Trojan-Spy.Broker.r is a nasty Trojan application designed to embed inside your system and capture personally identifiable information without your knowledge and permission. Once executed, Trojan-Spy.Broker.r will observe and log all your keystrokes and scan your PC for stored passwords, including emails and chat sessions. In addition, Trojan-Spy.Broker.r may take screenshots regularly. Then Trojan-Spy.Broker.r sends all the collected information to the remote attacker. Trojan-Spy.Broker.r highly compromises with your security and privacy and is recommended to be removed with no delay.
AntiSpywareShield is a rogue anti-spyware program that displays fake security messages on your machine for malicious purposes. AntiSpywareShield installs itself onto your machine through a Trojan called Zlob. Once AntiSpywareShield is installed, it launches on Windows startup and performs fake spyware results to goad you into purchasing the full version. It is difficult to remove AntiSpywareShield manually because this program may continue to try to recreate itself. It is recommended to remove AntiSpywareShield and to block antispywareshield.com from your HOSTS file.
SpyHunter Spyware Definitions Update: v.6.24 (09/14/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: Trojan.KillAV Backdoor.SDBot Zlob.Trojan PrintMonitor Backdoor.SDBot Trojan.Downloader...
Virus.Win9x.CIH is a virus created in China back in 1998. Virus.Win9x.CIH can make your PC inoperable by overwriting your BIOS chip data and some versions of Virus.Win9x.CIH are capable of overwriting the MBR (master Boot Record). Virus.Win9x.CIH is also known as Spacefiller or Chernobyl.
Trojan.Dropper.Agent-CWZ is a spyware Trojan that infects the PC, it is designed to make your machine vulnerable and open for further infections. This parasite creates security breach which poses a significant threat to the security of users personal information. Trojan.Dropper.Agent-CWZ is also known to infest the machine with annoying pop-ups.
Trojan.Dropper.Agent-BIE is a spyware Trojan that infects the PC, it is designed to make your machine vulnerable and open for further infections. Trojan.Dropper.Agent-BIE affects your security and creates a breach through which other malicious parasites may steal your personal data. The Adware infecting your computer through the Trojan.Dropper.Agent-BIE is also known to cause lots of pop-ups.
Benjamin is a worm that spreads through various peer-to-peer networks. When infected, Worm.Benjamin.a will multiply, creating copies of itself by various names in a hijacked directory. It will create files using names of popular movie, music album or software titles. Worm.Benjamin.a may also display fake error messages about “invalid pointer operations”.
MalwareDestructor is a corrupt anti-spyware program designed to trick users into purchasing its full rogue version. MalwareDestructor may be installed with the help of Trojans, through browser security exploits, or via other unsolicited ways. Once executed on your system, MalwareDestructor will start displaying false alerts claiming that your computer is heavily infected with spyware. The makers of MalwareDestructor seek to lure you into purchasing its full commercial version.
Worm.Deborm is a computer worm that delivers itself through LAN connections or file shares. Worm.Deborm is capable to guess easy passwords for its malicious purposes. Once launched, Worm.Deborm will employ backdoor capabilities for the purpose to control your entire computer system. Worm.Deborm enables a remote attacker to install additional malware and capture your personally identifiable information.
Trojan.Litmus is a backdoor Trojan parasite that is usually distributed with the help of Worm.Deborm. Once installed on your computer, Trojan.Litmus will use backdoor methods to reach your entire computer system and any information kept on it. The backdoor methods that Trojan.Litmus uses may also allow a remote attacker to install additional unwanted programs and capture your sensitive private information.
Worm.Bagle is a nasty and malicious worm responsible for mass mailing activities. Once Worm.Bagle installs into your system, it will send its copy to any email addresses that it can locate on your machine. Worm.Bagle is known to have different variants which are able to import massive streams of malware onto your PC.
Trojan.Vipgsm is another nasty Trojan designed to propagate via Worm.Bagle variants. Once executed on your system, Trojan.Vipgsm will try to turn off all security related tools that are present on your machine. Trojan.Vipgsm has a built-in keylogger that allows it to capture your typed passwords and sensitive information, including e-mail conversations, IM messages and financial information.
Trojan.Click is a malicious Trojan parasite that usually installs on your system without your knowledge or consent. Once executed, Trojan.Click will secretly import additional malware, including Trojans and Viruses onto your system. Trojan.Click may also employ rootkit methods for the reason to hijack your computer and embed itself into system processes.
XP Entertainments is a Trojan classified as malware dropper Trojan. Once executed on your machine, XP Entertainments will attempt to disable security related antivirus and firewall programs. XP Entertainments may also import and execute a massive range of additional parasites. XP Entertainments is thought to be one of the variants of Trojan.AvKiller.
Worm.Capside is a computer worm designed to distribute itself via email or with the help of file sharing networks. Once executed on your machine, Worm.Capside seeks to deliver itself to any email recipients that it can locate on your machine. In addition, Worm.Capside may duplicate itself and leave its copy in shared directories of certain P2P programs. Worm.Capside will also affect Microsoft Outlook Ready stationery for the reason to distribute itself by email.