Trojan-Spy.Broker.r

Trojan-Spy.Broker.r is a nasty Trojan application designed to embed inside your system and capture personally identifiable information without your knowledge and permission. Once executed, Trojan-Spy.Broker.r will observe and log all your keystrokes and scan your PC for stored passwords, including emails and chat sessions. In addition, Trojan-Spy.Broker.r may take screenshots regularly. Then Trojan-Spy.Broker.r sends all the collected information to the remote attacker. Trojan-Spy.Broker.r highly compromises with your security and privacy and is recommended to be removed with no delay.

Posted on September 18, 2007 in Trojans

AntiSpyware Shield

AntiSpyware Shield screenshot

AntiSpywareShield is a rogue anti-spyware program that displays fake security messages on your machine for malicious purposes. AntiSpywareShield installs itself onto your machine through a Trojan called Zlob. Once AntiSpywareShield is installed, it launches on Windows startup and performs fake spyware results to goad you into purchasing the full version. It is difficult to remove AntiSpywareShield manually because this program may continue to try to recreate itself. It is recommended to remove AntiSpywareShield and to block antispywareshield.com from your HOSTS file.

Posted on September 14, 2007 in Rogue Anti-Spyware Program

AntiSpyware Shield, AntiVirGear, MalwareDestructor, more – SpyHunter Update v.6.24

SpyHunter Spyware Definitions Update: v.6.24 (09/14/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: Trojan.KillAV Backdoor.SDBot Zlob.Trojan PrintMonitor Backdoor.SDBot Trojan.Downloader...

Posted on September 14, 2007 in Database Updates

Virus.Win9x.CIH

Virus.Win9x.CIH is a virus created in China back in 1998. Virus.Win9x.CIH can make your PC inoperable by overwriting your BIOS chip data and some versions of Virus.Win9x.CIH are capable of overwriting the MBR (master Boot Record). Virus.Win9x.CIH is also known as Spacefiller or Chernobyl.

Posted on September 12, 2007 in Viruses

Trojan.Dropper.Agent-CWZ

Trojan.Dropper.Agent-CWZ is a spyware Trojan that infects the PC, it is designed to make your machine vulnerable and open for further infections. This parasite creates security breach which poses a significant threat to the security of users personal information. Trojan.Dropper.Agent-CWZ is also known to infest the machine with annoying pop-ups.

Posted on September 12, 2007 in Trojans

Trojan.Dropper.Agent-BIE

Trojan.Dropper.Agent-BIE is a spyware Trojan that infects the PC, it is designed to make your machine vulnerable and open for further infections. Trojan.Dropper.Agent-BIE affects your security and creates a breach through which other malicious parasites may steal your personal data. The Adware infecting your computer through the Trojan.Dropper.Agent-BIE is also known to cause lots of pop-ups.

Posted on September 12, 2007 in Trojans

Worm.Benjamin.a

Benjamin is a worm that spreads through various peer-to-peer networks. When infected, Worm.Benjamin.a will multiply, creating copies of itself by various names in a hijacked directory. It will create files using names of popular movie, music album or software titles. Worm.Benjamin.a may also display fake error messages about “invalid pointer operations”.

Posted on September 12, 2007 in Keyloggers, Worms

MalwareDestructor

MalwareDestructor is a corrupt anti-spyware program designed to trick users into purchasing its full rogue version. MalwareDestructor may be installed with the help of Trojans, through browser security exploits, or via other unsolicited ways. Once executed on your system, MalwareDestructor will start displaying false alerts claiming that your computer is heavily infected with spyware. The makers of MalwareDestructor seek to lure you into purchasing its full commercial version.

Posted on September 12, 2007 in Rogue Anti-Spyware Program

Worm.Deborm

Worm.Deborm is a computer worm that delivers itself through LAN connections or file shares. Worm.Deborm is capable to guess easy passwords for its malicious purposes. Once launched, Worm.Deborm will employ backdoor capabilities for the purpose to control your entire computer system. Worm.Deborm enables a remote attacker to install additional malware and capture your personally identifiable information.

Posted on September 12, 2007 in Worms

Trojan.Litmus

Trojan.Litmus is a backdoor Trojan parasite that is usually distributed with the help of Worm.Deborm. Once installed on your computer, Trojan.Litmus will use backdoor methods to reach your entire computer system and any information kept on it. The backdoor methods that Trojan.Litmus uses may also allow a remote attacker to install additional unwanted programs and capture your sensitive private information.

Posted on September 12, 2007 in Trojans

Worm.Bagle

Worm.Bagle is a nasty and malicious worm responsible for mass mailing activities. Once Worm.Bagle installs into your system, it will send its copy to any email addresses that it can locate on your machine. Worm.Bagle is known to have different variants which are able to import massive streams of malware onto your PC.

Posted on September 12, 2007 in Worms

Trojan.Vipgsm

Trojan.Vipgsm is another nasty Trojan designed to propagate via Worm.Bagle variants. Once executed on your system, Trojan.Vipgsm will try to turn off all security related tools that are present on your machine. Trojan.Vipgsm has a built-in keylogger that allows it to capture your typed passwords and sensitive information, including e-mail conversations, IM messages and financial information.

Posted on September 12, 2007 in Trojans

Trojan.Click

Trojan.Click is a malicious Trojan parasite that usually installs on your system without your knowledge or consent. Once executed, Trojan.Click will secretly import additional malware, including Trojans and Viruses onto your system. Trojan.Click may also employ rootkit methods for the reason to hijack your computer and embed itself into system processes.

Posted on September 12, 2007 in Trojans

XP Entertainments

XP Entertainments is a Trojan classified as malware dropper Trojan. Once executed on your machine, XP Entertainments will attempt to disable security related antivirus and firewall programs. XP Entertainments may also import and execute a massive range of additional parasites. XP Entertainments is thought to be one of the variants of Trojan.AvKiller.

Posted on September 12, 2007 in Rogue Anti-Spyware Program

Worm.Capside

Worm.Capside is a computer worm designed to distribute itself via email or with the help of file sharing networks. Once executed on your machine, Worm.Capside seeks to deliver itself to any email recipients that it can locate on your machine. In addition, Worm.Capside may duplicate itself and leave its copy in shared directories of certain P2P programs. Worm.Capside will also affect Microsoft Outlook Ready stationery for the reason to distribute itself by email.

Posted on September 12, 2007 in Worms