Virus and Spyware Removal Guides, uninstall instructions

Mac Tonic Unwanted Application (Mac)

What is Mac Tonic?

Mac Tonic is a deceptive application similar to Mac Auto Fixer, Advanced Mac Cleaner, Mac Mechanic, MacOptimizer, and a number of other rogue apps.

By offering system optimization and malware removal functionality, Mac Tonic attempts to give the impression of legitimacy. In fact, this app is a potentially unwanted application (PUA) that infiltrates systems without users’ permission.

   
Identies.com POP-UP Redirect

What is identies.com?

identies.com is one of many rogue sites that is identical to thepopularlinks.com, contentplaces.com, and rosetheet.com One of the main purposes of this site is to redirect users to other suspicious/dubious websites. Many users visit the identies.com inadvertently - they are redirected by potentially unwanted programs (PUPs) that are installed without consent.

Most potentially unwanted programs cause redirects to untrustworthy websites, provide intrusive ads, record user-system information, and sometimes run background processes.

   
Redirectoptimizer.com POP-UP Redirect

What is redirectoptimizer.com?

There are many rogue sites on the Internet such as redirectoptimizer.com (which is identical to adskpak.com, deloton.com, and smartoffer.site).

All cause redirects to other untrustworthy/dubious websites. Many users visit rogue sites such as redirectoptimizer.com inadvertently - they are redirected by potentially unwanted programs (PUPs) that infiltrate systems without permission. PUPs also collect information, run various background processes, and deploy intrusive ads.

   
Ninjagod.com POP-UP Redirect

What is ninjagod.com?

ninjagod.com is a rogue website identical to primosearch.com, trackingclick.com, thepopularlinks.com, and many others. The site designed to redirect to other suspicious/untrustworthy sites.

Many users often visit it inadvertently - they are redirected by potentially unwanted programs (PUPs) that infiltrate systems without permission. PUPs deliver intrusive advertisements and gather (and record) information.

   
Netoffersonline.info POP-UP Redirect

What is netoffersonline.info?

netoffersonline.info is one of many rogue websites available on the Internet and identical to billmscurlrev.com, celeryleek.com, thesterminator.com, etc.

The website is designed to redirect users to various other rogue sites. In most cases, users visit netoffersonline.info unintentionally - they are redirected by potentially unwanted programs (PUPs) that infiltrate systems without consent. PUPs provide intrusive ads, run unwanted processes, and record sensitive data.

   
Mobiprofit.com POP-UP Redirect

What is mobiprofit.com?

mobiprofit.com is another rogue website that redirects users to other suspicious websites and is identical to deloton.com, contentplaces.com, thepopularlinks.com, and many others. 

Most users are redirected to mobiprofit.com by potentially unwanted programs (PUPs) that are stealthily installed - often without consent. PUPs cause redirects, but also collect information about users and provide intrusive ads.

   
Letstosite.net POP-UP Redirect

What is letstosite.net?

The letstosite.net rogue website is identical to many others of this type (including dealclicks.us, nametraff.com, and rosetheet.com). 

They all redirect users to other untrustworthy websites. Many users visit letstosite.net inadvertently - they are redirected by potentially unwanted programs (PUPs) that often infiltrate systems without permission. Furthermore, PUPs provide various intrusive ads (coupons, banners, and so on) and record sensitive information.

   
Cryptes Ransomware

What is Cryptes?

Discovered by malware security researcher Michael Gillespie, Cryptes is ransomware-type malware that stealthily infiltrates the system and encrypts most files. In doing so, it appends filenames with the ".crypted" extension (e.g., "sample.jpg" is renamed to "sample.jpg.cryptes").

Encrypted files immediately become unusable. Following successful encryption, Cryptes creates a text file ("HOW TO DECRYPT ALL MY FILES.txt"), placing a copy in all existing folders.

   
Like Ransomware

What is Like?

First discovered by malware security researcher, Michael Gillespie, Like is a ransomware-type virus that stealthily infiltrates the system and encrypts most stored files.

During encryption, this virus appends filenames with the ".like" extension (for example, "sample.jpg" is renamed to "sample.jpg.like"). Once data is encrypted, using it becomes impossible. Like is also designed to generate a text file ("infoinfo.txt") and places a copy in every existing folder.

   
View Adware

What is View?

View is an updated version of an adware-type application called Save Serp Now. As with Save Serp Now, this application is also likely to infiltrate systems without users’ permission. Furthermore, its behavior barely differs - it gathers information and delivers intrusive advertisements.

Therefore, as with Save Serp Now, View is categorized as adware and a potentially unwanted application (PUA).

   

Page 1639 of 2174

<< Start < Prev 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal