Keystroke Logger
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
iMonitor is a keylogger.
iMonitor Threat Removal
MacScan can detect and remove iMonitor Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitions
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
EICAR is a proof of concept that tests the capabilities of antivirus programs. It is not actually malware.
EICAR Threat Removal
MacScan can detect and remove EICAR Proof of Concept from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Keystroke Logger
-
-
- Last updated:
- 05/01/20 6:18 pm
-
Description
Refog is a keylogger.
Refog Threat Removal
MacScan can detect and remove Refog Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Keystroke Logger
-
-
- Last updated:
- 09/03/19 6:52 pm
-
Description
EaseMon is a keylogger.
EaseMon Threat Removal
MacScan can detect and remove EaseMon Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitions
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
Tsunami is a trojan horse.
Tsunami Threat Removal
MacScan can detect and remove Tsunami Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitions
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
TIFFvuln is an exploit that targets a TIFF vulnerability in earlier versions of OS X.
TIFFvuln Threat Removal
MacScan can detect and remove TIFFvuln Exploit from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitionsalso known as OSX/NetWeirdRC.A
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
NetWeird is a commercial remote access tool that can give malicious third parties access to infected computers.
NetWeird Threat Removal
MacScan can detect and remove NetWeird Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitionsalso known as Java/SET.A, OSX/ExploitKit.gen
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
GetShell is a trojan horse.
GetShell Threat Removal
MacScan can detect and remove GetShell Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitions
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
Janicab is a trojan horse that arrives disguised as a PDF file.
Janicab Threat Removal
MacScan can detect and remove Janicab Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitionsalso known as OSX/QHost.WB
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
QHost is a trojan horse that modifies the hosts file to redirect web traffic.
QHost Threat Removal
MacScan can detect and remove QHost Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitionsalso known as Exploit.OSX.Safari
-
-
- Last updated:
- 03/31/16 3:35 am
-
Description
MetaData is an exploit that targets a metadata vulnerability in earlier versions of OS X.
MetaData Threat Removal
MacScan can detect and remove MetaData Exploit from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Malware Definitionsalso known as OSX/WonRK.A
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
WeaponX is a rootkit.
WeaponX Threat Removal
MacScan can detect and remove WeaponX Rootkit from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read