Protection from

Our team of security experts has prepared a detailed guide on how to protect your devices from malware.

Reviews of

Judging by the reviews of visitors, the project mainly forces you to subscribe to push notifications. The site uses manipulative browser messages that urge the user to authorize sending.

After confirming a subscription to, annoying pop-up ads start to arrive (and even when the browser is closed).

The website and its variant have been flagged as suspicious and potentially untrustworthy by several online safety and scam detection platforms.

According to ScamAdviser

According to ScamAdviser, the website’s owner uses a service to hide their identity, which can be a common practice for legitimate reasons like avoiding spam. However, this anonymity also makes it difficult to verify the real owner of the website, often leading to a lower trust score for such sites. Additionally, is relatively new and not currently active, which is a common characteristic of scam websites. They often have a short lifespan, appearing briefly before being taken down due to consumer complaints or other reasons. Furthermore, iQ Abuse Scan has reported for phishing activities, which is a significant red flag.

According to WebParanoid

WebParanoid, another website safety checker, also labels both and as low trust sites, possibly scams, and advises against using them. Key concerns include the lack of links to social networks, which is unusual for legitimate businesses, and the fact that these sites are not visited by many users. Moreover, the websites were created very recently – another warning sign as many scam websites are often short-lived.

In summary, both and its variant are considered risky, with potential for phishing and other scam activities. It is advisable to avoid entering personal information or making purchases on these sites.

How to remove subscriptions from

Instructions on how to protect yourself from push subscriptions and viruses on

Delete existing subscriptions

To remove push subscriptions from a malicious website like in your browser, follow these general instructions. The steps might slightly vary depending on the browser you are using.

For Google Chrome:

  1. Open Chrome: Start by opening your Chrome browser.
  2. Settings: Click on the three dots in the upper right corner to open the menu, then select “Settings.”
  3. Privacy and Security: Scroll down and click on “Privacy and security.”
  4. Site Settings: Within the Privacy and Security section, find and click on “Site Settings.”
  5. Notifications: Under Permissions, click on “Notifications.”
  6. Find the Malicious Site: In the notifications section, look for or any other suspicious website.
  7. Block or Remove: Next to the site name, click the three dots and choose “Block” or “Remove.”

For Mozilla Firefox:

  1. Open Firefox: Launch your Firefox browser.
  2. Options: Click on the three lines in the upper right corner and select “Options.”
  3. Privacy & Security: On the left panel, select “Privacy & Security.”
  4. Notifications: Scroll down to the Permissions section and click on “Settings” next to Notifications.
  5. Remove Site: Find in the list and click on its status, then change it to “Block.” Click “Save Changes.”

For Microsoft Edge:

  1. Open Edge: Start Microsoft Edge.
  2. Settings: Click on the three dots in the upper right corner and select “Settings.”
  3. Cookies and Site Permissions: In the menu on the left, click on “Cookies and site permissions.”
  4. Notifications: Scroll down and select “Notifications.”
  5. Manage and Block: Find in the list and click on the three dots next to it to either block or remove the permissions.

For Safari:

  1. Open Safari: Launch Safari on your Mac.
  2. Preferences: In the menu bar at the top, click on “Safari,” then “Preferences.”
  3. Websites Tab: Click on the “Websites” tab.
  4. Notifications: In the left-hand sidebar, click on “Notifications.”
  5. Deny Permissions: Find in the list and select “Deny” for its permissions.

General Tips:

These steps should help you remove unwanted push notifications from malicious sites. Always exercise caution when allowing notifications from websites, especially if they are unfamiliar or seem suspicious.

Set up security in your browser:

  • Enable security features in your browser, such as pop-up blockers, malicious site warnings, and phishing protection.

Use a VPN:

  • Using a virtual private network (VPN) can help protect your Internet traffic from unwanted tracking.

Install the Spam Shield anti-spam app:

Install the Spam Shield app from the Google Play Store. It provides protection against unwanted messages and push subscriptions.

Spam Shield app overview

By downloading the app and giving it access to your device, you get:

  • 24/7 notification monitoring;
  • reliable and complete protection from spam content;
  • a comfortable environment to use your device without distractions and annoyances;
  • complete control over the security of your device;
  • privacy of your data;
  • convenient notification history management;
  • time saving – you will only receive important messages.

Benefits of the app

  • Ease of use: The intuitive interface makes the app accessible to all users.
  • Database updates: Regular database updates help in recognizing new types of spam.
  • Efficiency: Highly effective in recognizing and blocking spam.

How to use Spam Shield?

  • Install the app from the app store.
  • Launch the app and follow the setup instructions.
  • Enable the necessary options to protect against unwanted calls, messages and push subscriptions.

With these steps and the Spam Shield app, you can improve the security of your Android phone and prevent unwanted push subscriptions and virus attacks.


In summary, both and its variant are considered risky, with potential for phishing and other scam activities. It is advisable to avoid entering personal information or making purchases on these sites.

You might also like