Posted: April 15, 2011 | Category: Worms | Threat Level: 5/10
Worm.BAT.Autorun.ex is a malicious network-aware computer worm that tries to replicate across the existing network. Worm.BAT.Autorun.ex changes system settings, leading to a negative effect on the overall computer system security. If there is the file sharing network or the network share is not safe, Worm.BAT.Autorun.ex will corrupt the remote computers. Worm.BAT.Autorun.ex propagates via email attachments or instant messages. You need to delete Worm.BAT.Autorun.ex instantly upon detection.


Posted: April 15, 2011 | Category: Trojans | Threat Level: 8/10
TrojanDropper:Win32/Otlard.B is a malicious computer trojan that falsifies computer scan results that often claim your computer is corrupted. TrojanDropper:Win32/Otlard.B enables remote criminals to get access and control over infected computers. TrojanDropper:Win32/Otlard.B issues bogus security alerts and then constantly offers you to purchase its software to repair the alleged system errors. Remove TrojanDropper:Win32/Otlard.B as quickly as possible before it harms your computer system.


Posted: April 15, 2011 | Category: Malware | Threat Level: 6/10
Avc2011.exe is the primary executable file for the rogue security program Antivirus Clean 2011 . Antivirus Clean 2011 creates scans and system alerts with extremely negative and false content to present itself as a necessary anti-malware utility and then redirects you to Antivirus Clean 2011's website for purchase. However, the rogue security program launched by Avc2011.exe can't actually detect any of the threats Antivirus Clean 2011 claims to fix! Avc2011.exe and related malicious files may also attack your PC by hijacking your web-browsing application, shutting down programs,...


Posted: April 15, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Sky-protection.com is a malicious website and a browser hijacker that redirects your web browser to Sky-protection.com as part of a fraud scheme. Though Sky-protection.com may externally appear to be a good security software website, Sky-protection.com actually markets rogue security programs like Malware Protection . These rogue security programs will deliver false information about your PC state of health to force you to purchase Malware Protection or another Sky-protection.com virtual product. It's recommended that you remove all software related to Sky-protection.com as soon as you...


Posted: April 15, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Softnate.com is a dangerous website known for marketing fake security software, in particular, the rogue Antivirus Protection . Softnate.com's Antivirus Protection product is fraudulently sold to unsuspecting PC users under a variety of names, to keep you from learning Antivirus Protection's true nature – a threat that exudes fake infection-riddled errors and system scans, blocks programs from running and steals control over your web browser. Even brief contact with Softnate.com isn't recommended, since Softnate.com may attack your system through browser security holes and force you to...


Posted: April 14, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Win32.Small.ls is a very malicious backdoor trojan that was created to enable remote access to your computer system to largely take over precious system resource, trace your Internet activities to record/steal your private details. Backdoor.Win32.Small.ls can disable firewall of the affected computer and steal personal details from, such as credit card numbers, online banking login details, etc. Backdoor.Win32.Small.ls also installs adware, spyware and other malicious codes and gives outside attackers unauthorized access to the infected computer.


Posted: April 14, 2011 | Category: Trojans | Threat Level: 8/10
Trojan-Dropper.Win32.Mudrop.asj is a mischievous trojan infection that may activate malicious system processes and conceal itself from firewall and anti-virus software. Trojan-Dropper.Win32.Mudrop.asj runs in the background and enables remote access to the affected computer system. Trojan-Dropper.Win32.Mudrop.asj is able to infect system files on the computer. Trojan-Dropper.Win32.Mudrop.asj can control your web browsing activity as well as obtain access to your personal details. File System Modifications The following files were created in the system:


Posted: April 14, 2011 | Category: Viruses | Threat Level: 8/10
Trojan.Win32.Autoit.aie is a hazardous computer trojan that is used by a remote criminal to steal confidential data collected on the affected computer system. Trojan.Win32.Autoit.aie is produced to attach and damage the data and files on the computer. Trojan.Win32.Autoit.aie is able to gather all your information as well as transmit it to other locations without a user's consent and knowledge. Trojan.Win32.Autoit.aie is a high security risk to the targeted system and even its network environment.


Posted: April 14, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Cossta.hov is a nasty computer trojan that is generated to enable a criminal gain remote access to a compromised computer system for your personal or confidential data, such as your ID numbers, credit card passwords, full name, birthday date, email address, driver's license number and genetic information. Trojan.Win32.Cossta.hov is advertised through the use of malware that installs it automatically onto your computer and through web sites that simulate to be online anti-malware scanners. Trojan.Win32.Cossta.hov usually imitates to scan computer system, prevents certain...


Posted: April 14, 2011 | Category: Worms | Threat Level: 5/10
Worm.Win32.AutoRun.hkk is a self-replicating computer worm that propagates via network drives removable media, and downloads arbitrary files. Worm.Win32.AutoRun.hkk can change the corrupted system's services and compromise SafeBoot registry key(s) in a try to disable the Safe Mode. Worm.Win32.AutoRun.hkk corrupts the PC system via unsolicited spam email attachments, malicious video media codecs, pornographic related images and movie downloads. File System Modifications The following files were created in the system:


Posted: April 14, 2011 | Category: Trojans | Threat Level: 8/10
W32.HLLP.Sality.O is a detection that detects files that are corrupt by a variation of the W32.Sality family virus. W32.HLLP.Sality.O is a very harmful item that is created to enable remote access to your computer to largely take over precious system resource, trace your Internet habits to record/steal your confidential data. W32.HLLP.Sality.O also downloads additional components before the criminals gain the remote access to the targeted PC. W32.HLLP.Sality.O is able to modify various system services, such as Computer Browser, Windows Audio, Network Connections, Cyptographic Services, etc....


Posted: April 14, 2011 | Category: Adware | Threat Level: 2/10
Adware.DirectWeb.j is a malicious adware application that obtains access to a computer system by using Internet Explorer or other web browser security leaks. Adware.DirectWeb.j comes bundled with additional advertiser supported applications, adware or spyware, accordingly, putting a strain on the Internet bandwidth related to the affected computer. Adware.DirectWeb.j may corrupt computers via doubtful file-sharing applications, multimedia downloads, or through unsolicited spam emails.


Posted: April 14, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Dopip.A (Dopip.A) is a dangerous Trojan horse that may be obtained from a malicious download or site infected with malware. When installed, Trojan.Dopip.A may populate the affected system with various malware files. At any given time, Trojan.Dopip.A may allow a remote attacker access to the infected system where personal data may be obtained. It is best to remove Trojan.Dopip.A with a trusted antimalware program.


Posted: April 13, 2011 | Category: Spyware | Threat Level: 6/10
SecurityRisk.OrphanInf is a computer computer trojan that tries to spread via the network and drive or email attachments exploits. SecurityRisk.OrphanInf will perform a system scan and tell you that it has detected numerous malware threats on your computer. SecurityRisk.OrphanInf is installed via computer trojans that show false security alerts about infections and security problems found on your computer, and then forces victims to purchase its fake application. SecurityRisk.OrphanInf installs on your PC system without your consent. File System Modifications The following...


Posted: April 13, 2011 | Category: Trojans | Threat Level: 8/10
PWS.Win32/Zbot.gen!W is a password stealer trojan infection that exploits security vulnerabilities to control your activities and gather stolen usernames, passwords and other personal details from your infected computer. PWS.Win32/Zbot.gen!W may enable a criminal remote access to an affected computer system, and execute various operations. Once PWS.Win32/Zbot.gen!W invades your PC system, it can record your confidential data, such as credit card information, login numbers, etc. PWS.Win32/Zbot.gen!W is a privacy threat that should not be trusted but terminated immediately upon detection with...

Ex-Gucci IT Employee Seeks Revenge on a $200,000 Hacking Spree

Posted: April 13, 2011 | Category: Hackers
A former Gucci employee has recently been charged with allegations of hacking into Gucci America Inc.'s computer network, and partaking in such 'destructive' behavior that resulted in more than a $200,000 loss for the luxury fashion giant. Former employee San Chihlung Yin, 34, worked as a network engineer at Gucci, and prosecutors say that, since being fired in May 2010, Yin has used a secret account that he created while employed by Gucci to hack into the company's computer network. During that time he deleted pertinent data information and shut down various servers and networks, all of...


Posted: April 13, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Gaertob.A is a backdoor trojan that enables unauthorized access and control of an infected computer. Backdoor.Gaertob.A enters a computer system and runs stealthily without your consent or knowledge. Backdoor.Gaertob.A opens up a backdoor to enable remote access to the affected computer. Once the attackers get access to the targeted computer system through the assistance of Backdoor.Gaertob.A, they can use the compromised PC to propagate Backdoor.Gaertob.A through peer to peer file sharing and will make changes to essential settings of the system. Backdoor.Gaertob.A can update...


Posted: April 13, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Scar.cdon is a malicious computer trojan that changes Windows Explorer settings and downloads other corrupt files from remote servers. Trojan.Win32.Scar.cdon creates a start-up registry entry to allow its automatic execution every time Windows starts. Trojan.Win32.Scar.cdon can invade your PC system through browser vulnerabilities, for instance, ActiveX controls are always uploaded to corrupted websites to poison others computers. Trojan.Win32.Scar.cdon may cause frequent system crashes and freezes, data loss and even privacy violations. File System Modifications...


Posted: April 13, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Buzus.cqad is a computer trojan that is created to promote spyware program. Trojan.Win32.Buzus.cqad tries to get as much money as it can from infected computer users. Trojan.Win32.Buzus.cqad will automatically execute corrupt .exe and .dll files at every system start-up. Trojan.Win32.Buzus.cqad corrupts PCs via adult porn and shareware websites and through spam email advertisements. Trojan.Win32.Buzus.cqad blocks the running of other applications to scare victims into believing that their computer systems are poisoned with malware threats. File System Modifications...

HTML:RedirME-inf [Trj]

Posted: April 13, 2011 | Category: Trojans | Threat Level: 8/10
HTML:RedirME-inf [Trj] is a highly dangerous computer trojan that can corrupt your computer system and make it almost unusable. Remove HTML:RedirME-inf [Trj] as quickly as possible to evade data loss and system files infection. HTML:RedirME-inf [Trj] block downloads by showing fake security alerts or canceling them.
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 17212
Home "Articles"