Internet Security 2014

Internet Security 2014 Description

Type: Rogue AntiSpyware Programs

Internet Security 2014 is one of the many fake security programs that exist to scam inexperienced computer users. Like its predecessors from the FakeRean family, Internet Security 2014 is part of a convoluted scam that is used to attempt to steal your money. If a supposed security program named Internet Security 2014 is installed on your computer, beware! ESG security analysts strongly advise that you ignore all messages and 'warnings' issued by Internet Security 2014 and instead use a genuine anti-malware tool to erase this infection from your computer.

The Internet Security 2014 rogue security application is designed to trick PC users and make them purchase a 'full version' of this fake security program. There are many ways in which Internet Security 2014 forces computer users to do this, the most common of which is convincing the victim that their computer is severely infected. Internet Security 2014 pretends to be a real security program, running a fake scan of the victim's computer and using an interface that is highly authentic looking. However, regardless of the actual state of the infected computer, Internet Security 2014 will claim to have found dozens of viruses, Trojans, worms and other problems. Internet Security 2014 uses alarming messages and system alerts to trick the computer user into believing this lie. Internet Security 2014 will also cause infection symptoms deliberately, such as preventing the victim from accessing security software, files or browsing the Internet normally. However, as you will see, trying to use Internet Security 2014 to fix these supposed problems is useless.

How Internet Security 2014 Steals Your Money

Whenever the affected computer user attempts to use Internet Security 2014 to fix these supposed problems, this fake security program will claim that Internet Security 2014 needs to be updated. Of course, this supposed update is not free and will generally cost the victim quite a bit of money. Even worse, purchasing a fake 'update' for Internet Security 2014 allows the criminals responsible for Internet Security 2014 to gain access to your credit card information since it can be used to get hold of your money or identity.

Other fake security programs that belong to the FakeRean family, clones of Internet Security 2014 are Windows Antivirus 2008, Vista Antivirus 2008, Antivirus Pro 2009, AntiSpy Safeguard, ThinkPoint, Spyware Protection 2010, Internet Antivirus 2011, Palladium Pro, XP Anti-Virus 2011, CleanThis, PC Clean Pro, XP Home Security 2012, Windows Clear Problems, XP Security 2012, Antivirus PRO 2015.


15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Kaspersky UDS:DangerousObject.Multi.Generic
McAfee Artemis!6635981975FC
Panda Suspicious file
AVG Agent
Fortinet W32/Kryptik.Y!tr
AhnLab-V3 Trojan/Win32.FakeAV
McAfee-GW-Edition Heuristic.LooksLike.Win32.SuspiciousPE.F!83
AntiVir TR/Crypt.ZPACK.Gen2
BitDefender Gen:Variant.Kazy.178480
McAfee ZeroAccess-FCDE!27B5F2A62882
Panda Trj/Genetic.gen
Fortinet W32/Kryptik.BCAD
Ikarus Trojan.Win32.FakeAV
AhnLab-V3 Trojan/Win32.Agent
Microsoft Rogue:Win32/FakeRean

Technical Information

Screenshots & Other Imagery

SpyHunter Detects & Remove Internet Security 2014

File System Details

Internet Security 2014 creates the following file(s):
# File Name MD5 Detection Count
1 mwdefender.exe 5fb755eed77a7554a729375881674ccd 1
2 %AppData%\Insecure.exe N/A
3 %Desktop%\Internet Security 2014.lnk N/A
4 foobar2000.exe d4cd609a6fcca97fd62caf78da658286 0
5 amsecure.exe 27b5f2a6288219a37e8d5b7eb3bafcf1 0
More files

Registry Details

Internet Security 2014 creates the following registry entry or registry entries:
File name without path
Internet Security Pro.lnk
Registry key
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security 2014

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

One Comment

  • alan mclean:

    I have been scammed in the precise manner you describe by " internet security 2014"