More Articles


TrojanDropper:Win32/Rovnix.A is a Trojan that makes changes to the New Technology File System (NTFS) boot sector of the hard drive to run other malware infections. TrojanDropper:Win32/Rovnix.A also installs a component, found as Trojan:Win32/Rovnix.A, to reboot the PC so the changed NTFS boot sector will be run. When executed, TrojanDropper:Win32/Rovnix.A writes a malevolent code to particular disk sectors of the local hard drive. TrojanDropper:Win32/Rovnix.A also makes changes to the NTFS boot sector to run the written code. On 32-bit Windows PCs, the malevolent code is identified as VirTool:WinNT/Rovnix.A while on 64-bit PCs the code is recognized as VirTool:Win64/Rovnix.A.

Posted on July 25, 2013 in Trojans


Trojan.Rodecap is a Trojan that delivers other malware threats and sends spam emails from the corrupted PC. Trojan.Rodecap contains surreptitious penetration capabilities that enable it to bypass the detection and elimination of security programs on the target computer user's PC. The main aim of Trojan.Rodecap is to allow cybercriminals to obtain remote unauthorized access and control of the compromised PC. Trojan.Rodecap uses misleading tactics, such as packaging itself together with other peer-to-peer file sharing networks, to spread itself to affected computers. Trojan.Rodecap can also propagate via spam emails carrying malicious attachments, instant messaging applications such as Skype and MSN and websites that encompass executable content, such as ActiveX controls.

Posted on July 25, 2013 in Trojans

‘National Crime Prevention Unit’ Ransomware


'National Crime Prevention Unit' Ransomware is a security threat, which is identified as a ransomware infection. 'National Crime Prevention Unit' Ransomware affects computer users in the United Kingdom. When installed on a corrupted PC, 'National Crime Prevention Unit' Ransomware displays a bogus pop-up image/alert created and distributed to victimized PCs in the United Kingdom by a ransomlock Trojan. The related Trojan locks the screen of the infected computer and asks the victim to pay a fine of 100 pounds via Ukash or Paysafecard to receive a 19-digit code to restore access to the compromised PC. The scary pop-up warning message of 'National Crime Prevention Unit' Ransomware states...

Posted on July 25, 2013 in Ransomware


WebCakeDesktop.Updater.exe is a malicious executable file, which is connected with an adware program named WebCake . WebCakeDesktop.Updater.exe is able to update WebCake adware application, which means that it gives new annoying functionality to WebCake so that affected PC users will see more pop-up advertisements. WebCakeDesktop.Updater.exe allows WebCake to deliver and show numerous unwanted pop-up advertisements as target computer users browser the web, even on the websites such as Yahoo and Google. WebCakeDesktop.Updater.exe is a security risk to a victimized PC. WebCakeDesktop.Updater.exe needs to be deleted from the corrupted PC with a reliable and effective security tool.

Posted on July 25, 2013 in Malware


eGdpSvc.exe is a malicious executable file, which is a critical component of an adware program called eSafe Security Control. eGdpSvc.exe can appear in more than one instance of malware threats and its variations. The payload appointed to the adware program related to eGdpSvc.exe usually involves stealing credentials, involving by way of compromising safe connections, starting from simple VPN to advanced developments of banking systems. Existence of the adware application linked to eGdpSvc.exe on the targeted PC also specifies that there is an attempt to perform the DoS attack on the attacked computer system.

Posted on July 25, 2013 in Malware



Trojan.Win32.Kryptik.ake, an alias name Trojan-Downloader.JS.Expack.aiy, is a Trojan that a part of a spam malware attack related to a royal baby of Kate and William, the Duke and Duchess of Cambridge. Trojan.Win32.Kryptik.ake propagates via a bogus email linked to the royal baby. The deceptive email includes two CNN video stories involving President Obama and trees. The subject of the spam email is 'Perfect gift for royal baby...a tree?' - BreakingNews CNN. The unsolicited email forces the victim to download and install the bogus Flash player. If the attacked computer user opens and executes a malevolent file attachment called 'update_flash_player.exe' (identified as...

Posted on July 25, 2013 in Trojans

IE 10 Remains King of Malware and Privacy Protection Yet Flounders at Blocking Phishing Sites

The web browser application wars are still in full effect as NSS Labs shares updated test results reiterating how Internet Explorer is (surprisingly) the best at malware and privacy protection. We can remember a time when Internet Explorer had somewhat of a monopoly over any other web browser as it was the exclusive offering with all Windows PCs sold on the shelves of your local computer store. The tides have changed where Google's Chrome web browser battles to retain its first-place as far as the most utilized web browser when accounting all types of computers (Mac and PC). In the past, Internet Explorer has had its rash with criticism for being the most lenient when it comes to protecting against malware and aiding with privacy protection. It seems the tables have turned in a favorable direction for the latest version of Internet Explorer as it is rated as #1 for malware and...

Posted on July 25, 2013 in Computer Security


The Janicab.A family of malware is a dangerous group of Trojans that targets both computer systems running Windows or Mac OS X. As more computer users purchase and make use of the Mac OS X operating system, it becomes a more attractive target for malware developers. Janicab.A and other variants in this family are related to black hat tactics used to profit at the expense of computer users. There are several unusual characteristics of Janicab.A. Janicab.A is connected to a malicious YouTube page that is used to force computer users to establish a connection with Janicab.A's Command and Control server. Janicab.A has various tactics that allow Janicab.A to hide from detection by PC security analysts. The Unusual Target of the Janicab.A Janicab.A was first observed in action in July of 2013. Janicab.A attracted the attention of security analysts because Janicab.A targeted computer...

Posted on July 24, 2013 in Trojans

From Doc to Pdf Toolbar

From Doc to Pdf Toolbar is an unwanted toolbar/ adware application, which is advertised via other freeware and shareware program downloads to benefit from this. From Doc to Pdf Toolbar modifies the default homepage with and the default search provider with From Doc to Pdf Toolbar installs a Browser Helper Object (BHO) that might corrupt, Internet Explorer, Google Chrome or Mozilla Firefox. From Doc to Pdf Toolbar is used to increase web traffic and make a profit from deceptive advertising by using blackhat SEO methods. PC users should always pay attention while installing software products because often, a software installer carries optional installations, such as From Doc to Pdf Toolbar. From Doc to Pdf Toolbar infiltrates into the attacked computer using misleading tactics without the victimized PC user's consent or awareness. From Doc to Pdf...

Posted on July 24, 2013 in Malicious Toolbars

Social Search Toolbar

The Social Search Toolbar claims to help computer users manage their social media presence and carry out online searches directly from their Web browser toolbar. In fact, the Social Search Toolbar is part of a browser hijacker attack meant to generate revenue from online advertisements. Typically, the Social Search Toolbar is installed after a computer user has installed a freeware program that is bundled with Social Search Toolbar. It is recommended to avoid the Social Search Toolbar and other, similar Web browser toolbars and to use a reliable anti-malware application. It is important to remember that Social Search Toolbar is not a reliable program. The Social Search Toolbar Changes Your Web Browser Settings The Social Search Toolbar inserts sponsored links into search results on legitimate search engines. The Social Search Toolbar has the capacity to gather information about...

Posted on July 24, 2013 in Malicious Toolbars

WeatherBlink Toolbar

Weatherblink Toolbar is an unwanted toolbar/ deceitful and irritating program that imitates a weather forecast tool. WeatherBlink Toolbar delivers weather updates directly to an Internet browser such as Google Chrome, Internet Explorer or Mozilla Firefox. But when installed on a corrupted PC, Weatherblink Toolbar starts executing harmful actions that were not specified. Commonly, WeatherBlink Toolbar compromises the affected web browser by replacing the default homepage with, and the default search providerwith WeatherBlink Toolbar also replaces search results in any legitimate search system with deceptive links taking victimized PC users to misleading advertising websites. WeatherBlink Toolbar delivers commercial pop-up ads within search results or embeds them inside advertising websites. Weatherblink Toolbar decreases PC performance and can...

Posted on July 24, 2013 in Malicious Toolbars


WajamUpdater.exe is an auto-updater for a social search provider called Wajam . WajamUpdater.exe runs automatically whenever Windows is started and checks for available software updates. However, Wajam Browser Helper Object and WajamUpdater.exe is related to malware. Usually, WajamUpdater.exe is found to be a component of an adware program or potentially unwanted program - PUP (PUP.Wajam, Win32/Wajam.A). If the PC user finds WajamUpdater.exe running on the computer, this indicates that adware or potentially unwanted programs have been installed on the computer system. It is recommended to remove WajamUpdater.exe from the infected computer with a legal anti-malware program.

Posted on July 24, 2013 in Malware

FreemakeTB Toolbar

FreemakeTB Toolbar is a browser add-on, which can be installed on the Internet browser such as Internet Explorer, Mozilla Firefox, and Google Chrome. FreemakeTB Toolbar pushes itself as an application being able to give computer users easy access to numerous online services such as TV, weather, radio, Facebook and other. FreemakeTB Toolbar might seem to be like a beneficial program but, in reality, it uses deceptive methods to invade a targeted computer. FreemakeTB Toolbar is usually installed on the compromised PC packaged with freeware and shareware programs without a computer user's permission and awareness. When installed on the affected PC, FreemakeTB Toolbar modifies the default home page and default search engine with suspicious search system or doubtful advertising website. FreemakeTB Toolbar may also insert numerous tricky advertisements to search results in any genuine...

Posted on July 24, 2013 in Malicious Toolbars

Winload Toolbar

Winload Toolbar is browser extension that pushes itself as a program, which is able to improve a computer user's Internet surfing experience when it is installed onto Internet Explorer, Mozilla Firefox, and Google Chrome web browsers. Many PC users report Winload Toolbar to be a browser hijacker, although it is not. Winload Toolbar is an adware program that web users may inadvertently install on the PC when downloading freeware and shareware programs. Winload Toolbar substitutes the default home page and default search engine with a misleading search provider. Winload Toolbar controls the corrupted PC and, thus, seems to be a malware infection. Winload Toolbar can also be used by cybercrooks in advertising campaigns to earn money. Winload Toolbar traces how the victimized PC user surfs the Internet and keeps the grabbed data for a malicious aim. Winload Toolbar records all personal...

Posted on July 24, 2013 in Malicious Toolbars

‘Centre for Critical Infrastructure Protection (CCIP)’ Virus Ransomware


The 'Centre for Critical Infrastructure Protection (CCIP)' Virus is one of the many Police Ransomware Trojans that target computer systems located in New Zealand. The 'Centre for Critical Infrastructure Protection (CCIP)' Virus is part of the Urausy family of police Winlockers , an extensive family of malware that criminals use to scam inexperienced computer users. Although many computer users refer to the 'Centre for Critical Infrastructure Protection (CCIP)' Virus as a 'virus', this malware infection is actually a Trojan. Unlike viruses, Trojans cannot spread on their own or carry out the types of attacks viruses are capable of. Rather, the 'Centre for Critical Infrastructure...

Posted on July 24, 2013 in Ransomware
previous  152  153  154  155  156  157  158  159  160  161  162  163  164  165  166  167  168  169  170  171  172  next     total items: 11977