Chromesearch.today is website that is used by hijackers to modify browser settings in Google Chrome, Mozilla Firefox and Internet Explorer. Its misleading design and name can make users think, that this is standard Chrome startup page or legitimate search engine. Actually, search queries to Chromesearch.today are redirected to google.com. Color scheme and design resemble Google and it even has links to Google mail, video search, image search and Google plus social network.
Adskeeper is legitimate advertising network, however, it can be used by potentially unwanted adware programs. Besides, there is fake Adskeeper application, that can generate advertising visually similar to Adskeeper in Google Chrome, Mozilla Firefox and Internet Explorer. Advertisements may appear on shopping sites, in search results and pop-ups can be generated on websites with almost any type of content.
Search Awesome is pesky adware for Google Chrome, Mozilla Firefox and Internet Explorer, that creates ads, pop-ups and integrates banners into browser pages. It is advertised as tool to improve user search experience by showing results shared by friends in social networks and inserting additional widgets into search result pages. In reality, Search Awesome generates third-party advertising on shopping and travel sites like Amazon, TripAdvisor, Ebay, Google.
Cloudnet (Cloudnet.exe) is malicious application from EpicNet Inc. Security specialist categorize this program as adware or potentially unwanted application (PUA). It implements scripts in browser pages to display pop-ups, banners and other type of advertising in Google Chrome, Mozilla Firefox and Internet Explorer.
Ykcol Ransomware is newest version of previously described Locky ransomware. New variant uses RSA-2048 and AES-128 cryptographic algorithms and appends .ykcol to he end of all encrypted files. Virus also modifies filenames using the following template: [8_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[4_hexadecimal_chars]-[12_random_hexadecimal_characters].ykcol. In order to decrypt your files malware demands 0.25 BTC, which is on the date of writing this article is equivalent to $950. Ykcol Ransomware creates two files named ykcol.htm and ykcol.bmp, both contain instructions to pay the ransom and ID.