Posted: May 24, 2013 | Category: Worms | Threat Level: 5/10
Worm:VBS/Jenxcus.A is a Windows worm that attempts to compromise the infected PC's security to grant criminals control over it, in a fashion identical to that of a stereotypical backdoor Trojan. Even with Worm:VBS/Jenxcus.A seemingly replaced by Worm:VBS/Dunihi.A , an upgrade to it with additional command support, Worm:VBS/Jenxcus.A still is a major security risk for any computer compromised by Worm:VBS/Dunihi.A, with the potential for installing other threatening software or allowing criminals to access sensitive information. Anti-malware solutions should be engaged for removing...


Posted: May 24, 2013 | Category: Trojans | Threat Level: 8/10
Trojan.Lapka is a Trojan that opens a back door on the targeted computer. When run, Trojan.Lapka creates a copy of itself as the potentially malicious file. Trojan.Lapka creates the potentially malicious files. Trojan.Lapka then creates the registry entries to register itself as a system service. Trojan.Lapka then creates the registry entries to register itself as a legacy driver service. Trojan.Lapka also modifies the registry entries.


Posted: May 24, 2013 | Category: Adware
Win.Adware.Agent-2573 is an adware program that's often associated with browser hijackers and the presence of unwanted browser add-ons or PUPs. Although sites that promote Win.Adware.Agent-2573 do so through manual downloads (as opposed to exploits that could install Win.Adware.Agent-2573 without your consent), these downloads are disguised or promoted in a deceptive way that make Win.Adware.Agent-2573's installation come as an unpleasant surprise to the PC's user. The most likely source of a Win.Adware.Agent-2573 infection is through questionable download-managing utilities, and to...


Posted: May 24, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Syndicasec is a Trojan that steals information and downloads files on to the infected computer. When executed, Trojan.Syndicasec creates the potentially malicious files. Trojan.Syndicasec then collects the information including host name, OS version and MAC address from the affected computer. Trojan.Syndicasec transfers the above information to the certain locations. Trojan.Syndicasec downloads a JavaScript from one of the locations and executes it.


Posted: May 23, 2013 | Category: Adware | Threat Level: 2/10
WebCake is an adware program that is supposed to enhance your browsing experience but, in fact, it causes numerous problems on an affected computer system. Although WebCake states to be a great program that can provide PC users with the best offers and discount coupons, as well as an option to compare prices of certain products and services, it leads to more inconveniences than benefits. WebCake invades the targeted computer without the victimized PC user's consent and, therefore, it is also categorized as a potentially unwanted program. WebCake is usually installed onto the affected...

Searchrocket Hijacker

Posted: May 23, 2013 | Category: Browser Hijackers | Threat Level: 5/10
The Searchrocket Hijacker is a browser hijacker that specializes in redirecting your browser's searches to Websearch.Searchrocket.info, which actually doesn't have any search features of its own at all. The site promoted by the Searchrocket Hijacker, in turn, promotes the Web-searching features of Smartshopping.com, which malware experts consider less than perfectly relevant and which may include unwanted advertisements. Although Searchrocket.info is not necessarily harmful for your browser or the rest of your PC, a Searchrocket Hijacker – or any other browser hijacker that removes your...


Posted: May 23, 2013 | Category: Malware | Threat Level: 7/10
Exploit:JS/Coolex.D is a script, which is included in an exploit pack known as the 'Cool exploit kit'. Exploit:JS/Coolex.D can install other security threats on the targeted computer through exploiting software vulnerabilities in Java version 7, update 17 and earlier. As the Cool Exploit Kit and the Blacole Exploit Kit share malicious web page patterns and exploits, in some instances a PC user might see Exploit:JS/Blacole detected on the computer alongside Exploit:JS/Coolex.D. Exploit:JS/Coolex.D is loaded if the computer user visits a malicious or hijacked website. The hijacked web...


Posted: May 23, 2013 | Category: Worms | Threat Level: 5/10
Worm:MSIL/Murkados.A is a worm, which circulates via removable drives. Worm:MSIL/Murkados.A downloads Chrome web browser extension files that change the way the web browser operates. Worm:MSIL/Murkados.A is distributed by affecting removable devices, such as a USB stick or flash drive. When installed on the infected computer, Worm:MSIL/Murkados.Amakes system changes by downloading the potentially malicious files and making registry modifications to assure it loads automatically every time Windows starts. Worm:MSIL/Murkados.A may also close Google Chrome Internet browser unexpectedly. Once...


Posted: May 23, 2013 | Category: Trojans
TrojanSpy:Win32/Usteal is a family of toolkit-created spyware programs that steal login information related to a wide range of programs, including instant messengers, e-mail clients, your Web browsers and even some brands of online games. TrojanSpy:Win32/Usteal family-based Trojans are distributed in two major ways: through being installed along with unrelated programs (usually ones related to illegal gaming activities, such as hack tools) or by being installed by other forms of Trojans, such as members of the Trojan.LockScreen family of ransomware. TrojanSpy:Win32/Usteal's variants do...


Posted: May 23, 2013 | Category: Trojans | Threat Level: 9/10
The Black Revolution Trojan (more technically known as Trojan.BlackRev) is a backdoor Trojan that's used for initiating a sophisticated variety of DDoS attacks – website-flooding attacks that can crash a domain through the rapid influx of artificial traffic spikes. DDoS attacks mainly are problematic for your own PC in the sense that they may exploit an excessive amount of the infected computer's resources and, as a result, cause system instability. Even though their attacks aren't targeted directly at the computers they've infected, Trojan.BlackRev and related botnets always should be...


Posted: May 22, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Incodboot is a Trojan that modifies the master boot record (MBR) on the targeted PC. Trojan.Incodboot allows attackers to gain full remote access and control of the infected computer. Trojan.Incodboot may drop and install additional malware infections on the affected computer. Trojan.Incodboot may gather personal information from victims and transfer it to a remote server. Trojan.Incodboot may spread via unsafe software downloads, malicious websites, spam email attachments.


Posted: May 22, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Modred is a Trojan that redirects Internet traffic on the affected computer. Trojan.Modred may be distributed to a vulnerable computer system together with other malicious applications. Trojan.Modred may slow down the targeted PC and Internet connection. Trojan.Modred may download and install other malware threats onto the corrupted PC. Trojan.Modred allows attackers to gain remote unauthorized access and control of the victimized computer system. Trojan.Modred may control the attacked computer user's browsing habits and grab sensitive personal details.


Posted: May 22, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Pandex.C is a Trojan that sends spam from a remote server and collects email addresses from the affected computer. Trojan.Pandex.C may attempt to act as a legal program in an effort to fool target computer users into downloading and installing it on the corrupted PC. When run, Trojan.Pandex.C may contact a remote server to receive instructions or new configuration data and download additional security infections to the infected computer system. Trojan.Pandex.C enables attackers to gain remote unauthorized access and control over the compromised PC. Trojan.Pandex.C can steal your...


Posted: May 22, 2013 | Category: Backdoors | Threat Level: 6/10
Backdoor:Win32/Vawtrak.A is a backdoor Trojan that allows an attacker to gain full remote access and control of the infected computer system. Backdoor:Win32/Vawtrak.A can also steal information like login information if a target PC user visits specific banking websites. Backdoor:Win32/Vawtrak.A is used by scammers to compromise personal financial information of a victimized computer user. Backdoor:Win32/Vawtrak.A strives to steal sensitive and confidential information from the attacked computer user to commit fraud. Backdoor:Win32/Vawtrak.A may steal the target PC user's information by...


Posted: May 22, 2013 | Category: Browser Hijackers
Screenshot Dnsbasic.com is a fake search engine that's cloned from similar attempts by previous web domains to expose their traffic to irrelevant and, in some cases, malicious content. Because SpywareRemove.com malware experts have witnessed a sharp upturn in Dnsbasic.com-based hijacks since April of this year, you should exercise all appropriate browser-based precautions to keep your PC's web-browsing settings from being changed in ways that redirect you to Dnsbasic.com by force. Contact with Dnsbasic.com in any way always should be treated as a potential infection vector, and you should remove...

POLIZEI Cyber Crime Investigation Department Virus

Posted: May 22, 2013 | Category: Ransomware | Threat Level: 10/10
Screenshot The POLIZEI Cyber Crime Investigation Department Virus is a Police Trojan specialized for attacking residents of Austria, but with a strong resemblance to previous PC threats that have been known to target other countries (particularly other European ones). With pop-up warnings that accuse you of using your computer to commit various crimes of a common and potentially embarrassing nature, the POLIZEI Cyber Crime Investigation Department Virus tries to block your computer and entice you into paying a fictitious legal fine. Any money transferred through the means POLIZEI Cyber Crime...

Swagbucks Toolbar

Posted: May 21, 2013 | Category: Bad Toolbars | Threat Level: 5/10
Swagbucks Toolbar is a potentially unwanted toolbar that once installed on the vulnerable computer changes the default home page, default search engine and new tab page to Search.swagbucks.com. Swagbucks Toolbart might also be called the SBTV Toolbar or Swag Code Toolbar. Swagbucks.com enables Internet users to earn virtual currency by searching the web, shopping at their favorite retailers, engaging in other activities such as submitting polls, phone recycling, and completing special offers. Swagbucks Toolbar is owed by Prodege LLC. While the Swagbucks Toolbar itself as well as the...


Posted: May 21, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Smackdown is a Trojan that may download other PC threats onto the corrupted PC and steal information. Trojan.Smackdown grabs the information from the targeted computer including system name, malicious file location, computer compromised date and network adapter information. Trojan.Smackdown reports this information back to the command-and-control (C&C) server using the specific form. Trojan.Smackdown can download additional modules including uploader, info get, keylogger, cameraman and backdoor shell, which are found as Trojan.Hangove.


Posted: May 21, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Smackup is a Trojan that steals information from the affected computer. When Trojan.Smackup is executed, it creates the potentially malicious files on the compromised PC. Trojan.Smackup makes changes to the attributes of the files in order to disguise them from the PC user. Trojan.Smackup creates the registry entries so that it can run automatically every time Windows is started. Trojan.Smackup grabs system information and stores it in the particular file. Trojan.Smackup also collects files with the files extensions such as .doc, .docx, .xlsx, .ppt, .pptx and .pdf. Trojan.Smackup...


Posted: May 21, 2013 | Category: Trojans | Threat Level: 9/10
Trojan.Hangove is a Trojan that opens a back door on the infected computer. Trojan.Hangove allows attackers to gain remote unauthorized access and control over the affected computer. Trojan.Hangove may steal personal information from target computer users. Trojan.Hangove may gather computer data and private details on the compromised PC and transfer them to a remote server. Trojan.Hangove may drop and install other malware threats on the attacked PC. Trojan.Hangove may download malicious files and modify the Windows Registry. Trojan.Hangove may create the registry entry so that it can...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 20843
Home "Articles"