U-Search.net

Posted: September 18, 2012 | Category: Browser Hijackers
U-Search.net is a search engine site that claims to give you access to search results 'without limits', even though its actual capabilities have resulted in its being blacklisted for association with spammers. There are close ties between U-Search.net and browser-hijacking PC threats that redirect your searches to U-Search.net even when you're trying to use unrelated websites. Persistent redirects to U-Search.net or settings changes that force you to visit U-Search.net should be considered...

Win32:MalOb-IJ

Posted: September 17, 2012 | Category: Trojans
Win32:MalOb-IJ is a cryptic Trojan that emerges for randomly named .exe and .msi files on affected computers with 32-bit operating systems. Win32:MalOb-IJ can be distributed together with other malicious applications. Win32:MalOb-IJ] may slow down the targeted computer and Internet connection. Win32:MalOb-IJ can download and install other malware threats onto your PC. Win32:MalOb-IJ may also spam you with commercial advertisements. Win32:MalOb-IJ can control your your browsing habits and...

Win32/SpyVoltar.A

Posted: September 17, 2012 | Category: Trojans
Win32/SpyVoltar.A is a browser hijacker that may change your browser's settings, display pop-ups, block websites, monitor your web-browsing activities or redirect you to unusual sites. Because Win32/SpyVoltar.A and other members of the SpyVoltar family usually install themselves secretively without acquiring your consent, most forms of Win32/SpyVoltar.A infections are acquired through drive-by-downloads or infection by related PC threats. Win32/SpyVoltar.A attacks are most prominent in...

Win32:Patched-AKC

Posted: September 17, 2012 | Category: Trojans
Win32:Patched-AKC is a Trojan that attempts to avoid detection and removal by security tools and, thus, might be difficult to find and remove from the infected computer system. Win32:Patched-AKC attaches its code to critical legitimate system files. If not removed appropriately from the compromised PC that is together with genuine system files, Win32:Patched-AKC can make serious damage to the computer. Win32:Patched-AKC connects to a remote Command and Control (C&C) server in order to...

Win32:Downloader-PRT

Posted: September 17, 2012 | Category: Trojans
Win32:Downloader-PRT is a Trojan that stealthily downloads and installs additional malware threats onto the infected computer. Win32:Downloader-PRT spreads as a .prt file which, in truth, is malicious. Win32:Downloader-PRT allows attackers to gain remote access and control over the corrupted PC. Win32:Downloader-PRT can set your computer system and personal data security in danger. Win32:Downloader-PRT can gather your personal data and send it to a remote server. Once installed,...

Microsoft Researchers Find New Computers with Pre-Installed ‘Nitol’ Botnet-Type Malware

Posted: September 17, 2012 | Category: Malware News
You would think that the ultimate solution to any computer problems you may be having, including being infected with malware, is to purchase a new system. The unfortunate news to come from Microsoft researchers is that some new computers were found to be pre-installed with a malware threat called Nitol. Researchers from Microsoft currently investigating counterfeit software in China were surprised to find out that new systems booted for the first time were compromised with a botnet. If...

Trojan.html.phishbank.tzx

Posted: September 17, 2012 | Category: Trojans
Trojan.html.phishbank.tzx is a Trojan that is spread by attackers through an HTML object generated for being set to the files on the affected computer. Trojan.html.phishbank.tzx's source may hide in Temporary Files so that events of injection of the malicious script tend to return. Trojan.html.phishbank.tzx adds files in numerous valuable email managers. Trojan.html.phishbank.tzx may be difficult to detect and eliminate from the infected computer system by many security software.

Beware of Malware Pushers Targeting 'Kate Middleton Topless Pictures' Search Results

Posted: September 14, 2012 | Category: Malware News
For many years, hackers have thrived on popular hot-topic search keywords to ramp up their efforts to formalize a business of spreading profitable malware campaigns at the expense of innocent computer users. One of the latest Internet hot-topics showing up on the radar of malware campaign-spreading hackers is the search for terms Kate Middleton surrounding alleged sunbathing topless photos or pregnancy rumors. Fresh off of the heels of news outlets reporting that a French tabloid...

Trojan.Bladabindi.B

Posted: September 14, 2012 | Category: Trojans
Trojan.Bladabindi.B is a Trojan that affects Windows systems. Trojan.Bladabindi.B is a security threat to your privacy and computer. Trojan.Bladabindi.B may enter the corrupted machine through security gaps. Trojan.Bladabindi.B may also be spread via removable devices such as infected USB drives. Trojan.Bladabindi.B can lead to computer functionality problems and involve your computer into various illegitimate activities. Trojan.Bladabindi.B can hide itself on the infected computer and strive...

HTML/JS-Encrypted.gen

Posted: September 14, 2012 | Category: Malware
HTML/JS-Encrypted.gen is a malware threat that contains an HTML code, which may be used to perform malicious activities on the targeted computer. HTML/JS-Encrypted.gen may download and install additional malware threats on the infected computer. HTML/JS-Encrypted.gen may decrease your PC's performance. HTML/JS-Encrypted.gen runs in the background and ensures attackers remote access and control over the affected computer system. HTML/JS-Encrypted.gen may be capable of sending out spam email...

W32/NewMalware-Generic

Posted: September 14, 2012 | Category: Malware
W32/NewMalware-Generic is a malware threat, which enters the targeted computer system secretly via social networks, freeware, shareware, malicious websites, spam messages and other. W32/NewMalware-Generic can lead to serious harm by compromising your PC and stealing personal information and financial data from victims. If your computer has been infected with information, it will display disturbing advertisements or pop-up warning messages. information can also install additional malicious...

Trojan.Script.12023

Posted: September 14, 2012 | Category: Trojans
Trojan.Script.12023 is a Trojan infection which poses a threat to computer's safety. Trojan.Script.12023 makes the hijacked web browser unable to open certain websites. Trojan.Script.12023 hijacks the Internet browser so that security programs that may help in removing Trojan.Script.12023 cannot be downloaded onto the compromised PC. Trojan.Script.12023 is either distributed as the payload of another malware infection or through manual computer user's action by downloading malicious files or...

JS:Trojan.Crypt.EM

Posted: September 14, 2012 | Category: Trojans
JS: Trojan.Crypt.EM is a JavaScript Trojan that pretends to be a legitimate program. JS: Trojan.Crypt.EM slows down the affected computer and takes over computer files or programs. JS: Trojan.Crypt.EM displays annoying pop-up advertisements. JS: Trojan.Crypt.EM allows attackers to gain remote access and control over the corrupted machine. JS: Trojan.Crypt.EM steals personal information including login credentials to banking account. Once installed on a corrupted PC, JS: Trojan.Crypt.EM can...

JS.Proslikefan

Posted: September 14, 2012 | Category: Worms
JS.Proslikefan is a JavaScript worm that circulates through file-sharing applications, removable drives and mapped network shares. Once executed, JS.Proslikefan may copy itself to the certain locations. JS.Proslikefan may alter several files in order to change the PC user's home page. JS.Proslikefan creates the certain registry entry so that it can launch automatically every time Windows is started. JS.Proslikefan also deletes the certain registry subkeys and modifies numerous other registry...

MBR:SST

Posted: September 14, 2012 | Category: Trojans
MBR:SST is a family of rootkits that are often associated with the presence of other PC threats, including rogue antivirus programs. Although MBR:SST isn't necessarily guaranteed to cause any symptoms, SpywareRemove.com malware researchers have noted that attacks linked to MBR:SST tend to result in overall slowdowns for your PC, in addition to any symptoms caused by related malware. Removing MBR:SST requires that you disable both MBR:SST and any other malware on your hard drive, since PC...

Nitol

Posted: September 14, 2012 | Category: Trojans
Pointing a spotlight on the sometimes-shaky links between PC manufacturers and retailers, Nitol is a backdoor Trojan whose distribution scheme includes being built-in by default with counterfeit Windows-brand operating systems. As a result, no action other than unwrapping, plugging in and booting your computer may be necessary for Nitol to launch itself and offer criminals a means of ingress into your computer through a Command & Control server. Obviously, these attacks are most likely...

TrojanSpy:Win32/Banker.AJC

Posted: September 13, 2012 | Category: Trojans
TrojanSpy:Win32/Banker.AJC is a data-stealing Trojan that is a DLL component of the Win32/Banker family. TrojanSpy:Win32/Banker.AJC steals online banking credentials such as account login names and passwords, log keystrokes and sends the gathered information to remote attackers. Mostly, TrojanSpy:Win32/Banker.AJC targets customers of Brazilian banks. TrojanSpy:Win32/Banker.AJC is distributed onto the affected computer by other malware threats, often by variants of the Win32/Banload family....

Trojan.JS.Agent.GLM

Posted: September 13, 2012 | Category: Trojans
Trojan.JS.Agent.GLM is a Trojan that can avoid detection from security applications and infect targeted PCs by exploiting security vulnerabilities. Trojan.JS.Agent.GLM strives to find vulnerabilities and exploit them in an attempt to download and install additional malware threats. Once installed on a compromised machine, Trojan.JS.Agent.GLM will take over system resources and make your computer's performance slow and unstable. Trojan.JS.Agent.GLM can also trace your Internet habits to record...

Trojan.JS.Agent.GHF

Posted: September 13, 2012 | Category: Trojans
Trojan.JS.Agent.GHF is a JavaScript Trojan that uses numerous different methods to identify a malicious code. Trojan.JS.Agent.GHF may contact remote servers to retrieve additional advertising information; the specific URLs contacted are varied. Trojan.JS.Agent.GHF may create a backdoor and contact a remote server to allow a remote attacker to gain control on the compromised machine. Trojan.JS.Agent.GHF can be detected in random Java files. Trojan.JS.Agent.GHF is distributed via social...

Trojan:HTML/Redirector.AI

Posted: September 13, 2012 | Category: Trojans
Trojan:HTML/Redirector.AI is a Trojan that spreads via malicious websites that exploit system vulnerabilities. Trojan:HTML/Redirector.AI can also spread via an HTML-based emails or may be involved as component of an exploit package. Trojan.HTML.Redirector.AI invades the targeted computer without a PC user's permission or knowledge. Trojan.HTML.Redirector.AI redirects victims from one malicious website to another.