookies tend to cause security concerns among some Internet users, which is mainly due to the way they function. Many...
Crack/Activator bad A crack or an activator refers to any piece of software that is used to illegally activate another application. Normally, when users want to use a program, they have to buy a license and then activate the program with the activation key...
Cracks Software cracking is the modification of software to remove protection methods: copy protection, trial/demo version, serial numbers, hardware key, date checks, CD check, or software annoyances like nag screens and adware. Protection...
Dialers Do you use a dial-up modem to connect to the Internet? If so, you might be subject to dialer fraud. Users often forget that anyone could become a victim of cyber fraud, and dialers are still a thing in areas that predominantly employ...
Fake Error Messages What Is a Fake Error Message? A fake error message is not a genuine malware threat by itself. It is more like a gateway to a bigger problem provided the targeted user takes action prompted by the message. There are several ways to...
Fake Warning Messages All computer messages or prompts are meant to get your undivided attention and are usually only a prelude. Whether notifying you of an update or alerting you of an intrusion, a message box screams, “ Stop! Look! Act!” Fake alerts...
Flooders What Is a Flooder? Flooders are computer programs that are used to flood network channels with (often) useless messages, thus making the network itself ineffective. Technically, there are two types of network flooding in general....
Keyloggers What is a Keylogger? A keylogger is a software or a hardware tool that is used for keystroke logging. This practice refers to an action when every single key struck on a keyboard is recorded in secret. Usually, the person being...
Mac Malware Mac Malware is a type of threat that effectively attacks an Apple Mac computer. Contrary to what many computer users think or have believed for many years, Mac computers are susceptible to malware threats and attacks. In fact, from our...
Mail Bombers Mail bombing is a specific cybercrime technique that allows hackers to clog the target’s inbox with tons of spam email messages. The term does not refer to a separate malware category. Different types of security threats could be used...
Malicious Websites Malicious websites as a category are rather self-explanatory. It refers to websites that are, simply speaking, bad. And every user should know that visiting such websites is not a good idea. Unfortunately, users are often unaware when...
Malware Malicious software, or malware, is software specifically designed to operate on a system without the knowledge of the user or their consent. Malware comes in many shapes and forms, but it is mostly aimed at either collecting information...
Mobile Malware Mobile malware refers to types of security threats that affect mobile devices. It does not matter whether you have an Android or an Apple device; both can be susceptible to potential security risks. The rise of mobile malware is...
Network Management Tools Network management software is not a direct cybersecurity threat. In fact, it is usually legitimate software employed by businesses and corporations to monitor their network traffic and to optimize their IT sector. However, from a...
Nukers Nukers may refer to two things: either the program that “nukes” a device or a hacker who performs the “nuking.” As it is obvious from the name, “nuking” is a dangerous occurrence that can put the entire system to a halt. Luckily, it is...
Phishing Phishing (pronounced 'fishing') is an online attack strategy used by cybercriminals to deceptively gather or collect data. Stolen data could then be used to breach the security of online accounts, hack into websites, or aid in targeted...
POS Malware Point of Sale Malware (POS Malware).
Potentially Unwanted Programs What is a Potentially Unwanted Application? A Potentially Unwanted Application or a Program (PUP) is a type of software that is unwanted even if the user agreed to download it. This category falls into a gray zone of malware...
Ransomware Ransomware is a type of malware that generally prevents its victims from using their computer and accessing data, then demands some form of monetary ransom to allegedly restore access. Ransomware rose to prominence around 2005 and had...
Remote Administration Tools RAT stands for a remote administration tool. It may also mean remote access tool or remote access trojan, especially in the context of a malware infection. A remote administration tool refers to software that can remotely take full or...
Rogue Anti-Spyware Program Rogue anti-spyware (or rogue security software) is an application that uses malware or malicious tools to advertise or install itself or to force computer users to pay for removal of nonexistent infections. Rogue anti-spyware will often...
Rogue Anti-Virus Program A rogue anti-virus program is a type of computer parasite not unlike that of a Trojan horse virus. Rogue anti-virus programs are typically installed onto your computer system due to web-surfing activities and the acceptance of...
Rogue Defragmenter Program Like a car, a computer too needs regular maintenance to keep it running at peak performance. There are many reasons why a computer may become sluggish and not all are due to malware being present. One reason could be disk fragmentation....
Rogue Registry Cleaner Rogue registry cleaners deceive you into thinking they are capable of fixing and cleaning your computer’s registry. Rogue Registry Cleaners use misleading security alerts and bogus registry scans as a method to get you to purchase the...
Rogue Websites Cybercrime is a billion dollar business and those involved will practically do anything to lure new victims into their web of deceit, including exploit legitimate business practices. Cybercriminals set up fake or rogue websites to...
Rootkits A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a computer system has been compromised. Contrary to what its name implies a rootkit does not grant you...
Sniffers What Is a Sniffer? A sniffer is a tool that can intercept and log Internet traffic. It can be either software or hardware-based, and it has many other names, including packet analyzer, packet sniffer, or protocol analyzer. The reason...
Spam What is Spam and who is behind it? First of all, we are not referencing the mystery meat jellied in a can, but rather unwanted electronic mail and messaging polluting the Internet. Spam is the electronic version of junk mail sent...
Spyware What is Spyware? Spyware is one of the most common types of malware that plague both computer and mobile users alike. Due to its overwhelming presence, spyware apps are often called “viruses,” but that is not an accurate...
Stealers A stealer is a type of  Trojan , and its purpose is quite self-explanatory. The program is designed to steal important data. There are several ways to achieve that, but a stealer could employ keylogging for that as well. If that is...
Tracking Cookie What is a cookie? An HTTP cookie is a small piece of text data that is stored on a personal computer or a mobile device by the web browser. This small piece of data is there to help the browser remember information about the user....
Trojan Downloader A Trojan downloader is usually a standalone program that attempts to secretly download and run other files from remote web and ftp sites. Typically Trojan downloaders download a numerous variety of Trojans and backdoors and activate them...
Trojans The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These...
Viruses A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also commonly but erroneously used to refer to other types of adware, malware and...
Vulnerability In computing, vulnerability refers to a weakness that can be exploited to cause damage to a system. To use technical lingo, a vulnerability can also be called the attack surface. In a way, it is like a poorly guarded door that can be...
Worms What Is a Computer Worm? A computer worm is a type of malware infection designed to  deliver a malicious payload  to a target machine. Unlike viruses, which require an infected host file to spread, a computer worm is a standalone...

Търсене по буква:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9