Trojan.Win32.Scar.djln

Posted: May 12, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Win32.Scar.djln is a malicious trojan infection that makes changes to Windows Explorer settings and downloads other corrupt files from external servers. Trojan.Win32.Scar.djln invades and installs the compromised computer system without awareness or consent when you open an unidentified email attachment, image, use instant messaging, etc. Trojan.Win32.Scar.djln can even enable the attacker get remote access to the affected computer. It is highly recommended deleting Trojan.Win32.Scar.djln before it harms your system. File System Modifications The following files were...

BDS/Bifrose.EO.47.backdoor

Posted: May 12, 2011 | Category: Spyware | Threat Level: 6/10
BDS/Bifrose.EO.47.backdoor is a mischievous backdoor trojan that gives free access to computer system for remote attackers. BDS/Bifrose.EO.47.backdoor also orders Internet connection to be allowed, if a computer system is offline. BDS/Bifrose.EO.47.backdoor creates outgoing traffic as the affected PC system is used as a spambot. If BDS/Bifrose.EO.47.backdoor is on your machine, huge part of your web-traffic is created by the backdoor infection. Since BDS/Bifrose.EO.47.backdoor demonstrates infected computer's memory to a remote hacker, it can steal your confidential data. Targeted users are...

Tr/vb.agent.20480.a

Posted: May 12, 2011 | Category: Trojans | Threat Level: 8/10
Tr/vb.agent.20480.a is a computer trojan used to serving other programs. Tr/vb.agent.20480.a invades a PC system under the mask of a content that looks attractive for the computer user. Tr/vb.agent.20480.a is programmed by attackers to scan a computer system for vulnerabilities. If a vulnerability of desired type is identified, Tr/vb.agent.20480.a uses it to download other malware infections. That is exactly what If Tr/vb.agent.20480.a fails to accomplish its payload immediately as no vulnerabilities are found, it will try to generate them by its own. Even if Tr/vb.agent.20480.a fails...

Mal vb-cf

Posted: May 12, 2011 | Category: Malware | Threat Level: 6/10
Mal vb-cf is a malicious computer infection which does not repair the issue even after being deleted, if its payload is executed. That's because Mal vb-cf is also found by other security applications as a dropper trojan. A dropper trojan helps other malware infections invade a PC. Thus, removal of the Mal vb-cf should be accomplished together with the related unwanted content deletion. In addition to that Mal vb-cf is able to download content more precarious than it, Mal vb-cf is known to connect affected computers to websites, which names consist of Russian phrases written in Latin letters...

W32.Nokpuda@mm

Posted: May 11, 2011 | Category: Worms | Threat Level: 5/10
W32.Nokpuda@mm is a self-replicating computer worm that can spread itself without any user interruption. W32.Nokpuda@mm can create an entry to launch itself automatically when you start up the computer system. W32.Nokpuda@mm propagates through network drives, removable drives, email, and file-sharing networks. W32.Minudazash can steal confidential data and enable a remote criminal get control of the computer using a backdoor port. Remove W32.Nokpuda@mm as quickly as possible to protect your computer. File System Modifications The following files were created in the system:

HackTool.Win32.Crypt.sa

Posted: May 11, 2011 | Category: Malware | Threat Level: 6/10
HackTool.Win32.Crypt.sa is a very malicious computer infection that was produced to enable a remote attacker get access to the targeted computer to largely take over precious system resource and track your Internet habits to record or steal your confidential data. HackTool.Win32.Crypt.sa infiltrates and installs the affected computer without a victim's awareness or authorization when he/she opens unidentified email attachment or image, uses instant messaging, etc. HackTool.Win32.Crypt.sa is an identified security threat and has to be eliminated immediately upon detection. File...

HackTool.Win32.Crypt.nq

Posted: May 11, 2011 | Category: Malware | Threat Level: 6/10
HackTool.Win32.Crypt.nq is a malignant computer infection which is cleverly concealed to behave like legitimate spyware removal tool. HackTool.Win32.Crypt.nq is able to occupy all user keystrokes, such as personal information, like login number, password, credit card details, etc. HackTool.Win32.Crypt.nq may cause unauthorized access to personal data and hard drive information with a serious possibility of irretrievable data loss and unstable computer performance. Remove HackTool.Win32.Crypt.nq before it damages your computer system. File System Modifications The following...

Trojan.MSIL.Agent

Posted: May 11, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.MSIL.Agent is a very malicious computer trojan that was created to enable remote access to your computer system to largely capture precious system resources and track your Internet habits to record or steal your confidential data. Trojan.MSIL.Agent opens up firewalls and gathers personal details, such as personal financial information. Trojan.MSIL.Agent invades and installs the corrupted computer without a victim's awareness or consent when he/she opens unknown email attachment or image, use instant messaging, etc. Trojan.MSIL.Agent is very difficult to be detected, because it is...

Trojan.Dropper/win-NV

Posted: May 11, 2011 | Category: Droppers | Threat Level: 8/10
Trojan.Dropper/win-NV is a dropper trojan that uploads into affected computer another parasite. However, whether Trojan.Dropper/win-NV executes its dropping task, it is subject to numerous circumstances so that Trojan.Dropper/win-NV removal may need, or need not, to involve the content it downloads. A lot of viruses, all of which attack Windows systems, have been detected to be dropped by the Trojan.Dropper/win-NV.

Vobfus.gen!D

Posted: May 11, 2011 | Category: Malware | Threat Level: 6/10
Vobfus.gen!D is a malware infection that has two main gaols, to connect to www.codeconline.biz and to disguise system and hidden files. Codeconline.biz is a malicious source of malware downloaded under the guise of codec. Vobfus.gen!D to be supported by the trojan infection is mainly introduced by fake system applications. That is why the computer trojan is often described as subservient to the Vobfus.gen!D. In fact, it carries an adjustable payload and a self-sufficient parasite. Removal of Vobfus.gen!D should be executed taking into account system registry modifications it has...

ScanQuery

Posted: May 11, 2011 | Category: Browser Hijackers | Threat Level: 5/10
ScanQuery is a computer virus and malicious browser hijacker that is a small file that invades your computer system through secret means and constantly reroutes your web browser to the ScanQuery.com website. The main aim of ScanQuery is to redirect you to advertisements. When ScanQuery infects your computer, it controls your information and potentially uses it for malicious purposes. Once ScanQuery is installed onto the computer, it will launch automatically when Windows starts. ScanQuery will create fake report on the Windows registry, system memory and hard drive in order to intimidate...

Adobe PDF Reader Software Upgrade Notification

Posted: May 11, 2011 | Category: Fake Warning Messages
'Adobe PDF Reader Software Upgrade Notification' is a fake email message (or 'spam') used to propagate malicious security applications and gather private information. Although the 'Adobe PDF Reader Software Upgrade Notification' email pretends to be from Adobe, and the corresponding website even fakes a secure connection, the real entity behind this scam only wants to reap the benefits of learning your credit card details and other sensitive information. If you've been exposed to 'Adobe PDF Reader Software Upgrade Notification' websites, you should use good anti-malware scanners to check...

Virus:Win32/Virut.AC

Posted: May 10, 2011 | Category: Viruses | Threat Level: 8/10
Virus:Win32/Virut.AC is a malicious spyware virus which uses malicious tricks to download harmful malware from the web. Once inside a computer system, Virus:Win32/Virut.AC will connect to a remote server and download potentially malicious files. Virus:Win32/Virut.AC may also block a victim's access to the Internet. Virus:Win32/Virut.AC uses a program that downloads files to the local computer that may represent security threat as it is able to modify other files by infecting, prepending, or overwriting them with its own body. Virus:Win32/Virut.AC is a dangerous security threat to your...

Trojan-Spy.Win32.Zbot.amwf

Posted: May 10, 2011 | Category: Trojans | Threat Level: 8/10
Trojan-Spy.Win32.Zbot.amwf is a high severity computer trojan that can record detailed information, such as user's accounts information, passwords, credit cards numbers, websites that a users visits, take screenshot of user's activity and record online chatting. Trojan-Spy.Win32.Zbot.amwf can even make changes to processes and system files and block legitimate security applications from receiving updates. Trojan-Spy.Win32.Zbot.amwf also harms the data and files on the computer which in turn will lead to the improper running of the computer or failure to access the PC system. Remove...

Adware.Reklosoft

Posted: May 10, 2011 | Category: Adware | Threat Level: 2/10
Adware.Reklosoft is a malignant adware program that tries to spread via existing network vulnerability or security tools exploits. Adware.Reklosoft runs in the background that aims at slowing down your computer system by corrupting lots of system resources. Once your computer is affected by Adware.Reklosoft, it will enable a remote host access your affected computer and install many malicious files. If your computer is corrupted by Adware-Reklosoft, the computer performance is abnormal, and your web browser is blocked. Adware.Reklosoft should be removed as quickly as possible once detected....

Downloader.Bancos!gen

Posted: May 10, 2011 | Category: Malware | Threat Level: 6/10
Downloader.Bancos!gen is a malignant computer trojan that can download files to the local computer without a user's authorization that may represent security threat. Downloader.Bancos!gen is a generic detection for a suspicious file that downloads an Infostealer.Bancos. Downloader.Bancos!gen uses lots of advertisements, illustrating falsified information about malware to frighten PC users and force them to purchase their software. Downloader.Bancos!gen executes malicious actions that decrease the security level of the computer. File System Modifications The following files...

Trojan.Loopas.B

Posted: May 10, 2011 | Category: Trojans | Threat Level: 8/10
Trojan.Loopas.B is a damaging computer trojan that seems to be legitimate or integrated into legitimate software, and waits for PC users to load and execute it. Trojan.Loopas.B penetrates and installs the targeted computer system without a victim's awareness or consent when he/she opens unidentified email attachment or image, use instant messaging, etc. Once executed, Trojan.Loopas.B can change desktop background, show and enable the attacker get unauthorized remote access to the affected computer, infect files and break the system, or even leave other nasty malware threats or invade user's...

GamePlayLabs

Posted: May 10, 2011 | Category: Adware | Threat Level: 2/10
GamePlayLabs is an adware program that imitates to help you in your web browsing, but actually just controls your activities, so it can send you advertisements. GamePlayLabs is created to install and initiate other malicious applications on the victim's PC without his/her permission or knowledge. GamePlayLabs can also open up a backdoor through which the criminal can get access to any information gathered on your computer, such as personal and financial information. GamePlayLabs can circulate via the network if the malicious drive is shared on the network and enable the criminal remotely...

M32/Blaster.worm

Posted: May 10, 2011 | Category: Worms | Threat Level: 5/10
M32/Blaster.worm is a malicious worm program that carries a variable payload. M32/Blaster.worm is related to spyware that offers information according to which relevant adjustments are made in line with the algorithm of the M32/Blaster.worm. M32/Blaster.worm successfully propagates using removable and network drives. M32/Blaster.worm is able to replicate itself from affected PCs to network drives and removable drives. A further copy of the M32/Blaster.worm is generated when the network or pen drive or another external source data is copied by unwary computer users to their PC systems....

TR/BHO.Zwangi.728.trojan

Posted: May 10, 2011 | Category: Trojans | Threat Level: 8/10
TR/BHO.Zwangi.728.trojan is a malicious computer trojan that can compromise computer system's integrity by making changes to the PC system that enable it to be used for malicious purposes unidentified to the computer user. Usually, TR/BHO.Zwangi.728.trojan exploits vulnerabilities of installed software to gain remote, unauthorized access to your computer for monitoring the PC without the victim's knowledge. TR/BHO.Zwangi.728.trojan uses malicious tricks to download harmful malware from the web. TR/BHO.Zwangi.728.trojan opens up firewalls and gathers private information, such as personal...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 17362
Home "Articles"