Monthly Archives: March 2018 does not fall under any classification yet; however, computer security experts consider it to be unreliable. Therefore, if you ever encounter it, we would advise you to be extra cautious with it just in case. Our researchers at believe there might be a possibility the application could show suspicious links, banners, or other advertising content belonging to various third parties. Such material could be dangerous to interact with which is why it is advisable not to take any chances with and remove it at once. After all, the application might be using a custom Google search engine to gather the results, so why not use instead? If you decide to follow our advice and get rid of this suspicious search engine, you should check the instructions available at the end of the text as they will explain how to eliminate the tool manually. Read more » is an application that you should not have up and running on your operating system. If you ever encounter this program while browsing the Internet, be sure to do everything that you can to refrain from it since it exhibits invasive and otherwise suspicious functionality. Malware researchers at our internal labs have classified this dubious piece of software as one more browser hijacker. The primary reason for such classification is that it can easily make undesirable changes to your browser's default settings without requiring your consent. If that was not enough, you must know that this devious application could prove to be quite dangerous, to put it lightly. If you want to have a better understanding of this hijacker's inner workings, be sure to read our report entirely. Below, you will also find a comprehensive removal guide, which you should use to delete once and for all. Read more »

Mac Tweaker

Mac Tweaker is a new application that claims to make your Mac run smoothly, faster, and error free, too; however, we are not really convinced that this rather pricey tool is worth it. As a matter of fact, our malware experts at say that this software is very similar to the questionable PC optimizers Windows users have been used to. This potentially unwanted program (PUP) has proven to be a rogue system optimizer for Mac OS X 10.7 and above to allegedly clean and tweak the system. Although this PUP claims "state of the art technology," we have found that it is very similar to other Mac optimizers like Mac Optimizer and MacKeeper. We do not claim that this program has malicious intentions and it does look all legitimate on the surface, but we do not believe that it is worth almost 40 EUR to do no visible or real change regarding performance. This is why we recommend that you remove Mac Tweaker from your computer as soon as possible. Read more »


Mymacupdater is yet another potentially unwanted program (PUP) for Mac users that may pose an indirect threat to your system security. This PUP also exhibits traits of an ad-supported program; no wonder why other malware researchers may regard it as an adware program. According to our malware specialists at, this software is very similar to Shopperify. The potentially unreliable third-party advertisements this PUP may flood your screen with could be rather annoying; however, if you were to engage with them, even if accidentally, you might open malicious web pages or directly drop malware infections onto your system. Read more »

Rapid 2.0 Ransomware

Rapid 2.0 Ransomware

Rapid 2.0 Ransomware is most likely a new version of our previously reviewed threat by a similar name (Rapid Ransomware). Our researchers at were able to test it, and from what they have learned it seems this new variant is extremely dangerous. It is not enough that it may lock all user’s private files, but it might also continue encrypting new data even later on until it is removed from the computer. This is why we recommend erasing it with no hesitation the moment you notice it on your system. Paying the ransom as usual in such situations is not advisable since cybercriminals could trick you. To assist you with the malware’s deletion we will add steps explaining how to get rid of it manually just a bit below this article. However, if you need more help or have other questions about Rapid 2.0 Ransomware; feel free to write a comment at the end of this page or reach us via social media. Read more »

GSearch Extension

GSearch Extension is a Google Chrome browser extension that offers a simple and authentic-looking search page for you; however, we are not convinced that it is reliable. As a matter of fact, our malware specialists at have categorized this tool as a potentially unwanted program (PUP) because of its capability to display questionable search results that may lead to potentially unreliable websites. This is how this PUP may pose a threat, even if an indirect one, to your virtual security. This PUP is also known as Gatmog Search Extension. It may be installed knowingly via official sources but it is more likely that it crawls onto your system without your noticing it along with malware infections. All in all, we believe that it is necessary for you to remove GSearch Extension as soon as possible to have one less source of threat on board. Read more » is a threat that falls under the classification of browser hijackers. Our researchers at came across a version compatible with Internet Explorer, but they say it is most likely the application works on browsers like Google Chrome or Mozilla Firefox too. While testing this search engine, it was noticed it can replace user’s default search engine and homepage. As a result, the hijacked browser should start loading after launching it or initiating a new search. The problem with it that it may display modified Yahoo search results. Modified results mean there could be additional advertisements from various third parties among them. However, the worst part is there is not knowing where this material might come from. In other words, we would not be surprised if some ads would appear to be dangerous. Because of this, we advise against the browser hijacker’s usage. Thus, at the end of this report, we will place instructions explaining how to eliminate it manually. Read more »


Upgradesys is a new threat for Android-based device users that can spy on you and steal personally identifiable information (PII) from you. However, what may distinguish this dangerous infection from other threats is that it is not one that you infect your smartphone or any other Android device with; this malware is indeed a pre-installed Android application. This simply means that it is already on your device before you could buy it. As a matter of fact, this Trojan program has mainly been found on budget smartphones, such as BLU, which is produced by a Florida-based American company that designs re-branded low-cost mobile devices. Read more »

Mac Optimize

Mac Optimize is not a trustworthy application that should be up and fully running on your operating system. This program, as the name suggests, is primarily targeted at MacOS users; thus, if you happen to be one of them, you should be aware of its existence at all times. You must also know that malware experts at have classified it as a potentially unwanted program because it functions questionably, to put it lightly. Also, it might be distributed using suspicious methods. If you want to educate yourself about this invasive piece of software and its dubious functionality, be sure to read the rest of this article. Alongside such information, we include a few virtual security tops that you should take to have a clean and secure operating system. Finally, to help you delete Mac Optimize, we present a detailed removal guide, which is easy to follow. Read more »

BlackRuby-2 Ransomware

BlackRuby-2 Ransomware is a new version of BlackRuby Ransomware. It would be a lie if we told you that it is a prevalent infection that has already caused problems to hundreds of users because it is not. It has been detected only recently, so its infection rate is still low. It does not mean that this cannot change soon, so you should not keep your system unprotected if you do not want to find this nasty ransomware infection active on your computer. It has been observed by researchers at that BlackRuby-2 Ransomware checks the victim’s IP address and does not encrypt files on his/her computer if it finds out that the user lives in Armenia, Afghanistan, Azerbaijan, Iran, Iraq, Pakistan, Turkmenistan, or Turkey. In all other cases, it encrypts users’ personal files the second it infiltrates their computers. It acts like other ransomware infections – it locks the most important users’ files. You will be told that you can decrypt them with Black Ruby Decryptor, but you should not invest in this tool because you might not even get it from cyber criminals, or you might find out that it cannot unlock a single file. You will not find free decryption software to download from the web, but it does not mean that users who want to get their files back must purchase the special decryptor. All encrypted files can be restored from a backup easily once the ransomware infection is removed from the system. Read more »