Trojan Horse Agent_r.AUQ

Posted: December 7, 2011 | Category: Trojans | Threat Level: 9/10
Trojan Horse Agent_r.AUQ is a malicious Trojan infection which depends on a trick of as password-protection of its files. Trojan Horse Agent_r.AUQ can also apply password access to other files. Some files password-encoded by Trojan Horse Agent_r.AUQ are critically important for PC users as Trojan Horse Agent_r.AUQ is able to lock frequently used objects. Use a genuine and powerful anti-malware tool to remove Trojan Horse Agent_r.AUQ.


Posted: December 7, 2011 | Category: Viruses | Threat Level: 8/10
Win32/Small.CA is a dangerous virus that aims at installing a malicious code on the affected PC user's computer. Win32/Small.CA is able to perform numerous malicious activities on the compromised PC that include keylogging, browser redirecting, pretending software, etc. Win32/Small.CA can download and install rogue security applications. Win32/Small.CA can be installed by other malware threats. Remove Win32/Small.CA immediately after detection.

Posted: December 7, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Screenshot is a shopping search engine that offers links to deals but also has been associated with browser redirects. Browser hijackers that are affiliated with may force to load when you click an unrelated link, open a homepage or attempt to use a search engine, and are also indicative of a potential rootkit infection. Some Browser hijackers are brought on by Trojans or rootkits that use a variety of techniques to control your web-browsing activities. However, browser redirects to can be considered simply one of the most visible symptoms...

Trojan Horse Agent3.AYIB

Posted: December 7, 2011 | Category: Trojans | Threat Level: 9/10
Trojan Horse Agent3.AYIB is a malicious Trojan that emerges only when active. Trojan Horse Agent3.AYIB creates copies of itself. Trojan Horse Agent3.AYIB displays fake security warnings. Trojan Horse Agent3.AYIB may slow your computer and steal personal information. Trojan Horse Agent3.AYIB may open security back doors and download and install additional malware threats. Trojan Horse Agent3.AYIB may be hard to uninstall manually. Remove Trojan Horse Agent3.AYIB immediately after detection.


Posted: December 7, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Sirefef.J (Trojan:WinNT/Sirefef.J) is a rootkit Trojan that prevents affected web users from normal Internet surfing by changing search results in any legal search engine and creating pay-per-click advertising revenue for scammers. Trojan.Sirefef.J downloads updates and additional components and hides existing components on the compromised PC. Trojan.Sirefef.J uses advanced surreptitious techniques in an attempt to avoid detection and removal from the infected computer system. Trojan.Sirefef.J uses certain ports for its peer-to-peer communications.

Gameover Trojan

Posted: December 6, 2011 | Category: Trojans | Threat Level: 9/10
Gameover is yet another version of the deadly Keylogger Zeus that steals bank-related information. Gameover has also been implicated in Distributed-Denial-of-Service attacks that temporarily-disable bank websites to draw attention away from fraudulent transactions. Like another Zeus variant, Troj/BredoZp-GY, Gameover uses e-mail spam to propagate, and the safest way to keep Gameover away from your PC is to avoid links and file attachments that are contained in unfamiliar e-mail messages. Although Gameover is a highly-invasive PC threat and may steal sensitive fiscal information,...


Posted: December 6, 2011 | Category: Trojans | Threat Level: 9/10
Troj/BredoZp-GY is a new variant of Keylogger Zeus (also known as the Zeus Trojan or Win32/Zbot) that steals bank-related financial information from any PC that Troj/BredoZp-GY infects. This latest version of Zeus uses e-mail distributed forms of fake Adobe product updates to infect new computers, although, if you avoid touching Troj/BredoZp-GY's file attachment, your PC should be safe. As of early December 6th 2011, many PC security brands have created a definition for Troj/BredoZp-GY only very recently, and you should update your anti-malware software to maximize the possibility of...

Posted: December 6, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Screenshot looks and acts like a news search website, but is, unfortunately, uninterested in providing relevant types of news links or other forms of legitimate content for your perusal. Like other types of malicious search engines, uses browser hijackers to redirect your web browser to its affiliates, which then pay some minor revenue as a kick-back for this traffic. Browser redirects to can be just one of several possible symptoms that your PC has been infected by a Trojan or rootkit. If you...


Posted: December 6, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Win32.Zaccess.Aug is a malicious backdoor Trojan which disintegrates the links between various modules on the compromised PC. Backdoor.Win32.Zaccess.Aug causes failure to access typing and printing devices. Backdoor.Win32.Zaccess.Aug contacts remote attackers through the back door to get further instructions on executing malicious actions. Backdoor.Win32.Zaccess.Aug allows remote attacker to obtain remote access and control over the infected computer. Backdoor.Win32.Zaccess.Aug also involves rootkit functionalities that enable it to take over the system drives and critically...


Posted: December 6, 2011 | Category: Trojans | Threat Level: 9/10
Troj/VB-FRJ is a Trojan dropper that's associated with its fellow Trojan Troj/VB-FRI as well as with the worm Dorkbot . Because Dorkbot infections should be considered extremely-severe security risks and may lead to loss of personal information and even loss of control over your PC, Troj/VB-FRJ attacks should be dealt with promptly, and removing Troj/VB-FRJ should always use the most powerful anti-malware software that's within your discretion. malware analysts warn that as of December 2011, Troj/VB-FRJ attacks have primarily-propagated through Facebook messages...


Posted: December 6, 2011 | Category: Trojans | Threat Level: 9/10
Troj/VB-FRI is a Trojan dropper that installs the Dorkbot worm, a PC threat that's capable of creating backdoor security holes, stealing passwords and blocking security sites. Troj/VB-FRI is often accompanied by the Trojan Troj/VB-FRJ, and recent attacks by these two Trojans have used misleading Facebook messages to propagate. malware researchers recommend avoiding unusual links, even if they appear to be sent by friends, to minimize the risk of being infected by Troj/VB-FRI. Since Troj/VB-FRI rarely comes alone and is a recently-emerged PC threat, you should remove...


Posted: December 6, 2011 | Category: Trojans | Threat Level: 8/10
Trojan:Win64/Sirefef.C is a Trojan-dropper which is installed by a similar Trojan, another Trojan-dropper, Trojan:Win64/Sirefef.J. Trojan:Win64/Sirefef.C infects the targeted computer system by exploiting security vulnerabilities. The main aim of Trojan:Win64/Sirefef.C is to access the kernel mode, which would compromise the PC and allow hackers to obtain access and control over the affected machine. Trojan:Win64/Sirefef.C can also download and install additional malware threats. Trojan:Win64/Sirefef.C may also try to avoid detection and removal by security software....


Posted: December 5, 2011 | Category: Trojans | Threat Level: 9/10
Troj/Phish-AZ is a phishing Trojan that attempts to steal credit card and identity-related information from your PC. Recent Troj/Phish-AZ attacks have all used social engineering and spam e-mail attacks to encourage victims to give up this information willingly although variants of Troj/Phish-AZ may also attempt to steal information without your consent. Because malware experts have noted that Troj/Phish-AZ is typically-distributed as an attachment in a fake e-mail, it's recommended that you pay close attention to unusual e-mail messages and be careful around...


Posted: December 5, 2011 | Category: Viruses | Threat Level: 8/10
Win32:Virus/Ramnit.AF is a malicious computer virus which adds dangerous scripts into executables, MS Office files and other objects. The insertion is not limited to particular site of the affected object, for example, the added scripts can appear at the beginning, the middle and the end of the carrier. The corrupted object becomes a carrier of Win32:Virus/Ramnit.AF. Win32:Virus/Ramnit.AF contains worm functionality because its copy is added to mapped drives and other locations that can exchange collected data with other PCs. Remove Win32:Virus/Ramnit.AF before it harms your machine.

Posted: December 5, 2011 | Category: Browser Hijackers | Threat Level: 5/10 is a fake search engine as well as a partner with certain types of web browser hijackers that redirect the browser to without consent. The stand-out symptoms of infection by browser hijackers are redirects to after you attempt to use a search engine or another type of popular site (such as Wikipedia). Along with this outright interference of web-surfing activities, malware experts note that is also dangerous due to its...

Posted: December 5, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Screenshot is a malicious and fraudulent search engine site that offers up sponsored search results instead of genuine or relevant links. Since doesn't monitor its results for safety or relevance, using as an actual search engine is not only a waste of time but potentially dangerous for your PC. has gained attention of late due to browser redirect attacks that have redirected web browsers to malware experts warn that these redirects are a symptom of infection by a Trojan, rootkit or other form of...


Posted: December 5, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Broperk is a Trojan that spreads through bundled downloads via illegitimate and unsafe websites. Trojan.Broperk uses a rootkit technique to disguise itself, which makes it complicated to detect and eliminate its malicious files. Trojan.Broperk can cause identity theft or system crack. Trojan.Broperk can delete processes of the disk, modify the Windows Registry and create new folders. Trojan.Broperk can also show fake system security alerts, browser pop-ups and can easily disguise itself from detection of security programs. Trojan.Broperk can contact other computer systems and...


Posted: December 5, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Trabin!rts is a Trojan that can cause serious computer problems. Trojan.Trabin!rts is able to modify the Windows Registry so that it can run automatically every time you start Windows. Trojan.Trabin!rts is closely related to rogue anti-spyware applications. Trojan.Trabin!rts can distribute fake security program to the infected computer. Trojan.Trabin!rts will slow down your computer and lead to financial loses. Trojan.Trabin!rts connects to the Internet without a PC user's consent and then communicate with a remote attacker over an HTTP protocol. Trojan.Trabin!rts gains information...


Posted: December 5, 2011 | Category: Trojans | Threat Level: 8/10
PWSteal.Banker.N is a banking Trojan that invades the affected computer without your permission and knowledge. PWS:Win32/Banker.N is a Trojan that comes from the Win32/Banker family that steals banking data and gathers confidential information. Once executed, PWSteal.Banker.N might slow down your computer and decrease PC performance. PWSteal.Banker.N allows attackers to gain remote access and control over the infected machine. PWSteal.Banker.N can be used to trace and steal information entered onto the compromised PC and might drop malicious programs. PWSteal.Banker.N is able to create a...


Posted: December 5, 2011 | Category: Trojans | Threat Level: 8/10
DDoS:Win32/Dofoil.A is a Trojan that invades the targeted computer system secretly and can harm it. DDoS:Win32/Dofoil.A spreads via spam emails allegedly coming from the American Airlines. The spam email includes a malicious .zip file attachment which is detected as DDoS:Win32/Dofoil.A. If a recipient opens a malicious attachment, his/her computer is infected with DDoS:Win32/Dofoil.A. DDoS:Win32/Dofoil.A can slow down your computer and block you from accessing Task Manager or registry Editor. DDoS:Win32/Dofoil.A is managed through remote servers and is able to initiate DDoS (distributed...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 18348
Home "Articles"