generic!bg.euv

Posted: May 16, 2011 | Category: Backdoors | Threat Level: 6/10
generic!bg.euv is a malicious backdoor trojan that uses the vulnerabilities of the security programs and bypass the usual authentication so that it couldn't be found by computer users. generic!bg.euv can be installed by careless PC users when surfing the Internet or can be installed by other malware infections. Once generic!bg.euv invades the PC system, it can execute many operations to the computer system, such as infect files and program, log keystrokes, harm PC system, steal confidential data. generic!bg.euv disables anti-virus software detected on the computer system and enables other...

System process at address 0xE4783995 have just crashed

Posted: May 16, 2011 | Category: Fake Warning Messages
'System process at address 0xE4783995 have just crashed, please follow these steps to deactivate it from your system' is ransomware Trojan's fake warning that holds your PC hostage. Although the Trojan that uses the 'System process at address 0xE4783995 have just crashed, please follow these steps to deactivate it from your system' message may pretend to be from Microsoft, this Trojan isn't an official part of your operating system and should be considered a serious threat. Avoid acting on this ransomware Trojan's recommendation that you call a phone number to obtain an identification...

Trojan.Killfiles

Posted: May 14, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Killfiles is a generic name for a subgroup of trojans that delete files on your computer, usually with no other purpose besides simply causing damage. Although the earliest versions of Trojan.Killfiles are long since out of date, newer versions of Trojan.Killfiles have been created over the years and may still be in distribution. You should take appropriate steps to protect your PC from Trojan.Killfiles and act quickly to delete Trojan.Killfiles if you suspect that you have such a trojan on your computer. The Origin of the Trojan.Killfiles Threat Trojan.Killfiles was first...

Worm.Win32.VB.pu

Posted: May 13, 2011 | Category: Worms | Threat Level: 5/10
Worm.Win32.VB.pu is a malicious network-aware worm that can replicate itself to occupy all of the hard drive of the affected computer system. Worm.Win32.VB.pu can even try to replicate across the existing network. When infected with Worm.Win32.VB.pu, your web browser may be permanently redirected to malicious websites or restricted to access numerouswebsites. Worm.Win32.VB.pu may take over most of your computer resources and corrupt your system files which in turn will make your computer perform slow and inefficiently. Remove Worm.Win32.VB.pu as quickly as possible from your PC using a...

Malware.Ircbrute!rem

Posted: May 13, 2011 | Category: Malware | Threat Level: 6/10
Malware.Ircbrute!rem is a malicious self-replicating computer worm that can circulate without any human interruption. Malware.Ircbrute!rem will infect files and programs, steal user personal information, change system settings or drop backdoors to the PC system. Once there is a file-sharing network or the network share is not protected, Malware.Ircbrute!rem will take advantage of these situations and corrupt the remote computers. Malware.Ircbrute!rem installs itself stealthily without any signs like setup window or dialog box. Remove Malware.Ircbrute!rem as quickly as possible to protect...

Backdoor.Agent.UWP

Posted: May 13, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Agent.UWP is a malicious backdoor trojan infection that invades and installs the affected computer system without a targeted user's awareness or consent when you open unidentified email attachment mor picture, use instant messaging, etc. Backdoor.Agent.UWP does not use network resources to propagate, but can propagate through a network by attaching itself to other computer malware threats. Backdoor.Agent.UWP is able to download unauthorized files to the corrupted computer system without authorization which will lead to security risk. Backdoor.Agent.UWP is a serious threat to your...

Virus:Win32/Sality.AT

Posted: May 13, 2011 | Category: Viruses | Threat Level: 8/10
Virus:Win32/Sality.AT is a damaging computer virus that spreads via malicious files, installed programs or removable media. Virus:Win32/Sality.AT is replicated by infecting files, installed software or removable media. Virus:Win32/Sality.AT usually corrupts computer in the form of a program or programming code which involves a malicious payload. Virus:Win32/Sality.AT invades and installs the affected computer without awareness or authorization when you open unidentified email attachment, image, use instant messaging, etc. Virus:Win32/Sality.AT has to be removed once detected on a computer...

Mal/Banspy-K

Posted: May 13, 2011 | Category: Keyloggers | Threat Level: 8/10
Mal/Banspy-K is a malignant keylogger program that can take over user's keystrokes that include personal information, such username, password, credit card number, etc. for malicious aims. Mal/Banspy-K can be installed by hackers or installed with the help of various malware threats. Mal/Banspy-K can change desktop background, enable a hacker gain unauthorized remote access to the affected computer, infect files and break the PC system, or even leave other nasty malware infections or invade user's privacy. Mal/Banspy-K is a serious risk for the computer system and has to be removed...

Gen.variant.zbot.25

Posted: May 13, 2011 | Category: Trojans | Threat Level: 8/10
Gen.variant.zbot.25 is a variant of infamous Zbot or Zeus trojan infection. Gen.variant.zbot.25 corrupts computer systems and keeps them connected on a group known as a botnet. Gen.variant.zbot.25 is powerful data stealing invader with banking information as a primary target. If you have Gen.variant.zbot.25 or any other Zbot detections on your PC, you should check if that is not a tricky pop-up alert created by rogue anti-spyware application. It is also very important to contact your financial services providers and report them of the problem so that they could provide appropriate recovery...

Adware.Rotator

Posted: May 12, 2011 | Category: Spyware | Threat Level: 6/10
Adware.Rotator is a malignant adware program which usually initiates, shows, or downloads advertisements to the corrupted computer. Adware.Rotator creates malicious registry entries to mess up your computer files covertly. Adware.Rotator adds a start-up entry to allow its automatic execution every time Windows starts. Adware.Rotator aims to gather information about targeted users and transmit it to host computers without any awareness and authorization. Adware.Rotator will create a browser helper object for Internet Explorer named Brincome Browser Plugin. Adware.Rotator sends specially...

Worm:Win32/Neeris.AN

Posted: May 12, 2011 | Category: Worms | Threat Level: 5/10
Worm.Win32.Neeris.AN is a malignant computerworm that replicates itself across local and network computers. Worm.Win32.Neeris.AN usually propagates via email attachments or instant messages. Worm:Win32/Neeris.AN installs itself secretly without any signs, such as setup window or dialog box. Worm.Win32.Neeris.AN makes changes to registry entries to conceal its existence from computer users. Worm.Win32.Neeris.AN adds a start-up entry to run automatically when you start up your computer. Remove Worm.Win32.Neeris.AN as soon as possible to protect your computer. File System...

HeurEngine.EP

Posted: May 12, 2011 | Category: Malware | Threat Level: 6/10
HeurEngine.EP is a malware infection that is used to port other infected files or programs onto an affected computer system. HeurEngine.EP can be installed by careless PC users when using Internet or can be installed by other malware threats. HeurEngine.EP has dropped its start-up item in the registry entry so that it will launch automatically every time Windows is started. HeurEngine.EP is a privacy risk that may lead to identity theft. File System Modifications The following files were created in the system:

Trojan-PSW.Win32.Agent.oht

Posted: May 12, 2011 | Category: Trojans | Threat Level: 8/10
Trojan-PSW.Win32.Agent.oht is a nasty trojan infection which uses malicious tricks to download harmful malware from the Internet. Trojan-PSW.Win32.Agent.oht penetrates and installs the affected computer without a victim's awareness or authorization when you open an unidentified email attachment, image, use instant messaging, etc. Trojan-PSW.Win32.Agent.oht mainly operates by downloading files to the targeted computer system without user's knowledge. Trojan-PSW.Win32.Agent.oht is a security threat to computer system and has to be removed from the PC immediately once it has been detected....

Trojan.Win32.Scar.djln

Posted: May 12, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Scar.djln is a malicious trojan infection that makes changes to Windows Explorer settings and downloads other corrupt files from external servers. Trojan.Win32.Scar.djln invades and installs the compromised computer system without awareness or consent when you open an unidentified email attachment, image, use instant messaging, etc. Trojan.Win32.Scar.djln can even enable the attacker get remote access to the affected computer. It is highly recommended deleting Trojan.Win32.Scar.djln before it harms your system. File System Modifications The following files were...

BDS/Bifrose.EO.47.backdoor

Posted: May 12, 2011 | Category: Spyware | Threat Level: 6/10
BDS/Bifrose.EO.47.backdoor is a mischievous backdoor trojan that gives free access to computer system for remote attackers. BDS/Bifrose.EO.47.backdoor also orders Internet connection to be allowed, if a computer system is offline. BDS/Bifrose.EO.47.backdoor creates outgoing traffic as the affected PC system is used as a spambot. If BDS/Bifrose.EO.47.backdoor is on your machine, huge part of your web-traffic is created by the backdoor infection. Since BDS/Bifrose.EO.47.backdoor demonstrates infected computer's memory to a remote hacker, it can steal your confidential data. Targeted users are...

Tr/vb.agent.20480.a

Posted: May 12, 2011 | Category: Trojans | Threat Level: 8/10
Tr/vb.agent.20480.a is a computer trojan used to serving other programs. Tr/vb.agent.20480.a invades a PC system under the mask of a content that looks attractive for the computer user. Tr/vb.agent.20480.a is programmed by attackers to scan a computer system for vulnerabilities. If a vulnerability of desired type is identified, Tr/vb.agent.20480.a uses it to download other malware infections. That is exactly what If Tr/vb.agent.20480.a fails to accomplish its payload immediately as no vulnerabilities are found, it will try to generate them by its own. Even if Tr/vb.agent.20480.a fails...

Mal vb-cf

Posted: May 12, 2011 | Category: Malware | Threat Level: 6/10
Mal vb-cf is a malicious computer infection which does not repair the issue even after being deleted, if its payload is executed. That's because Mal vb-cf is also found by other security applications as a dropper trojan. A dropper trojan helps other malware infections invade a PC. Thus, removal of the Mal vb-cf should be accomplished together with the related unwanted content deletion. In addition to that Mal vb-cf is able to download content more precarious than it, Mal vb-cf is known to connect affected computers to websites, which names consist of Russian phrases written in Latin letters...

W32.Nokpuda@mm

Posted: May 11, 2011 | Category: Worms | Threat Level: 5/10
W32.Nokpuda@mm is a self-replicating computer worm that can spread itself without any user interruption. W32.Nokpuda@mm can create an entry to launch itself automatically when you start up the computer system. W32.Nokpuda@mm propagates through network drives, removable drives, email, and file-sharing networks. W32.Minudazash can steal confidential data and enable a remote criminal get control of the computer using a backdoor port. Remove W32.Nokpuda@mm as quickly as possible to protect your computer. File System Modifications The following files were created in the system:

HackTool.Win32.Crypt.sa

Posted: May 11, 2011 | Category: Malware | Threat Level: 6/10
HackTool.Win32.Crypt.sa is a very malicious computer infection that was produced to enable a remote attacker get access to the targeted computer to largely take over precious system resource and track your Internet habits to record or steal your confidential data. HackTool.Win32.Crypt.sa infiltrates and installs the affected computer without a victim's awareness or authorization when he/she opens unidentified email attachment or image, uses instant messaging, etc. HackTool.Win32.Crypt.sa is an identified security threat and has to be eliminated immediately upon detection. File...

HackTool.Win32.Crypt.nq

Posted: May 11, 2011 | Category: Malware | Threat Level: 6/10
HackTool.Win32.Crypt.nq is a malignant computer infection which is cleverly concealed to behave like legitimate spyware removal tool. HackTool.Win32.Crypt.nq is able to occupy all user keystrokes, such as personal information, like login number, password, credit card details, etc. HackTool.Win32.Crypt.nq may cause unauthorized access to personal data and hard drive information with a serious possibility of irretrievable data loss and unstable computer performance. Remove HackTool.Win32.Crypt.nq before it damages your computer system. File System Modifications The following...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 17375
Home "Articles"