HPI trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a potent threat for those, who have no reliable defence on their PCs. HPI may be used by the hacker for breaking into a computer and perform many destructive actions. Some of these actions may damage the user's privacy strongly, that's why it's always recommended to keep your antiviral databases up-to-date in order to protect your computer. The following files were created in the system:

Hero Remote Control

Posted: March 28, 2006 | Category: Trojans
Although this software was originally created for harmless purposes , nowadays hackers can also use this tool successfully for breaking into PCs. The hacker, who gets a partial control over the infected machine, is able to make a lot of problems, such as stealing passwords or confidential messages. It is recommended to make sure that your PC is not infected with this spyware by performing a full computer scan. The following files were created in the system:

WinFixer

Posted: March 28, 2006 | Category: Malware
WinFixer is a commercial product that pretends to be a legitimate system tool. WinFixer is actually spyware, which continuously displays annoying false reports of purportedly detected system problems, errors and parasite threats. This may trick the user into thinking that the program is not a security threat and make the user purchase a version of WinFixer.

Rivon

Posted: March 28, 2006 | Category: Worms
Rivon, also known as Attech, is an Internet worm, which spreads by e-mail and through file sharing networks. It usually arrives in infected executable files attached to bogus e-mail messages. The user can also download the spyware as a purportedly useful application using a peer-to-peer software. The following files were created in the system:

WinHound

Posted: March 28, 2006 | Category: Trojans
WinHound is a trojan, which silently installs itself to vulnerable computers by exploiting certain system or web browser security flaws. Once executed, WinHound installs several other dangerous threats, changes the Internet Explorer default home page and the desktop wallpaper. The new wallpaper issues fake warnings on your computer in order to make the user to buy it's version. WinHound can use a rootkit to cloak its files, running processes and other related objects.

Feebs

Posted: March 28, 2006 | Category: Worms
Feebs is a family of worms that is designed to spread using email or P2P networks. Feebs usually arrives as a HTML application file that installs the worm on infected system. Once it is executed, Feebs hides itself deeply in the system using rootkit techniques. Feebs lowers security settings on the compromised machine and may send your personal information to the remote attacker.

UnSpyPC

Posted: March 28, 2006 | Category: Adware
UnSpyPC is a fake anti-spyware program that is often downloaded and installed without user knowledge or consent by a Trojan or through browser security holes. UnSpyPC launches on Windows startup and may generate large numbers of popup adverts. It will also display notifications of imaginary security risks in its attempts to get the user to purchase the full version. This program can be extremely difficult to remove manually, and will continue to try to recreate itself.

KarmaHotel Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan may become a real threat for the privacy of those users, who use mIRC often. After sneaking into a target computer as a HTML-file, KarmaHotel Trojan creates an infected INI-file and performs many actions, which search for IRC client and infects it. As a result of the infection, the hacker gets an opportunity to control victim's PC by downloading and uploading many files, change computer settings and even read confidential messages from mIRC. The following files were...

HTML Infector

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually hides itself in HTML-files and tries to sneak into the computer when an infected file is run. HTML Infector usually performs a set of destructive actions; some of these actions may become a reason of several serious problems and lead to brutal consequences . The following files were created in the system:

Humble Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan; this means it doesn't strive to infect as many machines as possible, but concentrates on harming one specific PC. By performing many destructive actions Humble Trojan is able to damage many key files or computer components. This technique may often lead to serious consequences, such as computer instability or the loss of important data. The following files were created in the system:

Hungry Trojan

Posted: March 28, 2006 | Category: Trojans
Hungry Trojan usually sneaks into the target computer from many Internet resources or e-mail messages from unknown senders. This spyware performs a set of destructive actions on the infected computer; some of these actions are really able to make computer work in unstable way or lead to other serious consequences . It is always recommended to detect and remove this pest from the machine as soon as possible. The following files were created in the system:

Icup Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is always a serious threat for those users, who have no reliable defence installed on their PCs. After sneaking into a computer, Icup Trojan usually performs a set of destructive actions . It's strongly recommended to remove this pest from the infected machine as soon as possible. The following files were created in the system:

BaciamiStupido

Posted: March 28, 2006 | Category: Dialers
BaciamiStupido is a dialer that connects a compromised PC to the Internet by dialing a high-cost phone number using a modem. It provides access to paid pornographic web resources. The dialer changes the Internet Explorer default home page and lowers the web browser's security settings. BaciamiStupido is installed while visiting some pornographic web sites.

Cleevix

Posted: March 28, 2006 | Category: Viruses
Cleevix is a virus that infects all the executable files located in a current folder, main Windows and default computer directories. The spyware doesn't overwrite the target files, but only appends malicious code to them. Cleevix may show certain messages providing information about its authors.

Delf.aeo

Posted: March 28, 2006 | Category: Trojans
Delf.aeo is a trojan designed to access the Internet and contact predetermined web resources. The spyware usually downloads and runs other malware pests or viral threats. It may also retrieve certain information and transfer user sensitive data to malicious persons. Delf.aeo can be installed and used by some widely spread spywares. The trojan automatically runs on every Windows startup.

Webprefix

Posted: March 28, 2006 | Category: Trojans
Webprefix is an adware application that shows commercial advertisements. It also regularly contacts a predetermined web site in order to retrieve updated configuration settings and transfer collected computer information. Webprefix must be manually installed. The application works as the Internet Explorer add-on and therefore runs every time the user launches the web browser.

Kidda

Posted: March 28, 2006 | Category: Spyware
Kidda is an Internet Explorer toolbar that changes the web browser's default home page without asking for user permission. The application also secretly enables ActiveX and JavaScript support, even if it was disabled by the user. Kidda must be manually installed. It runs every time the user launches Internet Explorer.

Egyrank

Posted: March 28, 2006 | Category: Browser Helper Object
Egyrank is an Internet Explorer toolbar that tracks user Internet activity and transfers gathered information to a predefined web server. The threat also changes the web browser's default home and search pages as well as some related settings. Egyrank also enables ActiveX and JavaScript support even if the user disabled it. The application must be manually installed. It runs every time the user launches Internet Explorer.

IE Start Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually infects a computer with no good defence installed on it via many Internet resources, such as suspicious web pages. IE Start Trojan usually performs a set of destructive actions, such as modifying Internet Explorer settings , that's why it's important to keep your antiviral application up-to-date in order to prevent this spyware from sneaking into your machine. The following files were created in the system:

IExplores Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a really dangerous spyware, which may infect any computer with no proper defence via many Internet resources or e-mail messages. After infecting a PC, IExplores Trojan gives the hacker almost complete control over machine. The hacker is able to perform many destructive actions, which usually strongly damage security and stability. It's always the best choice to remove this pest from the machine as soon as possible. The following files were created in the system: