Virus and Spyware Removal Guides, uninstall instructions

ProntoApp Virus (Mac)

How to remove ProntoApp from Mac?

What is ProntoApp?

ProntoApp is a rogue adware-type application that performs a variety of malicious actions on the infected machines. On initial inspection, ProntoApp doesn't seem like a suspicious/harmful application. However, keep in mind that it usually infiltrates computers without user's consent. Moreover, it can easily cause various redirects, deliver intrusive advertisements, modify various options, slow down the entire system and cause a number of other problems.

   
Apple.com-shield.live POP-UP (Mac)

How to remove apple.com-shield[.]live from Mac?

What is apple.com-shield[.]live?

The apple.com-shield[.]live website is designed to promote an app called Cleanup My Mac. This app can supposedly remove viruses detected by the associated website (apple.com-shield[.]live), however, this deceptive site displays a fake virus alert to trick people into believing that their computers are infected, when in fact they are not. Do not trust apps that are promoted through such web pages, since they are often opened by potentially unwanted apps (PUAs) that are already installed on the system.

   
Safari Redirect Virus (Mac)

How to remove Safari Redirect Virus browser hijacker from Mac?

What is Safari Redirect Virus?

Rogue applications that are categorized as browser hijackers and modify Safari browser settings have a generic name: "Safari Redirect Virus". When installed, browser-hijacking apps change settings of the affected browser and record various information (usually browsing-related). Typically, people install these apps inadvertently.

   
JSWRM Ransomware

JSWRM ransomware removal instructions

What is JSWRM?

JSWRM is yet another high-risk ransomware discovered by GrujaRS. Following successful infiltration, JSWRM encrypts most of stored data and appends filenames with victim's unique ID, developers' email address, and ".JSWRM" extension. For instance, encrypted "sample.jpg" would be renamed to something like "sample.jpg.[ID-EJ6BQNB][symmetries@tutamail.com].JSWRM". Once data is encrypted, JSWRM generates an html application ("JSWRM-DECRYPT.hta") and drops it on victim's desktop. This application shows a pop-up window that delivers a ransom-demanding message.

   
Search.epolife.com Redirect (Mac)

How to remove search.epolife.com browser hijacker from Mac?

What is search.epolife.com?

Search.epolife.com is a fake Internet search engine identical to search.jakecares.com, search.javeview.com, and many others. On initial inspection, this dubious site may seem legitimate, however, be aware that this site gathers various information about your web browsing activity. Furthermore, developers promote this site via rogue application 'installers' that stealthily modify Internet browser settings.

   
MediaDownloader Adware (PC)

MediaDownloader removal instructions

What is MediaDownloader?

MediaDownloader is a rogue application that falsely claims to allow download and conversion of various media files. On initial inspection, MediaDownloader may appear legitimate and useful, however, this app is categorized as adware (advertising malware) and a potentially unwanted program (PUP). There are three main reasons for these negative associations: 1) stealth installation without users' consent; 2) display of malvertising ads, and; 3) information recording.

   
Ave Maria Trojan

Ave Maria virus removal guide

What is Ave Maria?

Ave Maria is high-risk trojan designed to steal various information and to cause "chain infections" (spread other infections). It is typically proliferated using various spam email campaigns. Criminals send thousands of deceptive emails that contain infectious attachments, most of which are Microsoft Office (typically Excel) files. Emails are delivered with messages encouraging users to open the attached document, however, this results in infiltration of Ave Maria.

   
Pox Ransomware

Pox ransomware removal instructions

What is Pox?

Pox is yet another high-risk ransomware discovered by GrujaRS. As with most of these infections, Pox stealthily infiltrates computers and encrypts most of stored files, thereby making them unusable. While doing so, Pox adds ".Pox" extension to each filename (e.g., "1.jpg" is renamed to "1.jpg.Pox"). In addition, Pox creates a text file named "HOW TO DECRYPT FILES.txt" and drops a copy in every existing folder.

   
Godes Ransomware

Godes ransomware removal instructions

What is Godes?

Belonging to Djvu ransomware family, Godes is a high-risk infection discovered by Michael Gillespie. After successful infiltration, Godes encrypts most of stored files and appends filenames with ".godes" extension. E.g., "sample.jpg" would be renamed to "sample.jpg.godes" and so on so forth. Following successful infiltration, Godes generates a text file ("_readme.txt") and drops a copy in every existing folder.

   
Wacatac Trojan

Wacatac virus removal guide

What is Wacatac?

Wacatac (also known as Trojan:Win32/Wacatac ) is a trojan-type infection that stealthily infiltrates computers and performs a variety of malicious actions. Cyber criminals typically proliferate this malware by using email spam campaigns and fake software cracks.

   

Page 4 of 755

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global virus and spyware activity level today:

Medium threat activity
Medium

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal