Kometa browser

Our malware analysts identify Kometa browser as a potentially unwanted program (PUP), and we are sure that most computer users will want to remove this suspicious browser from their operating systems. There is no information about the browser being spread illegally, but it is possible that some computer users will install it unintentionally when packaged with other programs. If you download Kometa browser with other programs, it is very important that you analyze them to make sure that they do not require removal.

Top Threats



Do not be very surprised if you ever find Search.queryrouter.com set on all your browsers. It is because this search tool, even though it shares similarities with reputable search providers, is nothing more than a browser hijacker. In most cases, users can find information about the installation of Search.queryrouter.com in small letters on the installation window when installing free software from the web; however, users might not be told about that, i.e. Search.queryrouter.com might also be set on browsers secretly. Either way, the removal of this search tool is highly recommended because it is not as good as it might seem at first sight. Actually, its presence might result in problems associated with the security, so its removal is highly recommended. Browser hijackers belonging to the ELEX family should not be kept on the computer by any means because they might be dangerous, as recent research has shown.


CasaleMedia is a tracking cookie that monitors your Internet browsing habits in order to track when you see online advertisements. According to the official website for CasaleMedia, the cookies are used for two main...

Windows Web Shield

Windows Web Shield is a malicious computer security program which should be removed from the computer once you learn about its presence. Windows Web Shield is a clone of Windows Internet Guard, Windows Internet Watchdog...


Search.SafeFinder.com does not look like an unreliable search tool; however, malware researchers have discovered that it is a browser hijacker which cannot be trusted. Browser hijackers are usually linked to intrusive...