SpywareZapper is a fake spyware removal application. It is a newer version of BPS AntiSpyware Remover. Both of these programs use deceptive tactics in order to persuade the user to buy full versions of the program. Both of them are most often downloaded and installed by a resident trojan or thru a security hole of the users browser. In addition to false security alerts these programs may cause system instability and decreased performance.
Once launched on the victim machine this trojan will use the existing Internet connection in order to download and install additional malware.
ESG security researchers have received various reports of computer users landing at a clone of the Google search engine. This fake version of Google sports a message under the search box claiming that Google has detected that they are using an unregistered version of System Protector , a typical rogue security program. The ‘Google has detected…’ web page is one of the many symptoms of a rogue anti-virus infection. These kinds of fake security programs tend to cause pop-up windows, error messages and browser redirects as part of their campaign of misinformation designed to try to cause victims to panic into purchasing useless ‘full versions’ of System Protector. In reality, the ‘Google has detected…’ web page has absolutely no relation with the Google corporation or with any legitimate...
VirusRay v.3.8 , another clone of AntiVirGear , is a rogue PC cleanup application that is often secretly imported and executed on your machine by Trojans, through browser security exploits, or via other illicit mechanisms. Once it is installed, VirusRay will launch on Windows startup and badger the user into purchasing the full version of the program by showing misleading warning messages and scan results. VirusRay uses deceptive advertising tactics to trick you into purchasing VirusRay’s commercial version.
AntiVirGear is a rogue anti-spyware application that is usually transmitted via the Zlob Trojan or by other illegal means. After the program is downloaded to the victim’s machine it starts displaying false security alerts in order to convince the user to purchase the full version of AntiVirGear. Along with fake security alerts the program is known to cause system instability.
Cookies are created every time you open your Internet Browser. For those who have concerns about SpyHunter finding cookies once in a while, or every time you scan your system, do not get alerted. SpyHunter will always find cookies in your system and you should always have SpyHunter delete them. Cookies are not malware but just text files that hold your information. Parasites steal your private information, collecting your cookies. That’s why SpyHunter identifies those cookies over and over again. The names given to the cookies by SpyHunter are associated with the parasites that collect their information. Having a parasite cookie does not indicate necessarily that you are infected with that specific threat and therefore you should not worry about re-occurring cookies. They will always be there and should be deleted...
SpyHunter Spyware Definitions Update: v.6.71 (10/18/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: AntiVirGear Zlob.Trojan Trojan.Tibs PCCleaner2007 Virtumonde Trojan.Looksky SmitFraud Trojan.Downloader
Incredible Keylogger is a spyware program that may steal sensitive information from the computer. Once executed, Incredible Keylogger will observe and log all users’ activity, including all the keystrokes, visited websites, programs that users run and files they open. Incredible Keylogger may also take screenshots of your desktop regularly. Incredible Keylogger then sends all the collected data to a remote attacker by email or uploads it to a remote server via FTP.
SpyKey is a keylogger, it is designed to monitor your keyboard and record all your keystrokes. Once enough information is collected the program sends it out in the form of an email.
This is a rogue anti-spyware program. NowWayVirus is designed to trick the user into purchasing its software by constantly alerting him/her of non-existent security threats detected in the system.
SpyOnThis is a rogue spyware removal application that is often downloaded and installed by Trojans, through browser security exploits or under dubious circumstances without user’s consent and knowledge. Once installed, SpyOnThis will display fake warning messages claiming that your system security is in serious danger. The purpose is to get the user to purchase the full version of SpyOnThis application.
Trojan.BHO.cs is a Trojan application that propagates via email spam. Trojan.BHO.cs embeds itself on Internet Explorer as Browser Helper Objects (BHO) to observe user’s browsing habits. Trojan.BHO.cs may log keystrokes to steal confidential information. In addition, Trojan.BHO.cs will display hundreds of advertisements and redirect your browser to specific web pages based on users browsing habits.
This is an advertising program, it is designed to infect your browser. After the infection is complete the Trojan begins redirecting you to certain web sites and generating unwanted advertisements.
This is a trojan horse program, it is designed to covertly infiltrate your computer and open up a backdoor. If it is successful it will allow a remote hacker to gain full control over your machine and all information stored on it.
Trojan.BHO.d is designed to covertly infect your system (it is usually presented as a Browser Helper Object), generating numerous popup advertisements. Additionally, it will monitor and analyze all websites you visit in order to match the advertisements it displays to your taste. It may also hijack your browser to specific web pages based your browsing habits.