News

Researchers Discover Massive DarkHotel Operation

The state-sponsored group DarkHotel has been an active thorn in the side of security firms since 2007, not to mention the victims of the group. The group has gone by many names, however, it has been much of the work done by Kaspersky Labs in analyzing the group’s activity that has led to DarkHotel sticking. Now, it would appear that the group has been conducting a massive hacking operation targeting Chinese government agencies across the globe. It is believed attacks began in March, looking to leverage the COVID-19 pandemic as a means to lure victims. Since the pandemic became a global emergency, hackers of all kinds, whether script-kiddies to advanced persistent threat (APT) groups have looked to take advantage of people’s fears regarding the disease. This trend is likely to continue as long as the pandemic rages across borders. The latest campaign was discovered by Chinese security firm Qihoo 360, who subsequen...

LightSpy Targeting iOS Devices

Since January 2020, various security firms have...

Zeus Sphinx Re-emerges on the Back of COVID-19

It is not by any means new to say that hackers ...

BadUSB Attack Targets US Hospitality Provider

When covering malware incidents it is exceeding...

Top Removal Guides

Search.yahoo.com Redirect

Search.yahoo.com is a popular website that can be used as the browser homepage or default Internet search engine. Recently, there is a rise in ...

Deceptive Calendar Events Virus (Mac)

There are various questionable websites that contain deceptive advertisements, ask for a permission to show notifica...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

Search Power+ Browser Hijacker

Search Power+ is a potentially unwanted application (PUA), a browser hijacker. It hijacks a browser by changing certain browsers settings to searchpowerapp.com, address of a fake search engine. Quite often apps of this type collect various information too. Browser hijackers are categorized as PUAs because users tend to download and install them unknowingly (inadvertently). Search Power+ promotes its fake search engine by setting searchpowerapp.com as an address of a default search engine, homepage and new tab. It means that users who installed Search Power+ on their browsers are forced to visit searchpowerapp.com when they open a browser, new tab and/or enter search queries into URL bar. In most cases browser hijackers do not allow users to undo, modify settings that were assigned by them as long as they are installed. It means that a hijacked browser can be stopped from opening a certain address (fake s...

Eventbot Banking Trojan (Android)

Eventbot is the name of a banking Trojan wh...

Pekraut RAT

Pekraut is a piece of malicious software, c...

Mpaj Ransomware

Mpaj is malicious software which belongs to...

Top Antispyware

SpyHunter 5

Overview: Simply put a rootkit is a program or, more often, a collection of software tools that gives the hacker remote access to and control ov...

Malwarebytes 4.0

There are two versions of Malwarebytes 4.0 - Free and Premium. Although the Free version is capable of removing existing malware, the Premium del...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Appearance of Combo Cleaner: Antivirus and System Optimizer: Today, security researchers see a rise in adware targeted at Mac computers. While...

ESET NOD32 Antivirus 2020

Appearance of ESET NOD32 Antivirus 2020: Product Range Like many of ESET’s competitors, the company offers numerous tiers within its product ...

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal

Stay in touch with PCrisk