Trojan.Downloader-Gen.MobRules is a Trojan classified as Spyware Trojan. Once Trojan.Downloader-Gen.MobRules is installed on your computer it opens up a conduit by which unwanted malware can be imported to your machine. Trojan.Downloader-Gen.MobRules will also open up a huge security hole on your system. That may cause your personal and financial data to become easily reached by remote attackers. Also note that Trojan.Downloader-Gen.MobRules may deliver large numbers of excessive popup ads.
Trojan-Downloader.Agent-BFJ is a Spyware Trojan designed to install onto your system and open up a huge security hole through which massive streams of malware can be easily imported into your system. Trojan-Downloader.Agent-BFJ poses a serious threat to the security and privacy of your personal data and financial information. Additionally, Trojan-Downloader.Agent-BFJ may deliver large amounts of unwanted advertisement content on your computer screen.
Trojan.Small.ASA is a malicious Trojan designed to infect your machine for malicious purposes. Trojan.Small.ASA may import and execute additional malware on your computer. In addition, Trojan.Small.ASA may employ backdoor capabilities and pipe malware to your computer. Trojan.Small.ASA highly compromises your security and privacy and may reach your financial and personal information. Trojan.Small.ASA may also generate massive stream of popup and pop-under ads on your computer screen.
Trojan-Downloader.Agent-OL is a Spyware Trojan created to secretly invade your system and open up a huge security hole through which additional malware can be easily installed to your PC. Trojan-Downloader.Agent-OL poses a serious threat to the security and privacy of your sensitive personally identifiable information and banking details. Moreover, Trojan-Downloader.Agent-OL will display large amounts of excessive advertisement content, including popup and pop-under ads.
“There are 118 serious threats detected on your computer” pop-up is a fake warning alert generated by the rogue anti-spyware application iSafe Antivirus. The text reads: “There are 118 serious threats detected on your computer. Your privacy and peronal data could not be safe. Do you want to clean up your PC? Yes, remove threats [or] No, continue unprotected” The false pop-up alerts are generated to mislead and trick the user into buying the rogue iSafe Antivirus application. The user should not be fooled by this common tactic. Remove the infection without hesitation.
Trojan-Spy.Broker.r is a nasty Trojan application designed to embed inside your system and capture personally identifiable information without your knowledge and permission. Once executed, Trojan-Spy.Broker.r will observe and log all your keystrokes and scan your PC for stored passwords, including emails and chat sessions. In addition, Trojan-Spy.Broker.r may take screenshots regularly. Then Trojan-Spy.Broker.r sends all the collected information to the remote attacker. Trojan-Spy.Broker.r highly compromises with your security and privacy and is recommended to be removed with no delay.
AntiSpywareShield is a rogue anti-spyware program that displays fake security messages on your machine for malicious purposes. AntiSpywareShield installs itself onto your machine through a Trojan called Zlob. Once AntiSpywareShield is installed, it launches on Windows startup and performs fake spyware results to goad you into purchasing the full version. It is difficult to remove AntiSpywareShield manually because this program may continue to try to recreate itself. It is recommended to remove AntiSpywareShield and to block antispywareshield.com from your HOSTS file.
SpyHunter Spyware Definitions Update: v.6.24 (09/14/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: Trojan.KillAV Backdoor.SDBot Zlob.Trojan PrintMonitor Backdoor.SDBot Trojan.Downloader...
Virus.Win9x.CIH is a virus created in China back in 1998. Virus.Win9x.CIH can make your PC inoperable by overwriting your BIOS chip data and some versions of Virus.Win9x.CIH are capable of overwriting the MBR (master Boot Record). Virus.Win9x.CIH is also known as Spacefiller or Chernobyl.
Trojan.Dropper.Agent-CWZ is a spyware Trojan that infects the PC, it is designed to make your machine vulnerable and open for further infections. This parasite creates security breach which poses a significant threat to the security of users personal information. Trojan.Dropper.Agent-CWZ is also known to infest the machine with annoying pop-ups.
Trojan.Dropper.Agent-BIE is a spyware Trojan that infects the PC, it is designed to make your machine vulnerable and open for further infections. Trojan.Dropper.Agent-BIE affects your security and creates a breach through which other malicious parasites may steal your personal data. The Adware infecting your computer through the Trojan.Dropper.Agent-BIE is also known to cause lots of pop-ups.
Benjamin is a worm that spreads through various peer-to-peer networks. When infected, Worm.Benjamin.a will multiply, creating copies of itself by various names in a hijacked directory. It will create files using names of popular movie, music album or software titles. Worm.Benjamin.a may also display fake error messages about “invalid pointer operations”.
MalwareDestructor is a corrupt anti-spyware program designed to trick users into purchasing its full rogue version. MalwareDestructor may be installed with the help of Trojans, through browser security exploits, or via other unsolicited ways. Once executed on your system, MalwareDestructor will start displaying false alerts claiming that your computer is heavily infected with spyware. The makers of MalwareDestructor seek to lure you into purchasing its full commercial version.
Worm.Deborm is a computer worm that delivers itself through LAN connections or file shares. Worm.Deborm is capable to guess easy passwords for its malicious purposes. Once launched, Worm.Deborm will employ backdoor capabilities for the purpose to control your entire computer system. Worm.Deborm enables a remote attacker to install additional malware and capture your personally identifiable information.
Trojan.Litmus is a backdoor Trojan parasite that is usually distributed with the help of Worm.Deborm. Once installed on your computer, Trojan.Litmus will use backdoor methods to reach your entire computer system and any information kept on it. The backdoor methods that Trojan.Litmus uses may also allow a remote attacker to install additional unwanted programs and capture your sensitive private information.