Virus and Spyware Removal Guides, uninstall instructions Redirect redirect removal instructions

What is

Encrypted Search is a browser hijacker, advertised as a web searching tool with reinforced privacy measures. It is supposedly capable of encrypting search queries, traces of which it deletes after thirty minutes of inactivity. This hijacking application modifies browsers and promotes its fake search engine ( Additionally, it monitors users' browsing activity and gathers information wrangled from it. Most users install this rogue app inadvertently, therefore it is classified as a PUA (potentially unwanted application). It is noteworthy, that Encrypted Search is often installed alongside other browser hijackers or is otherwise promoted by them.

Ebola Ransomware

Ebola ransomware removal instructions

What is Ebola?

Ebola is the name of a malicious software that is categorized as ransomware. It belongs to the Dharma ransomware family and was discovered by Jakub Kroustek. Ebola renames all files by adding ID number, email address and the ".ebola" extension to their filenames. For example, it renames "1.jpg" to "[].ebola", and so on. Ebola displays a ransom note in a pop-up window and creates a text file named "FILES ENCRYPTED.txt".

Domn Ransomware

Domn ransomware removal instructions

What is Domn?

The person who discovered Domn ransomware is Michael Gillespie, this malicious program is a part of the Djvu ransomware family. Like most programs of this type, Domn is designed to prevent victims from accessing their data by encrypting them with a strong encryption algorithm. To be able to use their files again, victims are forced to purchase a decryption tool and key. Domn appoints a new extension to every encrypted file, it renames all files by adding the ".domn" extension to their filenames. For example, Domn renames a file named "1.jpg" to "1.jpg.domn" and so on. It also creates a ransom note, the "_readme.txt" file.

IOByte System Care Unwanted Application

IOByte System Care removal instructions

What is IOByte System Care?

IOByte System Care is a software that is advertised as a system optimizer: it supposed to clean systems, fix errors, uninstall unwanted programs and remove threats (malicious software). However, its developers distribute it using questionable methods. They include it in setups of other software, most people download and install programs of this kind unintentionally. For this reason IOByte System Care is categorized as potentially unwanted application (PUA).

Transcoal Pacific Email Virus

"Transcoal Pacific Email Virus" removal guide

What is "Transcoal Pacific Email Virus"?

"Transcoal Pacific Email Virus" is a spam campaign, used to proliferate the LokiBot malware. One of spreading methods for such malicious software are large scale email spam campaigns. These emails contain executable files (or similar attachments), which download and install specific malware. It should be known, that email letters of this kind are often marked as important, urgent, starred or otherwise highlighted as top priority mail. It is not recommended to open suspicious emails and it is expressly advised against opening any attachments and/or web links found therein. The "Transcoal Pacific Email Virus" spam campaign was discovered by My Online Security.

RSA Ransomware

RSA ransomware removal instructions

What is RSA?

RSA malware was discovered by Jakub Kroustek, it is a part of Dharma ransomware family. Software of this type is usually designed to encrypt files so that victims could not use them unless they pay a ransom (purchase a decryption tool from cyber criminals). This particular ransomware renames encrypted files by adding a personal ID, email address and the ".RSA" extension to their filenames. For example, it renames "1.jpg" to "[].RSA", and so on. It also creates/displays ransom notes: the "FILES ENCRYPTED.txt" text file and a pop-up window.

SourceAdd Adware (Mac)

How to remove SourceAdd from Mac?

What is SourceAdd?

SourceAdd is the name of an app that supposed to make Internet browsing easier. Nevertheless, it is classified as adware. Adware-type apps are designed to display intrusive, unwanted ads. In some cases they gather various details about their users too. Either way, most users download and install apps of this type accidentally, for this reason SourceAdd is known as potentially unwanted application (PUA).

Earth & Satellite View Browser Hijacker

Earth & Satellite View browser hijacker removal instructions

What is Earth & Satellite View?

Earth & Satellite View is a browser hijacker, endorsed as a tool pack, containing quick access to maps and a web searcher ( It is supposedly designed to provide easy access to various maps, driving directions and local traffic data. In all actuality, it changes browser settings to promote the aforementioned fake search engine - Earth & Satellite View also spies on users' browsing activities, thereby gathering their personal information. Since most users install this rogue app onto their systems inadvertently, it is classified as a PUA (potentially unwanted application). POP-UP Scam (Mac)

How to avoid redirects to safari-protection[.]com?

What is safari-protection[.]com?

Safari-protection[.]com is an address of a website which should not be trusted. This deceptive page encourages visitors to download Net Shield application which supposed to protect users from having personal data stolen through malicious ads. We do not recommend to download applications that are advertised through (or on) deceptive websites. Besides, people do not visit websites like safari-protection[.]com intentionally, usually they are being redirected to them by potentially unwanted apps (PUAs) that are installed on their browsers or operating systems. Ads

Solo85[.]biz redirect removal instructions

What is solo85[.]biz?

Like, and thousands of others, solo85[.]biz is a rogue site. It is designed to feed visitors unreliable content and to generate redirects to likewise untrustworthy websites. In most cases, visitors to solo85[.]biz do not access it willingly; they either get redirected by intrusive ads (typically hosted by compromised sites) or by having it force-opened by PUAs (potentially unwanted applications). It should be noted, that these undesirable apps are not bound by explicit user permission, therefore they can infiltrate devices without user consent and/or knowledge. Aside from causing redirects, PUAs are also capable of running invasive advertisement campaigns and some can gather data.


Page 5 of 799

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global virus and spyware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal