Kaspersky Flashfake Removal Tool for Mac detects and removes malicious Flashfake Trojans effectively from an infected computer with just a few clicks. The application is stable and has a good performance, overall, scanning and displaying results promptly.
The app installs quickly and has the type of interface you'd expect from a security app; that is to say, more practical than stylish. If you're not sure what Flashfake Trojans are, you'll find a generous Help section in the menu bar detailing the vulnerabilities and potential risks associated with this kind of malware. In short, Flashfakes hijack Web search results in a click-fraud scam, functioning as a backdoor that allows cyber criminals to steal your passwords or credit card information. It's definitely something you don't want on your Mac. Similar to other malware removal tools, this application starts the scanning process with just the click on the "Start scan" button. Kaspersky Flashfake Removal Tool scanned our test machine within seconds and displayed the results promptly. Since our test machine wasn't infected we couldn't test how fast the program removes the threat, but it was reassuring to know there weren't any issues.
If you suspect you computer suffers from a Flashfake malware infection, then Kaspersky Flashfake Removal Tool is a must have. Even if you don't think your computer is infected, it's still a good idea to grab this app and perform a scan, just to be sure.
Kaspersky Flashfake Removal Tool is a tool to remove this family of malware from your Mac. The first versions of this type of threat were detected in September 2011. In March 2012 over 600 000 computers worldwide were infected by Flashback. The infected computers have been combined in a botnet which enables cybercriminals to install additional malicious modules on them at will. One of these modules is known to generate fake search engine results, displaying false results for users and generating profits for cybercriminals via 'click fraud'. It is quite possible that, in addition to intercepting search engine traffic, cybercriminals could upload other malicious modules to infected computers - e.g. for data theft or spam distribution.