Posted: July 16, 2012 | Category: Trojans | Threat Level: 9/10
JAVA_SMSSEND.AB is a Trojan that spreads as a fake version of Skype application which was created by scammers. JAVA_SMSSEND.AB attempts to benefit from Android users. The fake Skype application is not a very professional program because the program only runs on older Symbian phones or Android devices that enable execution of Java MIDlet. The fake Skype application is promoted through tricky websites, mainly hosted on Russian domains (.ru) but the bogus app itself is hosted on Nigerien domains (.ne). Android does not allow you to download and install applications from any sources. In order...


Posted: July 16, 2012 | Category: Trojans | Threat Level: 9/10
Win32/Sirefef.FY is a rootkit Trojan that hides its existence on the affected PC. Win32/Sirefef.FY also attempts to evade detection by security programs that are installed on the infected computer. Win32/Sirefef.FY can cause repeated web browser redirections to suspicious websites. Win32/Sirefef.FY can also change the homepage settings of the hijacked web browser. Win32/Sirefef.FY can damage the targeted computer and steal personal data. Win32/Sirefef.FY may collect personal information from a victim and transmit this data to remote attackers. Win32/Sirefef.FY can connect to a remote...


Posted: July 16, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Dididix is a Trojan that modifies the master boot record (MBR) of the infected computer. Once executed, Trojan.Dididix copies the certain file. Trojan.Dididix then writes a driver file and an encrypted .exe file into sectors after the end of the last partition on the disk drive of the affected PC. Trojan.Dididix saves the existent master boot record (MBR) and then overwrites it (Boot.Dididix). The modified MBR hooks the BIOS interrupt to load the driver file when Windows is started, and then loads and runs the saved MBR. The driver file then decrypts the encrypted .exe file and...

Ukash Virus

Posted: July 15, 2012 | Category: Ransomware | Threat Level: 9/10
Screenshot The Ukash Virus is a colloquial nickname for a family of ransomware Trojans that display fraudulent police alerts, block you from using other applications and threaten you with legal action if you don't pay a fee within a short time period. Preferred payment methods for this fine include Paysafecard and Ukash – hence the Ukash Virus's name. The Ukash Virus family is especially notable for tailoring its warning messages to local regions and having many different variants for different countries. malware researchers have noted that the Ukash Virus is particularly...

17 Essential Tips to Increase Your Website’s Security

Posted: July 13, 2012 | Category: Internet Security
The website is the front line of your business. It represents your business and presents your vision and goals. Also, it is like the top of an iceberg as your potential customers and partners only see what is above the water and do not notice what information is below the surface. Attacking the top of the business iceberg may be crucial to all of it. How that is possible? It is quite clear, a website is a public information vehicle which is usually stored together with company email, CRM, project management solutions, internal social network and local file sharing server. A website is not...


Posted: July 13, 2012 | Category: Worms | Threat Level: 5/10
Worm/Generic2.ceag is a worm that currently has poor distribution in the wild. Like most worms, Worm/Generic2.ceag has the potential for distributing itself by copying itself to removable drives or network-shared directories, and malware researchers especially recommend that you keep your security intact to monitor these infection vectors. malware research team also notes that recent Worm/Generic2.ceag infection reports are indicative of a potential false positive where Worm/Generic2.ceag may be detected as infecting explorer.exe when Worm/Generic2.ceag...


Posted: July 13, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Patchep!sys is a heuristic detection for PC threats that infect native Windows components to enable the easy execution of other PC threats, such as spyware. Since Trojan.Patchep!sys, like similar Trojans such as Trojan Horse Patched_c.LYT , Trojan horse Patched_c.LZE or Trojan Horse Patched_c.LYU , will most likely be detected as an infection for services.exe, you should never try to delete the 'host' file of a Trojan.Patchep!sys infection due to the mandatory nature of this file for the smooth operation of Windows. Competent anti-malware software should be able to detect and...

File Recovery

Posted: July 12, 2012 | Category: Rogue Defragmenter Programs | Threat Level: 10/10
Screenshot File Recovery is a rogue defragger that pretends to check for errors on your hard drive, while File Recovery creates fake lists of malfunctions and encourages you to spend money on a purchasable fix module to resolve these issues. File Recovery and other members of its family aren't able to find real hard drive errors or defragment your hard drive. This will not stop File Recovery from displaying varied types of fake system error messages, however; File Recovery may also attempt to block unrelated programs up to blocking everything else that you attempt to launch. The solution to this...

Red Raider Virus

Posted: July 12, 2012 | Category: Viruses | Threat Level: 8/10
Red Raider is a virus that spreads on the corporate networks. Red Raider Virus creates a vulnerability on the IIS (Internet Information Server) software. Red Raider Virus enters the targeted PC through a hole in Internet Information Server (IIS) software, which is widely used for powering Internet servers. Then, Red Raider Virus scans the Internet for vulnerable systems to affect them and continue the process.

Love Hurts Virus

Posted: July 12, 2012 | Category: Viruses | Threat Level: 8/10
Love Hurts is a virus that spreads through the chat messenger system and emails. Love Hurts is able to overwrite numerous files. Love Hurts Virus arrives to your email box with a message 'I Love You'. Love Hurts is dangerous for the Internet Explorer because it modifies the start page. Love Hurts Virus also overwrites .jpg and .gif files and transmits copies through Microsoft Outlook.


Posted: July 12, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Mayachok.1 is a ransomware Trojan that uses fraudulent pretenses to get you to send an SMS message to a mobile service scam. Although Trojan.Mayachok.1 has been observed primarily in Russian webspace, PCs in other areas are also likely to be vulnerable to Trojan.Mayachok.1, which is identifiable by its fake website alerts that include traffic overload warnings and Trojan.Mayachok.1's characteristic SMS-related 'feature.' Since your Internet connectivity may be disabled, or various websites may be blocked until Trojan.Mayachok.1 is deactivated and removed, malware...


Posted: July 12, 2012 | Category: Trojans | Threat Level: 9/10
Trojan:Win32/Sirefef.AL is a Trojan that represents the Sirefef malware family and encompasses rootkit functionalities. Trojan:Win32/Sirefef.AL can change DNS settings in order to change your queries in search engines on the targeted web browser and redirect you to suspicious advertising websites designed by scammers. Trojan:Win32/Sirefef.AL might be difficult to detect and uninstall from the corrupted machine by many security applications.


Posted: July 12, 2012 | Category: Trojans | Threat Level: 9/10
Win32/Sirefef.AN is a Trojan that contains ZeroAccess rootkit capabilities and, thus, is difficult to detect and remove by many security tools. Win32/Sirefef.AN hides its components in certain locations on the affected computer system in order to evade detection and removal by security software. Win32/Sirefef.AN tuns off numerous system services to assure its payload's execution. Win32/Sirefef.AN can completely damage the targeted machine.

Nginx Virus

Posted: July 11, 2012 | Category: Viruses | Threat Level: 8/10
Screenshot The Nginx Virus is a casual name for a browser hijacker that blocks popular websites to display a Nginx server-based site instead of your normal content. Since Nginx is a popular open source program that can be used by both malicious and benevolent websites, malware researchers recommend that you assume that your PC may have been exposed to potential browser-based attacks after contact with sites that resemble the end results of a Nginx Virus's hijack. In some cases, what looks like a Nginx Virus may be a simple server glitch that doesn't indicate that anything is wrong...


Posted: July 11, 2012 | Category: Trojans | Threat Level: 9/10
Mal/Katusha-F is an e-mail-distributed member of the Trojan.Katusha family, and, like all Katusha-based Trojans, can be involved in attacks against your computer's security or attempts to install other PC threats. Several variants of Mal/Katusha-F's favorite e-mail template have been observed so far, and malware researchers warn against downloading any file attachments that claim to be confirmation of an airline seating reservation (Mal/Katusha-F's preferred scam). Anti-malware software should be able to detect Mal/Katusha-F as malicious even if you can't identify its...


Posted: July 11, 2012 | Category: Trojans | Threat Level: 9/10
Mal/Krap-D is a backdoor Trojan that's designed for the Windows operating system, although the attack method that installs Mal/Krap-D also includes cross-platform compatibility by pairing Mal/Krap-D with the option to install an OS X or Linux-compatible Trojan instead of Mal/Krap-D. Like all backdoor Trojans, Mal/Krap-D compromises your computer's security and should be considered a high-level PC threat to be removed by a reliable anti-malware product, although symptoms of Mal/Krap-D's initial attacks are unlikely to be seen. malware experts note Mal/Krap-D's infection...


Posted: July 11, 2012 | Category: Trojans | Threat Level: 9/10
Troj/JavaDl-NJ is a Java-based applet that's used to install one of three types of backdoor Trojans, with the type of Trojan being based on your operating system. Troj/JavaDl-NJ, also known by the alias Trojan-Downloader:Java/GetShell.A, has only been seen in one site that has since been shut down. However, since this site was a benign website that was hacked to include Troj/JavaDl-NJ, rather than an intentional host for Troj/JavaDl-NJ attacks, malware researchers rate the probability of Troj/JavaDl-NJ being inserted into other benevolent websites in the future to be...


Posted: July 11, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Sirefef.Ga is a component of a Sirefef or ZeroAccess rootkit infection, and, as such, is merely a single finger of an entire fist's worth of malicious software that can be attacking your PC. malware researchers have seen PC threats from Trojan.Sirefef.Ga's family engaged in browser hijacks (similar to DNS Changer), Bitcoin currency fraud, theft of confidential information and direct attacks against multiple kinds of security software. Although infections related to Trojan.Sirefef.Ga may cause noticeable system instability, there's no guarantee of visible symptoms...


Posted: July 11, 2012 | Category: Worms | Threat Level: 5/10
W32.Morto.B is a worm that circulates through removable drives and by using Remote Desktop Protocol (RDP) connections. W32.Morto.B attempts to open the Remote Desktop Protocol (RDP) connection on PCs in the local network by using common user name and password combinations. W32.Morto.B also affects executable files detected on the infected computer. Once executed, W32.Morto.B inserts itself into the svchost.exe service. W32.Morto.B may also affect other executable files on the targeted PC. W32.Morto.B then copies itself to the certain location. W32.Morto.B affects the certain file by...


Posted: July 10, 2012 | Category: Backdoors | Threat Level: 6/10
Backdoor:W32/GetShell.A is the Windows-specific payload of Trojan-Downloader:Java/GetShell.A, a malicious Java applet that detects your OS and installs an 'appropriate' type of backdoor Trojan. Backdoor:W32/GetShell.A is responsible for the same dangers that are common to most backdoor Trojans, including opening up your PC to unwanted control by third parties, disabling or reducing your computer's security features and, potentially, downloading additional PC threats or stealing private information. Since Trojan-Downloader:Java/GetShell.A can't install Backdoor:W32/GetShell.A without...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 19298
Home "Articles"