Posted: August 18, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Win32.DsBot.bvp is a backdoor Trojan that was designed for the explicit purpose of allowing infected computers to be controlled by remote hackers. The majority of Backdoor.Win32.DsBot.bvp infections that malware experts have observed has been bundled with legitimate and pirated programs that are distributed through P2P networks and generalist software websites. Backdoor.Win32.DsBot.bvp's remote access vulnerabilities can be sources of password theft, account break-ins, infection by other forms of malicious software, disabled programs or system settings that have...


Posted: August 18, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Vaklik.ljd is a Trojan horse that's capable of utilizing both backdoor Trojan and dropper Trojan style attacks against your PC. Once it infects your computer, Trojan.Win32.Vaklik.ljd will infect normal system processes, while Trojan.Win32.Vaklik.ljd attacks your security settings and software, afterwards contacting remote servers to receive instructions from hackers. Attacks by Trojan.Win32.Vaklik.ljd can allow criminals to steal private information, install a variety of harmful applications onto your hard drive, cripple security programs or force your PC to become part of a...


Posted: August 17, 2011 | Category: Adware | Threat Level: 2/10
Not-a-virus:WebToolbar.Win32.Zango, also well-known by the alias of ClickPotato , is an adware program that monitors your online habits and displays advertisements based on that information. Although Not-a-virus:WebToolbar.Win32.Zango's behavior is suspicious, our malware experts haven't found any instances of Not-a-virus:WebToolbar.Win32.Zango attacking your PC directly or trying to conceal itself, and as such, Not-a-virus:WebToolbar.Win32.Zango is classified as adware rather than malicious software. Not-a-virus:WebToolbar.Win32.Zango is often bundled with other programs and passes itself...


Posted: August 17, 2011 | Category: Trojans | Threat Level: 8/10
Heur:Trojan-Downloader.script.generic is an alert for a generic script that's used to install unwanted and harmful software onto your PC. Because these scripts can be embedded on a variety of websites and in a variety of advertisements, the exact origin of any single Heur:Trojan-Downloader.script.generic can vary just as much as the potential Trojan or other malicious program that Heur:Trojan-Downloader.script.generic installs. In some cases, Heur:Trojan-Downloader.script.generic may also be a false positive, which can be fixed by bringing the relevant issue to the attention of the...


Posted: August 17, 2011 | Category: Backdoors | Threat Level: 6/10
W32.IRCBot.I is a backdoor Trojan that uses standard security-violating tactics to allow remote criminals to control your PC via IRC servers. W32.IRCBot.I specializes in attacking Windows platforms and, like many Trojans, launches itself automatically and runs as a background process. Because of this behavior, W32.IRCBot.I may not be very visible, but malware researchers have found that W32.IRCBot.I's capabilities can extend to extremely dangerous attacks, such as enabling DDoS crimes, installing malicious software (including keyloggers, rogue security programs or worms)...

Posted: August 17, 2011 | Category: Worms | Threat Level: 5/10 is a Visual Basic-based worm that uses traditional worm tactics to infect new computers via networks and removable drives. Although malware researches have noted that can be configured to cause a range of different attacks, most infections will attempt to have a negative impact on your computer's security by disabling security-related programs or making harmful changes to security settings. will launch itself without any interaction on your part and tries to hide from sight, so you should use...


Posted: August 17, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Starter.yy is a generic term for Trojan components that are used to load other Trojan components for the purposes of installing malicious software, altering your system settings, attacking your computer's security or performing other hostilities. Although Trojan.Win32.Starter.yy can be used to a large amount of threats, recent Trojan.Win32.Starter.yy attacks that malware researched have observed are typically linked to backdoor Trojans and browser hijackers that display pop-ups and redirect you to undesirable websites. Because Trojan.Win32.Starter.yy is almost...


Posted: August 17, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Win32.Bredolab.obk is a backdoor Trojan that attempts to assist criminals in controlling any computers that Backdoor.Win32.Bredolab.obk infects. Although Backdoor.Win32.Bredolab.obk is a relatively new Trojan threat, malware experts have found that some anti-malware programs may detect Backdoor.Win32.Bredolab.obk heuristically due to the common code obfuscation techniques that Backdoor.Win32.Bredolab.obk uses. Nonetheless, updating your anti-malware software to protect your PC from Backdoor.Win32.Bredolab.obk attack is highly advisable. Once on your PC,...

Posted: August 17, 2011 | Category: Rogue Websites is a malicious search engine website that uses browser hijackers to force you to use's questionable services. Although looks like a normal search engine site and claims to be a 'premiere spot' for web searches, search results typically are irrelevant, malicious or are sorted according to profitability for's maintainers. Because browsers hijackers are difficult to detect and will revert any attempts to undo their browser changes manually, you should use an...


Posted: August 16, 2011 | Category: Trojans | Threat Level: 8/10
Trojan:win64/sirefef.b is a damaging Trojan that can access an infected computer system without the PC user's knowledge. Trojan:win64/sirefef.b can use a large amount of your system resources to trace your computer's activities or deliver pop-up ads that may notably slow down the PC performance or even make it crash randomly. Trojan:win64/sirefef.b opens up firewalls and gathers personal information and then transmits it to remote attackers. It is strongly recommended to remove Trojan:win64/sirefef.b immediately once you detect it.


Posted: August 16, 2011 | Category: Downloaders | Threat Level: 5/10
Trojan.Downloader.JS.Agent is a dangerous Trojan infection that exploits system vulnerabilities to enable remote attackers control of your computer. Trojan.Downloader.JS.Agent can deliver additional harmful malware infections to your computer and use your computer to send spam emails to your contact lists for 'pay per click' benefits. Trojan.Downloader.JS.Agent is created to record your browsing activity and steal your personal information. Trojan.Downloader.JS.Agent is mainly detected on some malicious websites. Once you visit at least one of those websites, Trojan.Downloader.JS.Agent will...


Posted: August 16, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Jorik.Fraud.un is a Trojan that spreads via existing network vulnerabilities or security exploits. Trojan.Win32.Jorik.Fraud.un runs in the background and slows down your computer system by taking over a large amount of system resources. Trojan.Win32.Jorik.Fraud.un creates its startup registry entry so that it could run every time you start Windows. Trojan.Win32.Jorik.Fraud.un enables attackers gain remote access to the affected computer system. Trojan.Win32.Jorik.Fraud.un can steal and transmit personal information to remote attackers for illegitimate purposes. Remove...

Zeus Keylogger

Posted: August 16, 2011 | Category: Keyloggers | Threat Level: 8/10
Keylogger Zeus is a keylogging program that aims to steal your personal information and banking details. Keylogger Zeus can record keystrokes and a targeted computer user's activity over the Internet, involving private details such username, password, credit card number, etc. Keylogger Zeus can then forward stolen data to external servers. Keylogger Zeus is a dangerous infection to the affected computer system that should be removed immediately upon detection.


Posted: August 16, 2011 | Category: Trojans | Threat Level: 8/10
Trojan-Downloader.Win32.Bancos is a malicious Trojan that may be used to perform distributed denial of service attacks (DDoS) or to download and install additional malware threats or applications. Trojan-Downloader.Win32.Bancos penetrates into the affected PC system stealthily and secretly executes its malicious actions in the background, avoiding detection from the infected user or any installed anti-virus programs. Trojan-Downloader.Win32.Bancos runs in the background and enables remote access to the compromised PC system that may represent a security risk for the targeted computer system...


Posted: August 16, 2011 | Category: Worms | Threat Level: 5/10
Worm.Win32.VBKrypt.m is malignant worm that can disable firewall to get access to a compromised computer system secretly. Worm.Win32.VBKrypt.m copies itself rapidly through email or IM messages and any form of attachment or link in an email which may include a link to a malicious website. Once Worm.Win32.VBKrypt.m enters a targeted PC system, it can download other corrupt files through network exploits, which sets your computer at risk. Worm.Win32.VBKrypt.m can steal and send your personal information to remote attackers. It is strongly recommended to uninstall Worm.Win32.VBKrypt.m...


Posted: August 16, 2011 | Category: Trojans | Threat Level: 8/10
New is identified as a dangerous trojan that runs in the background and is able to change Internet Explorer cookies to connect the compromised computer to rogue websites. New redirects the affected web browser to malicious websites and tries to upload potentially infected files onto the PC system. New enables remote attackers gain access to the targeted machine. New can steal private details collected on the attacked computer system It is strongly advised to eliminate New immediately after detection to secure your PC.


Posted: August 16, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor:Win32/Smadow is a hazardous backdoor Trojan infection, which can penetrate into the targeted computer system without a PC owner's knowledge and permission. When Backdoor:Win32/Smadow successfully installs on the infected machine, it makes changes to the system processes. Backdoor:Win32/Smadow searches for potential exploits your computer system and thus identifies the most vulnerable parts of it to download more additional computer threats. Backdoor:Win32/Smadow can advertise other PC infections, including rogue security programs, worms, spyware, Trojans, etc....

System Modification virus

Posted: August 16, 2011 | Category: Rootkits | Threat Level: 10/10
System Modification virus is a generic label that certain PC security brands use to identify rootkit components. While many System Modification virus infections are genuine viruses that can infect multiple files on your PC in disparate locations, malware researchers have also found that a significant number of System Modification virus detections are false positives. You can determine which type of System Modification virus is on your PC by watching for the appropriate signs and by using a competent security product to scan for all System Modification virus threats....


Posted: August 15, 2011 | Category: Malware | Threat Level: 6/10
WS.Reputation.1 is a heuristic label for program files that have been widely rated as having poor Web reputations with respect to safety, privacy, etc. As a general category, WS.Reputation.1 can be applied to many types of PC threats, but the most recent WS.Reputation.1 campaign involved a Trojan that contacted malicious Web servers for the purpose of compromising your PC and/or installing other malware. This version of WS.Reputation.1, sometimes detected as a form of adware, contacts multiple copycat sites that are disguised as advertising networks while actually being infection vectors....


Posted: August 15, 2011 | Category: Adware | Threat Level: 2/10
FREEzeFrog is an adware application. FREEzeFrog is known to display several advertisements related to a computer user's browsing habits. FREEzeFrog may also track other internet or computer activity. The FREEzeFrog toolbar may be installed where it could change internet browser settings without the computer user's permission. It is necessary that FREEzeFrog be removed with an updated spyware removal application.
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 17766
Home "Articles"