is classified as a fake search engine. There are countless similar fake engines out there and they all lack the most basic functionality of a search engine - producing meaningful search results. Instead, they hijack the user's search queries and redirect them to a legitimate engine such as Yahoo, Bing or Google. Understandably, not many users would be willing to continually use a fake search engine. This is where applications known as browser hijackers come in. 

By relying on deceptive distribution methods, browser hijackers hide their installation process from the attention of the user. Two of the most common techniques are hiding inside a fake installer/updater for another product or being included as a preselected choice in the installation process of a more popular freeware program. 

No matter how a browser hijacker managed to sneak itself onto the user's system, it will proceed to take over specific browser settings such as the homepage, new tab page, and the default search engine immediately. As a result, whenever users simply start the affected browser, open a new blank browser window, or initiate a search in the URL bar, they would immediately be taken to the promoted address, in this case. 

Typically, browser hijackers are also equipped with data harvesting functionality. Various details concerning the user's browsing habits could be tracked and then uploaded to a remote server. The collected information usually contains all conducted searches, opened websites, clicked URLs, etc. Specific device details such as IP address, ISP, and geolocation also could be logged. The gathered data could then potentially be sold by the creators of the fake search engine to third parties.


Most Viewed