Posted: April 4, 2011 | Category: Worms | Threat Level: 5/10
Worm:Win32/Vobfus.AD is a malicious computer worm that creates autorun.inf to allow secret drives autoplay. Worm:Win32/Vobfus.AD is able to slow down your system and make it work weirdly. Worm:Win32/Vobfus.AD tries to copy itself via networks or security tools vulnerability. Worm:Win32/Vobfus.AD will try to propagate by sending a link that involves a malicious download to all the users email contacts. Worm:Win32/Vobfus.AD is one of the Windows illegitimate malicious programs which may take over system resources. File System Modifications The following files were created in...


Posted: April 4, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Buzus.fqgj is a malicious trojan infection that penetrates your computer system through security loopholes in order to corrupt executable files in Windows system. Trojan.Win32.Buzus.fqgj opens up a backdoor to enable remote access and result in irretrievable harm. Trojan.Win32.Buzus.fqgj injures PCs via adult porn and shareware websites and through spam email advertisements. Trojan.Win32.Buzus.fqgj can create a start-up registry entry to allow its automatic execution at every time Windows starts. Trojan.Win32.Buzus.fqgj also downloads additional malware onto the affected...


Posted: April 4, 2011 | Category: Trojans | Threat Level: 8/10
Backdoor.Win32.Poison.bvoy is a dangerous backdoor trojan that runs in the background and emnables remote access to the targeted computer system. Backdoor.Win32.Poison.bvoy shows a number of disturbing pop-up alerts or malware threats to declare your machine is attacked seriously. Backdoor.Win32.Poison.bvoy also injects a code onto the explorer.exe that will check existence of the corrupt files on a hard disk and in the registry. Backdoor.Win32.Poison.bvoy includes full characteristics of an identified security risk. Remove Backdoor.Win32.Poison.bvoy as quickly as possible to secure your PC...


Posted: April 4, 2011 | Category: Trojans | Threat Level: 8/10
Mal/Banker-AG is a dangerous trojan infection that is able to steal personal details gathered on an affected computer and sends the collected information to a distant source. Mal/Banker-AG imitates to be a reputable security application. Mal/Banker-AG is shown through bogus online scanners that claim your computer is corrupted with malware. When Mal/Banker-AG invades your computer system, it offers you to do a full system scan, in order to optimize the PC performance and remove the detected errors. Mal/Banker-AG runs system scanners after computer boots up and at set intervals, shows...


Posted: April 1, 2011 | Category: Worms | Threat Level: 5/10
Malware.Pilleuz!rem is a worm that attempts to reproduce through Instant Messaging Programs. Malware.Pilleuz!rem may subvert the buddy lists, address books, and other contacts of users to try to infect all possible contacts with an outer appearance of being a legitimate message or link. Malware.Pilleuz!rem has been identified as quite a security risk capable of various malicious actions. Aggressive extermination is warranted should you find yourself infected by Malware.Pilleuz!rem, and before it spreads further. Malware.Pilleuz!rem Plants its Seeds in Your Message Windows Computers...


Posted: April 1, 2011 | Category: Trojans | Threat Level: 9/10
Trojan-Downloader.Delphi is a PC Trojan horse that could modify system settings and degrade security protection. Trojan-Downloader.Delphi could make a system vulnerable to remote attacks. A system infected with Trojan-Downloader.Delphi is at risk of running slowly and returning various system error messages. Removal of Trojan-Downloader.Delphi can be accomplished through the use of a proven spyware removal application.


Posted: April 1, 2011 | Category: Trojans | Threat Level: 8/10
Trojan-Clicker.BAT.Small.ad is a dangerous Trojan that could be a serious threat to the stability and security of a PC. Trojan-Clicker.BAT.Small.ad is known to download other unknown malware to an infected system. Moreover, may allow a remote source to connect to the infected PC where personal data may be put at risk of being stolen. Eliminating the threat of Trojan-Clicker.BAT.Small.ad may be easily accomplished by using a spyware removal program to safely detect and remove Trojan-Clicker.BAT.Small.ad and any related files.


Posted: April 1, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Agent.cuf is a Trojan and a dangerous hacker application that may be used to infiltrate a computer. Once infiltrated through the use of Trojan.Win32.Agent.cuf, a remote hacker could steal personal data stored on the infected system. In an effort to prevent repercussions from Trojan.Win32.Agent.cuf, a computer may use a reputable spyware removal application to rid all traces of the Trojan.Win32.Agent.cuf parasite. Registry Modifications The following newly produced Registry Values are: HKEY..\..\..\.. {Subkeys} HKEY_CURRENT_USER\Software\BIFROST1.2...


Posted: April 1, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Agent.BSBC is a serious security threat to an infected PC. Trojan.Agent.BSBC has been known to have the ability to open up an infected system to outside attackers where files may be stolen. Trojan.Agent.BSBC is able to reduce system performance and render the internet almost useless at times due to it producing an abundance of outbound network traffic. To completely eliminate the threat and security risk that comes with Trojan.Agent.BSBC, it is advisable that an updated spyware removal tool be used.

Generic Keylogger.ai

Posted: April 1, 2011 | Category: Trojans | Threat Level: 9/10
Generic Keylogger.ai is a dangerous key logging application. Generic Keylogger.ai may record keystrokes and other computer actions. A hacker may be able to utilize the Generic Keylogger.ai parasite to modify PC settings that could degrade performance and reduce overall security. Detection and removal of Generic Keylogger.ai can be successfully performed using a trusted spyware removal tool instead of potentially causing damage by manual removal.


Posted: March 31, 2011 | Category: Trojans | Threat Level: 9/10
Trojan.Crypt.Delf.F is a computer Trojan that is known to slip onto targeted computer systems through a backdoor vulnerability in their security defenses. These backdoor vulnerabilities are most often discovered by remote hackers and then employed to inject Trojan.Crypt.Delf.F onto targeted computers. Criminal hackers are known to utilize backdoor portals to infect computer systems connected to the Internet, without either their users' knowledge or permission. Trojan.Crypt.Delf.F is a sneaky, annoying, and dangerous security threat that should be removed from compromised computer...


Posted: March 31, 2011 | Category: Trojans | Threat Level: 8/10
TrojanDownloader:Win32/Small.AHY is a Trojan parasite that may be capable of turning a computer into a hackers exploitation device. Basically, a parasite as dangerous as TrojanDownloader:Win32/Small.AHY may allow a hacker to gain access to stored files and data of the infected PC. It would be wise to take advantage of the removal process of a trusted spyware removal tool to completely eliminate the threat of TrojanDownloader:Win32/Small.AHY.

Generic BackDoor.qz

Posted: March 31, 2011 | Category: Backdoors | Threat Level: 6/10
Generic BackDoor.qz is a dangerous backdoor Trojan that could automatically port malicious files to an infected system. Generic BackDoor.qz is also known for creating different registry entries that allow malware to load at startup of Windows. Generic BackDoor.qz may also flood a system with unnecessary internet traffic causing the internet to become potentially inaccessible.


Posted: March 31, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Staget is a computer Trojan infection. A system populated with Trojan.Win32.Staget and its malicious files could be in danger of being compromised by a remote source. Trojan.Win32.Staget may allow the download of additional malware to the infected PC. Through Trojan.Win32.Staget, a remote hacker could again access to personal files which could lead to identity theft. To completely eliminate the threat of Trojan.Win32.Staget, it may be wise to use an updated spyware removal tool to safely remove Trojan.Win32.Staget.

Microsoft and Security Community Shut Down Spam King ‘Rustock’ Botnet

Posted: March 30, 2011 | Category: Internet Security
Rustock, a network of botnet creators responsible for sending billions of spammed messages a day has been shut down. This major coup was executed by Microsoft with the cooperation of U.S. marshals. After years of endangering so many computers, Rustock's email system and command-and-control servers disintegrated last week. Initially it was unclear whether or not the remission was due to security reasons or reorganization within Rustock. Botnets are technically a group of compromised computers put under the control of a remote host. The remove host usually sends a set of instructions to...


Posted: March 30, 2011 | Category: Trojans | Threat Level: 9/10
Trojan.Regrun is like a snake in the grass only it has been found to be a dangerous Trojan parasite that could slip onto a PC without any notification to the computer user. Trojan.Regrun may put an infected PC at risk of allowing a remote hacker access where files and stored data can be stolen. A reliable anti-spyware program designed to detect and remove Trojans may be used to safely remove Trojan.Regrun.


Posted: March 30, 2011 | Category: Backdoors | Threat Level: 8/10
Backdoor.Jaan is a dangerous Trojan horse that may slip onto a system through a backdoor or vulnerability. Backdoor.Jaan may allow a hacker to gain access remotely where stored data could be compromised. It is important to eliminate the threat of Backdoor.Jaan before an outsider is able to infiltrate the infected system. Backdoor.Jaan is a serious threat to the stability and security of an infected PC.


Posted: March 30, 2011 | Category: Adware | Threat Level: 2/10
Adware.Optserve is a dangerous adware parasite. Adware.Optserve may come as a surprise as it has been known to be installed without a user's interaction. Adware.Optserve is also known to display several misleading adverts that may lead users to malicious sites designed to collect personal information. Removal of Adware.Optserve is strongly recommended to be performed with an anti-spyware program.


Posted: March 30, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Bzud.b is a vicious Trojan horse that may download harmful files from the internet. Trojan.Win32.Bzud.b may also put an infected system at risk of a remote hacker connecting to it. Through Trojan.Win32.Bzud.b, a hacker could steal data stored on the hard drive. To completely eliminate the threat of Trojan.Win32.Bzud.b, it may be necessary to use a good anti-spyware program to safely remove Trojan.Win32.Bzud.b and any related malware files. File System Modifications The following files were created in the system:


Posted: March 30, 2011 | Category: Dialers | Threat Level: 7/10
Dialer.Siggen is a malware parasite that may utilize a PC's internet connection without the permission of the computer user. Dialer.Siggen may also dial international numbers that end up charging premium rates to the computer user. It is important that a parasite as devious as Dialer.Siggen should be immediately removed with the use of a spyware removal program the instant that it is detected.
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 17162
Home "Articles"