Tag - remove

Ransomware

Eking Virus

*Source of claim SH can remove it. Eking Eking is recognized as a ransomware cryptovirus and is mainly distributed via spam messages, malicious email attachments, cracked software installers and malvertisements. The creators of Eking use it to...

Mobile Threats

Fireblocker App

Fireblocker Fireblocker is an aggressive ad-displaying application that hijacks the browsers of iPhone devices and forces them to cause page redirects to certain promoted sites. Fireblocker gets installed in users’ smartphones by getting distributed...

Ransomware

Koti Virus

Koti Koti is what is identified by cyber security experts as a file-encrypting ransomware variant. This means that Koti applies encryption on the files of its victims to make them inaccessible. The idea here basically revolves around a classic...

Mac Virus

Pwz2 Virus Mac

  Pwz2 Pwz2 is a browser hijacker compatible with Mac browsers that takes control of the affected browser’s settings without permission from the user. Pwz2 is primarily used as a site-promoting tool that forces page redirects in the browser in...

Mac Virus

Optimal Promo Mac

Optimal Promo Optimal Promo is a page-redirecting Mac extension that is aimed at popularizing certain sites from within your browser, regardless of whether you are okay with that. Optimal Promo will ceaselessly keep opening new tabs or redirecting...

Trojan

Valak Malware

Valak Valak is a malicious piece of software that accesses computers through disguise and launches harmful processes and tasks in the background of the system. Security experts recognize Valak as a Trojan horse and highly recommend users remove it...

Browser Hijacker

Igcritic Virus

Igcritic Igcritic is a browser hijacker application that can bother some web users with the generation of unwanted on-screen ads. Typically, Igcritic can integrate with the main web browser and display different pop-up ads, banners and redirect...

Browser Hijacker

Ppcorn Virus

Ppcorn Ppcorn is a potentially unwanted piece of software that has been built to run online advertising campaigns and to generate income for its developers. Ppcorn may fill the screen of your browser with sponsored pop-up ads and banners, and...

Trojan

Drive by Exploit

Drive by Exploit The Drive by Exploit is an example of an email spam campaign aimed at threatening the email recipients about a supposed account breach. The Drive by Exploit email campaign is also known as a sextortion email scam. The perpetrators...

Mac Virus

DocToPdf Mac

DocToPdf DocToPdf is a browser hijacking application that may change the URL of your browser’s homepage or substitute your default search engine with a new one. Furthermore, DocToPdf may spam your screen with hundreds of pay-per-click ads and might...