EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
|Threat Level:||50 % (Medium)|
|First Seen:||January 6, 2012|
|Last Seen:||September 18, 2023|
Most browser extensions are created with the goal to provide features that are absent from the user's default Web browsers. Unfortunately, Search1.me is not that type of browser extension. Instead, its main function is that of a browser hijacker. The application is designed to take over certain important browser settings (homepage, new tab page, default search engine) to generate traffic towards a promoted search engine.
Search1.me sets the browser's settings to open a fake search engine. This means that users cannot be sure of the quality of the displayed results. Fake engines may simply redirect to a legitimate engine and let it generate the search results. However, it is also possible that the user's search query will be taken through several dubious pages resulting in a list of low-quality links that could have numerous ads injected into it.
Browser hijackers and fake search engines also may have data-tracking capabilities. Users risk having their browsing activities spied upon and transmitted to the operators of the specific intruder application. The acquired data can be abused as part of various questionable activities or even sold to third parties.
Search1.me may call the following URLs: