Threat Database Adware WindowsMegabyte

WindowsMegabyte

Mac users should be on the lookout for a new dubious application named WindowsMegabyte. It presents itself as a useful tool but in reality, it is yet another PUP (Potentially Unwanted Program) equipped with both adware and browser hijacker functionality. Exactly like most PUPs, it also is spread via questionable methods designed to keep its installation away from the user's attention. That is why users should always be careful when installing programs from unfamiliar sources. Make sure to check the 'Advanced' or 'Custome' installation settings because that is where most PUPs are included as preselected choices as part of a bundling scheme.

Functionality

Once deployed on the Mac, WindowsMegabyte's presence would be felt almost immediately. The application will begin generating numerous intrusive advertisements that could affect the browsing experience significantly. They may overlay the viewed content or even be injected into unrelated websites. Furthermore, the advertisements could take users to shady locations via forced redirects. It is not uncommon for the advertisements to lead to online tactics, phishing pages trying to collect sensitive information and more.

Mac users also will notice that their Web browsers are behaving strangely. Instead of the usual homepage, new tab page, or default search engine, the browsers are now opening an unfamiliar Web address, typically a fake search engine. This is a common consequence of having a browser hijacker installed on the device. The promoted fake engines cannot deliver results on their own. In most cases, they will take the entered search query and redirect it through a legitimate engine such as Yahoo, Bing, or Google.

More PUP-Related Risks

Most PUPs have another intrusive capability - while installed on the Mac they might be spying on the user's browsing activities. It is not uncommon for intruder applications to track the visited websites, conducted searches and clicked URLs. The data is then transmitted to their operators. Certain device details also may be included in the harvested information.

Trending

Most Viewed

Loading...