Adware
Adware is a kind of software which always pops up annoy advertisements on users’ computer and secretly collect personal information such as online shopping data, bank account without their knowledge and permission. Most of the time, Adware also will redirect search results to other advertising website which probably contains malicious links to lure users into clicking on them. Adware is designed to display different types of advertisements on the computer. It is not so easy to avoid adware installing on the operating system if you frequently download and install applications from the Internet. Once the Adware has been installed on the computer, it would slow down the PC performance and give you a large number of advertisement whatever website you would like to visit. Adware not only infect Windows system but also will be installed on Mac OS X system.
Read More
Typical Adware Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Browser Hijacker
Browser hijacker is a type of malicious malware program which is designed to redirect users to the risky website without their permission. Usually, the website are full of scam and tricks to mislead the victims to proceed further activities so that the cyber criminals can steal user's personal information. Obviously, the web browsers are hijacked by the hackers. Once the computer is infected by browser hijackers, users will find that the default home page of the browsers have been modified maliciously. A browser hijacker may also be installed without user permission, as the result of an infected e-mail, a file share, or a drive-by download.
Read More
Typical Browser Hijacker Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Misleading Application
The most typical phenomenon of misleading application is that they will give users fake report alarming them there are a large amounts of security risks and potential threats hidden on the computer. Misleading applications will scan the whole system at first then show you a list of detecting results warning you must remove the threats immediately otherwise you will lost all the important information and even have the computer crashed. However, misleading applications will not allow you remove those security problems until you complete the payment. In fact, the PC threats does not really exist on your computer because they are fabricate by the misleading programs publishers in order to scare you to pay money for the software. Mac users come across such problems recent years. Obliviously, misleading applications publisher are getting start to covet the Mac market.
Read More
Typical Misleading Application Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Potentially Unwanted App
It is not so easy to define a program as potentially unwanted program. Potentially unwanted program usually arrives on the computer bundled with other third party software which you want. Once you download the target program on your computer, potentially unwanted programs may follow. Potentially unwanted program include "spyware" "adware" and "crapware" You almost certainly don't want these programs on your computer, but they're categorized differently for legal reasons. Some of the potentially unwanted programs track user's online habit, collect private information and other financial data. Moreover, potentially unwanted programs may negatively impact system performance and instability your operating system.
Read More
Typical PUP Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Spyware
The main purpose of Spyware is to secretly gather computer user's information about a person or organization through the user's Internet connection without their knowledge. Spyware applications can get in a computer easily when you try to download other programs from untrustworthy download sites or click on suspicious download links. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. User's detailed information would be exposed in the public very soon. The victims will face fatal problems like bank account would be changed, money would be stolen, your debit or credit card has been used fraudulently and other unexpected troubles.
Read More
Typical Spyware Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Trojan
Trojan is actually a type of malware which created by a variety of people, from pranksters to professional cybercriminals. Trojans will disguise as legitimate and harmless software to gain user’s trust. Once Trojans have been installed on the computer, they probably will access into the operating system through backdoor. Although this kind of malware is not able to replicate itself, it still will collect information or set up holes in computer security. In some cases, the Trojan virus even can take over the computer and lock users out. If the computer has been infected by Trojan virus, it may be control remotely. Trojan creators can do everything on the infected computer like deleting data, stealing data, blocking data, copying data and modifying data.
Read More
Typical Trojan Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Worm
The most important distinction between Trojan and worms is that worms will replicate itself automatically on the system. Worms always work alone like maverick and can spread very rapidly then infect the computer via network connection or as a downloaded file. Worms do not require executable files which supply a platform for them to run. There are several ways that worms will spread in: attachments in email; links to web or FTP resource; P2P files sharing networks; atc.
Read More
Typical Worm Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |
Virus
Computer virus is a program or programming code which sneak in to the operating system without user's knowledge when downloading executable files or documents from the Internet. Once users run the malicious program or open suspicious attachments sent with email, they probably get the computers infected. Viruses are created by cyber criminals in order to achieve their multiple illegal purpose. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Even a simple virus would bring high risk to the computer system. It is very dangerous to keep any type of virus on the computer.
Read More
Typical Virus Threats in MacUtility Labs
|
Malware Name |
Risk Level |
Detection Count |
Protection Added |