Email-Worm.Zafi is worm designed to spread via p2p networks and emails. Once run on your computer the worm opens a backdoor that allows a remote malicious individual to connect to you computer and gather up your personal information.
Email-Worm.Erkez.F is a mass-mailing worm designed to spread through computer networks by exploiting security holes on machines connected to the Internet. Once it is executed on your machine, Email-Worm.Erkez.F will continue to propagate itself by sending its copies to email addresses gathered from your PC. Occasionally Email-Worm.Erkez.F may download additional malware onto your computer. In addition, Email-Worm.Erkez.F may cause a sluggish performance of your computer. It is recommended to remove Email-Worm.Erkez.F from your machine as soon as possible.
Email-Worm.Erkez.D is an e-mail worm that is capable of self-replication. It can be caught when opening suspicious e-mails, downloading unknown e-mail attachments or using internet file sharing networks. Email-Worm.Erkez.D may change security settings, disable firewalls and even stop antivirus software from working. Your computer may also be remotely hijacked when infected with Email-Worm.Erkez.D, allowing someone else to control various processes of the machine. Email-Worm.Erkez.D is a very high risk parasite to any personal or financial information.
Trojan-PSW.OnLineGames.bs is a Trojan designed to acquire any stored login or password information. It is known to steal online gaming accounts as well as financial information. Trojan-PSW.OnLineGames.bs then sends the stolen content to a remote server.
Trojan-PSW.WOW is a nasty Trojan application designed to log all your keystrokes and scan your hard disk for all the passwords that you store there. Trojan-PSW.WOW then sends all the collected information to its creators. Trojan-PSW.WOW mostly tends to steal online gaming (especially “World Of Warcraft”) and banking passwords. In order to have your system safe, it’s recommended to get rid of Trojan-PSW.WOW immediately.
Trojan-Spy.VB.jo is a spyware Trojan that steals the users personal and financial data. Trojan-Spy.VB.jo then sends the gathered information to a source server.
Trojan-Downloader.Small.fzi is a malicious Trojan programmed to pump the infected PC with various other parasites. Trojan-Downloader.Small.fzi always configures itself to run on startup by creating some files in the Windows system folder.
Worm.Frethem.n is a worm that arrives as an infected email attachment. Worm.Frethem.n uses a MIME header vulnerability and an IFRAME vulnerability so that the attached file is run automatically when the email is viewed on unpatched Microsoft email clients. Worm.Frethem.n may also cause denial-of-service conditions in networks where multiple systems are infected, or large volumes of infected mail are received.
SpyHunter Spyware Definitions Update: v.6.54 (10/05/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: Trojan.Vundo Trojan.Looksky Trojan.FakeAlert Virtumonde Trojan.Downloader.Contravirus SmitFraud Hoax.Renos MicroBillSys...
Adware.BHO.cn is an adware program that embeds itself into your web browser as a Browser Helper Object (BHO). Once installed on your PC, this parasite will connect to the Internet and download and display large amounts of annoying popup and pop-under advertising. It may also compromise the stability of your browser.
MalWarrior 2007 is a corrupt anti-spyware program that purposively offers you to purchase its full version. MalWarrior 2007 will display fake alerts claiming that your computer is infected with spyware. The makers of MalWarrior 2007 seek to frighten you and want to promote their rogue spyware removal tool. However, MalWarrior 2007 shouldn’t be trusted and is advised to be removed.
SpyHunter Spyware Definitions Update: v.6.52 (10/04/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: AntiVirGear Zlob.Trojan AntiSpyGolden AntivirusGold MalwareBurn MalwareWiped SpyHeal VirusHeal AntiVermins...
SystemErrorFixer is a corrupt system optimization tool that is created to be installed through various security holes in your Internet browser. Once secretly installed, SystemErrorFixer will deliver fake security warnings claiming that your computer is infected with spyware. We strongly advise not to take these messages seriously and immediately remove the SystemErrorFixer program.
Backdoor.IRCBot is a backdoor Trojan that spreads through a network using the MS06-040 vulnerability. By attempting to connect through IRC, Backdoor.IRCBot may receive commands from a remote host computer. From here, Backdoor.IRCBot may be instructed to log all keystrokes that you type, launch Denial of Service (DoS) attacks, send spam emails, or steal personal information data in order to commit identity theft.
Backdoor.Rbot is a nasty backdoor Trojan for the Windows platform. Backdoor.Rbot propagates via local network shares, Plug-and-Play vulnerability and other browser security holes. Once executed, Backdoor.Rbot will allow a remote attacker to gain access and control over victim’s computer using a command prompt. This places any personal or financial information stored on your computer in severe jeopardy and represents a serious security risk.