PC MightyMax

PC MightyMax is a fake registry cleaner that has been around since 2006. Since then, the criminals behind this bogus registry cleaner have released 'new' versions of PC MightyMax, such as PC MightyMax 2009 and PC MightyMax 2010. Make no mistake about it; PC MightyMax has no way of fixing your computer or cleaning your registry. Rather, PC MightyMax is a rogue security application, a fake security program that pretends to protect your computer from malware in order to steal your money. Promoted at the website PCMightyMax.net, PC MightyMax is a threat to inexperienced computer users. While PC MightyMax is problematic, more advanced rogue security programs have appeared since PC MightyMax's heyday. This means that most security applications are well-equipped to handle this bogus security program. In fact, PC MightyMax can even be removed...

Posted on March 13, 2006 in Rogue Registry Cleaner

NetTrojan

NetTrojan is a Trojan released in 2002 and allows a third party to gain access to your computer. This dangerous infection was regularly updated until 2007. NetTrojan is what is known as a Remote Administration Tool or ART. At first, Remote Administration Tools were benign programs designed to allow their owners to control their own computers from afar. However, hackers soon adapted Remote Administration Tools to work together with Trojans. In this way, NetTrojan can enter your computer and create a passageway through which a criminal can gain access to your computer. Known versions of NetTrojan can infect most Windows operating systems up to Windows XP. Computers running Windows Vista or Windows 7 are probably safe from a classic NetTrojan infection.   NetTrojan Can Be Very Difficult to Detect The criminals behind NetTrojan have...

Posted on January 9, 2006 in Trojans

Reflections on Spyware and File Sharing Programs

Just a quick note on spyware and file sharing applications. In the spyware world, many file sharing programs are amongst the worst of the infectors! Kazaa Media Desktop, iMesh, LimeWire, BearShare, and Grokster are known to install parasites and spyware. This is how they are able to offer a FREE program to the public. It is more than likely that, even after the spyware programs are removed by Enigma SpyHunter, the culprit will continue to re-install parasites. To prevent this, you should uninstall the offending file sharing program. After you uninstall these spyware-generating file sharing programs, it is CRUCIAL to run the SpyHunter remover once again, to clean up any spyware traces that may have been left on your system. There are several excellent file sharing programs, similar to Kazaa and iMesh that are free, and contain NO...

Posted on December 26, 2005 in Product FAQ

Vundo

Vundo is an extremely dangerous Trojan, and Vundo has the potential to be extremely destructive. Often, the only thing you can do is protect your computer from getting Vundo in the first place, by taking proper preventative measures. Once Vundo has infected your PC, it may be impossible to remove, depending on which version of the Trojan is causing the infection. Vundo is also known as MS Juan, Virtumonde, and Virtumundo. How Can You Tell if Vundo has Infected Your Computer? Depending on which variety of Vundo infects your PC, you may or may not notice any symptoms. Primarily, Vundo's purpose is to generate advertisements, which usually promote fake anti-virus software such as WinFixer, AntiVirus 2009, AntiSpywareMaster, SysProtect, and WinAntiSpyware, WinAntiVirus, System Doctor, and Drive Cleaner, among others. Therefore, it is...

Posted on November 29, 2005 in Trojans

How to Proceed if you Cannot Uninstall the Old PopupStop Software

If you are experiencing problems uninstalling the old Popup Blocker when you upgrade SpyHunter, follow the instructions below to fix the uninstall problem. First click on the following link (or paste it into your browser): http://enigmasoftwaregroup.com/Spyhunter_secure_download/PopupStop.exe Next, you will be prompted for a username and password. When prompted, enter your email address as the username, and whatever password you registered with us in the password field. This should allow you to directly download the "PopupStop.exe" executable installation file. We strongly recommend that you save this to your desktop so that you can easily locate it for the installation (please make a note of where you save this file as you will need it to complete installation). When the download has completed, locate the file "PopupStop.exe" and...

Posted on September 26, 2005 in Product FAQ

SpySheriff

SpySheriff is a fraudulent anti-spyware application that is designed by devious hackers to profit from credible computer users. SpySheriff may be brought into your computer by a Trojan through browser security cracks, or may be downloaded directly from www.spysheriff.com. SpySheriff has the ability to generate false warning messages that appear in your taskbar. These fake messages are produced after a "scan" that SpySheriff emulates to raise its credibility. After SpySheriff "detects" parasites on your computer, it will continuously offer you to purchase the full version of the program, in order to dispose of the non-existent threats. Immediate removal of SpySheriff is strongly recommended.

Posted on June 24, 2005 in Rogue Anti-Spyware Program

Smitfraud

SmitFraud (also known as W32/SmitFraud.A) is a malicious spyware application that may install itself secretly via adware. SmitFraud may also be brought into your computer bundled with a fake codec (that may include the following: BrainCodec, VideoKeyCodec or PCodec). SmitFraud is designed to inject a corrupt code in Windows DLL that usually results in Blue Screen of Death (a nasty desktop modification). SmitFraud may also generate misleading warning messages, in order to scare gullible computer users into buying fraudulent anti-spyware applications. It is strongly recommended to dispose of SmitFraud as soon as possible.

Posted on April 28, 2005 in Trojans

Zlob

Zlob is a kind of malicious software known as a Trojan horse. This is a kind of attacker that exploits vulnerabilities in a computer to wreak havoc. The first time the Zlob Trojan was identified was in the last months of 2005. Since the middle of 2006, this Trojan has gained considerable attention from computer security experts.   Who Created the Zlob Trojan? The Zlob Trojan is thought to have been created by hackers in the Russian Federation. It is still not known exactly who created the Zlob Trojan, but it has been used in many of the criminal activities of the Russian Business Network. This is a shadowy criminal organization dedicated to providing hosting for criminal activities, child pornography, and distributing harmful malware.   How Does the Zlob Trojan Get into a Computer? Like many Trojans, the Zlob Trojan is often disguised...

Posted on April 25, 2005 in Trojans

RelevantKnowledge

RelevantKnowledge screenshot

RelevantKnowledge is software that exists in a moral grey area. RelevantKnowledge is widely considered spyware, because RelevantKnowledge will collect huge amounts of information about your Internet usage, and then use that information to put together even more information about you. That information is then sold, anonymously, either individually or as part of aggregate data. Given the way that RelevantKnowledge is installed on most computers, it is unlikely that most of those users are fully aware of the facts about RelevantKnowledge. What RelevantKnowledge is, and Where it Comes From RelevantKnowledge is a product of the company MarketScore, formerly called Netsetter. MarketScore...

Posted on April 8, 2005 in Adware

Hack99

Hack99 is a Trojan keylogger that monitors and records every keystroke the user makes in order to capture usernames and passwords for online accounts. Once this information is acquired, it is sent to a remote unauthorized user. Hack99 is typically disguised as a computer game and downloaded manually this way.

Posted on April 5, 2005 in Keyloggers

FamilyKeyLogger

FamilyKeyLogger screenshot

Keylooger.FamilyKeyLogger is a program that is able to record keystrokes and computer activity. Internet activity can be recorded and used to access a computer user’s online banking accounts or gain entry to steal other personal information. Ultimately, Keylooger.FamilyKeyLogger can lead to identity theft.

Posted on March 29, 2005 in Keyloggers

DoubleClick

DoubleClick is an online business that is affiliated with Google. However, many PC security researchers and organizations consider their HTTP cookies as spyware since they can track a computer user's online activity and record any advertisements that are viewed on that Internet browser. In fact, many anti-malware programs remove or block the DoubleClick tracking cookie. It does not help matters that the DoubleClick opt-out option is not a solution. Security analysts have found that opting out of the DoubleClick tracking cookie does not eliminate tracking based on the computer users' IP address. There was also a period when criminals took advantage of DoubleClick and MSN in order to deliver malware through a security exploit. An Overview of the DoubleClick Tracking Cookie While DoubleClick has the capacity to monitor your online...

Posted on March 26, 2005 in Cookies

Advertising

Advertising (also known as Advertising.com) is a tracking cookie that monitors a user's Internet activity and gathers their personal information as they surf the web. This information may be retrieved by the parent company, without informed consent, leading to identity theft and privacy concerns.

Posted on March 25, 2005 in Cookies

We No Longer Provide Support or Updates for the SpyHunter v.1 Series

The producers of adware and spyware have increased their technology, making their software substantially more difficult to remove. Due to the complexity of new adware and spyware, the challenge of removing these parasites has also become more costly. Because of this, SpyHunter 1 has become obsolete. As of March 10th 2005, we no longer provide support or updates for the SpyHunter v.1 series. All customers of Enigma that have purchased any of the SpyHunter v.1 series will be given a free fully functioning version of SpyHunter v.2.0 with a license that will be valid until June 10th 2005. SpyHunter v.2 is an entirely new product which utilizes the latest technology to deal with today's threats. In addition to enhanced technology to remove these threats, SpyHunter v.2 contains an interactive support system where our technicians can easily...

Posted on February 15, 2005 in Announcements

Trojan.Dropper

A Trojan.Dropper is designed to deliver a payload onto the victim's computer system. However, a Trojan.Dropper will usually lead a large-scale attack, usually not the end infection itself. Typically, one of the main goals of computer criminals is to find ways to install malware onto their victim's computer without alerting the victim of the intrusion. A Trojan.Dropper is a typical method that is quite common. Typically, a Trojan.Dropper contains a malware infection within itself which is designed to deliver the infection by copying it onto the victim's computer's file system. A Trojan.Dropper will usually install and execute the malware installed and then will often delete itself or simply remain harmless on the victim's computer system. A Trojan.Dropper will usually be confusing to the victim, and designed to cause no symptoms. A...

Posted on February 3, 2005 in Trojans