Posted: September 13, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Noviq.A is a Trojan infection that can access your computer system without your permission and install itself without your knowledge. Trojan.Noviq.A can come bundled with with shareware. Trojan.Noviq.A can compromise your privacy and harm your PC system. Trojan.Noviq.A uses a legitimate process name to hide itself and avoid detection from anti-spyware applications. It is strongly advised to delete Trojan.Noviq.A before it destroys your computer system.


Posted: September 13, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Win32.Poison.ckym is a hazardous Trojan that enables remote attackers to obtain access to a compromised computer system. Backdoor.Win32.Poison.ckym propagates through network vulnerabilities and downloads additional malware. Backdoor.Win32.Poison.ckym creates its startup registry entry to run each time Windows boots. Backdoor.Win32.Poison.ckym can secretly send out spam email messages with its built-in SMTP client engine. It is recommended to remove Backdoor.Win32.Poison.ckym as quickly as possible.

Trojan Horse Cryptic.cvd

Posted: September 13, 2011 | Category: Trojans | Threat Level: 9/10
Trojan Horse Cryptic.cvd is a vicious Trojan that is able to run and open a random TCP port in multiple ways to connect to its predefined remote SMTP servers. Trojan Horse Cryptic.cvd spreads via spam email attachments that include a malicious zip file and password protected format with the password included in the email. Trojan Horse Cryptic.cvd may run numerous malicious process to steal confidential information or corrupt other programs. Trojan Horse Cryptic.cvd will download infected files to an affected computer system without the PC user's consent. Trojan Horse Cryptic.cvd can enable...


Posted: September 13, 2011 | Category: Worms | Threat Level: 5/10
Worm.Win32.VBNA.aitt is a malicious network-aware computer worm that tries to replicate across existing networks. Worm.Win32.VBNA.aitt creates a registry value to run each time Windows is booted up. Worm.Win32.VBNA.aitt changes the system settings of an infected PC and executes malicious actions. Worm.Win32.VBNA.aitt can slow down your computer and block your Internet connection.

Posted: September 13, 2011 | Category: Trojans | Threat Level: 9/10 is a Trojan infection that opens a back door that allows remote cybercriminals to gain access to an affected computer system. can download and install other malware threats. spreads via unknown email attachments, instant messaging or even malicious images. will run automatically whenever the malicious file or application is opened. To secure your PC, delete as soon as possible.


Posted: September 13, 2011 | Category: Worms | Threat Level: 5/10
W32/Autorun.worm.aaav is a malicious computer worm that can replicate itself across a network. W32/Autorun.worm.aaav adds its registry entry to run each time malicious media is inserted into the targeted PC. W32/Autorun.worm.aaav will also try to download and install corrupt files from the web. Delete W32/Autorun.worm.aaav immediately upon detection.

Posted: September 13, 2011 | Category: Rogue Websites is a recent entry into the chain of fake search engine websites that are cloned from the same simple template that's used by ,, , , and other malicious search engine sites. Since malware experts have found that not only provides inaccurate and potentially harmful search results, but also utilizes browser hijackers to bloat its traffic artificially, it's strongly recommended that you avoid even the slightest contact with If...


Posted: September 13, 2011 | Category: Trojans | Threat Level: 8/10
Win32.CoinMiner is a mining client for Windows that creates coins for the BitCoin decentralized economy by conducting some highly complex computations. Win32.CoinMiner may be distributed by other malware threats and run without a PC user's knowledge. Win32.CoinMiner uses system CPU intensively to create coins. Win32.CoinMiner isn't a malware infection, but the fact that it operates in the background makes it popular among cybercriminals to drop it to affected PC users' computers without their knowledge. Then Win32.CoinMiner uses the targeted machine's CPU and creates coins for...


Posted: September 12, 2011 | Category: Trojans | Threat Level: 9/10
Trojan.Paccyn!inf is a Trojan infection that can gather your personal information and transmit it to remote cyber-criminals without your knowledge or permission. Trojan.Paccyn!inf is able to avoid detection of security applications to control a program, computer or network. Trojan.Paccyn!inf consumes a large amount of system resources, notably slows down your computer's speed and makes it stuck frequently. Trojan.Paccyn!inf may display fake security alerts and warning messages. Trojan.Paccyn!inf may also display numerous irritating pop-up advertisements.


Posted: September 12, 2011 | Category: Trojans | Threat Level: 9/10
Trojan.Win32.Monder.apie is a vicious Trojan that is able to infiltrate into an infected PC system without a user's permission and knowledge. Once Trojan.Win32.Monder.apie is installed on a targeted machine, it can slow down your computer's speed and lead to PC system freezes and crashes. Trojan.Win32.Monder.apie can block you from opening some applications. Trojan.Win32.Monder.apie will add new strange shortcut icons on your Desktop that will trick you into opening malicious websites, which can compromise your privacy. To protect your PC from damage, remove Trojan.Win32.Monder.apie as soon...


Posted: September 12, 2011 | Category: Trojans | Threat Level: 9/10
According to researchers and analysts, Trojan.Win32.Autoit.aks is considered a nasty Trojan horse that was envisioned and created by criminals, in order to secretly infect and thus enable them to gain effortless remote access to targeted computer systems. The sole motivation driving these evil hackers – to employ such malicious products like Trojan.Win32.Autoit.aks, as well as others of Trojan.Win32.Autoit.aks' kind – is to enable them to utilize their seditious creations against you and your computer system.   Trojan.Win32.Autoit.aks is a nasty, secretive and...


Posted: September 12, 2011 | Category: Backdoors | Threat Level: 6/10
Just as this malicious security threat's name infers, Backdoor.Win32.Poison.aec poses a serious, high-risk security threat that is, literally, POISON to any computer system Backdoor.Win32.Poison.aec comes across. Backdoor.Win32.Poison.aec has been identified and classified by security analysts, as a malicious Trojan horse that seeks to secretively and deceptively infiltrate and infect targeted computer systems, without first receiving any kind of user authorization. Backdoor.Win32.Poison.aec is a horrible PC infection that is most known for...

Posted: September 12, 2011 | Category: Rogue Websites is a fraudulent search engine website that offers inaccurate, harmful and advertisement-based results, instead of the genuine shopping links that claims to be able to provide. Like many similar websites that have been analyzed by anti-malware researchers, uses a variant of the Google Redirect Virus to redirect your web browser to, regardless of your wishes. Because browser hijackers can also contain spyware-related functions or be able to install other types of malicious software, you should consider any contact...

‘Free Facebook Birthday T-Shirt’ Scam Steals Secret Facebook Mobile Email Addresses

Posted: September 9, 2011 | Category: Phishing
The 'Facebook Birthday Free T-Shirt' scam is a recent scam that utilizes the social networking website's name to lure you into giving away your Facebook account information. Once it's done this, 'Facebook Birthday Free T-Shirt' scam will not only refuse to give you the prize that 'Facebook Birthday Free T-Shirt' scam offered, but 'Facebook Birthday Free T-Shirt' scam will actually take over your account and use it to collect private information and transmit malicious links and files. Since the 'Facebook Birthday Free T-Shirt' scam uses your Facebook Mobile Secondary ID...

Posted: September 9, 2011 | Category: Backdoors | Threat Level: 6/10 is a seditious backdoor Trojan that hides itself deeply in the computer system to avoid detection from security applications. runs automatically each time when you start your PC. Once installed on a compromised machine, is able to block any anti-virus software. can gather and steal your personal information in order to transmit it to remote cyber-criminals. It is strongly advised to delete immediately with a malware removal tool.

Trojan horse generic 22

Posted: September 9, 2011 | Category: Trojans | Threat Level: 9/10
Trojan horse generic 22 is a hazardous Trojan that can secretly access the targeted computer system. Trojan horse generic 22 can control your Internet habits and track which websites you've visited. The Trojan horse generic 22 might show a pop-up window and ask for your personal details, and then forward them to the remote attacker. Trojan horse generic 22 may use your sensitive data to create its own malicious banner ads, and show them on top of the normal banner ads when you visit other websites. Once Trojan horse generic 22 is installed on the corrupted PC, it keeps loading a critical...

Posted: September 9, 2011 | Category: Rootkits | Threat Level: 10/10 is a rootkit that disables legitimate anti-virus software, blocks Windows programs from running and shows security warning messages. Once installed, may slow down your PC performance and reduce network speed. can install its startup entry on the corrupted PC to run itself each time you start your computer. To protect your machine from damage, download a dependable anti-malware program with rootkit removal capabilities to remove


Posted: September 9, 2011 | Category: Trojans | Threat Level: 9/10
DOS/Alureon.A is the detection for a variant of the Alureon Trojan family that affects the Master Boot Record (MBR). DOS/Alureon.A creates malicious files in the file system directory. DOS/Alureon.A installs with the remote host to download corrupt files onto the infected PC system environment. DOS/Alureon.A can spread via the network if the malicious drive is shared on the network and allow the hacker to obtain remote access to the affected PC computer. Eliminate DOS/Alureon.A from the corrupted machine as quickly as possible.


Posted: September 9, 2011 | Category: Trojans | Threat Level: 9/10
Trojan-Spy.Win32.Ardamax.kgw is a malicious Trojan which enables remote cyber-criminals to get access to the affected computer system. Trojan-Spy.Win32.Ardamax.kgw takes over precious system resources and tracks your Internet habits to record and/or steal your confidential information. Trojan-Spy.Win32.Ardamax.kgw creates pop-up advertisements to disturb PC users every minute and load numerous malicious files to the PC system without its victim's permission or knowledge. Trojan-Spy.Win32.Ardamax.kgw and other malware infections related to it may record and reset your account settings or...

Posted: September 9, 2011 | Category: Rogue Websites is a website that sells Personal Shield Pro , a confirmed rogue security product that creates fake warning messages and other issues, in exchange for your money. malware research team has also noted recent attacks that utilize browser hijackers, which may force you to visit Since has been known to use automated installation exploits to force visiting computers to install Personal Shield Pro, it's particularly important to deal with a browser hijacker...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 17918
Home "Articles"