VAC Codec

VAC Codec is a fake multimedia player. VAC Codec comes attached with a Trojan virus, and to trick the user into launching VAC Codec, a pop-up notification is received prompting the user to download VAC Codec in order to view a certain adult video content. Once active, this trojan may download additional malware onto the compromised machine, modify system files or open the computer up to remote access by outside attackers.

Posted on April 14, 2009 in Misleading Programs is a browser hijacker promoting the rogue anti-spyware application known as Internet Antivirus Pro (also referred to as InternetAntivirusPro). Typically your computer is infiltrated with affiliated trojans that modify your browser settings in order to redirect web-surfing activities to the domain, where a fake online scanner scans your computer and reports numerous fictitious infection results. This is a scare tactic used to trick you into purchasing the fake spyware remover Internet Antivirus Pro.

Posted on April 14, 2009 in Rogue Websites

Conficker Worm Downloads Rogue Application Spyware Protect 2009

The latest on the activities of the Conficker Worm is the use of infected hosts to download additional software which includes the Spyware Protect 2009 rogue anti-spyware application. Antivirus companies and security research firms are now reporting seeing Conficker infected systems being updated with the rogue application Spyware Protect 2009. What is Spyware Protect 2009? Spyware Protect 2009 is an application designed to use scare tactics through fake popup notifications, bogus scans and system alert messages in hopes to convince a computer user to purchase phony security software. The full Spyware Protect 2009 application is offered as a solution to the threats that it supposedly detects at a price of $49.95. This product is downloaded from a web server in Ukraine and has been one of the very applications that we recommend computer...

Posted on April 14, 2009 in Computer Security is a browser hijacker promoting the rogue anti-spyware application known as Internet Antivirus Pro (also referred to as InternetAntivirusPro). Due to affiliated trojan viruses that penetrate your computer security and modify your browser settings, you will find your web-surfing activities being diverted to the web page. Here a fake online scanner will typically report various fictitious infection results in order to intimidate you into purchasing Internet Antivirus Pro.

Posted on April 13, 2009 in Rogue Websites


Virus.Fontra is a virus that usually infects executable or .exe files in folders related to file sharing programs. Virus.Fontra also has the ability to download and execute remote files which could perform other malicious activities without your knowledge. Common peer-to-peer applications such as eMule, Kazaa and Morpheus, are vulnerable to being attacked by the Virus.Fontra infection. To ensure that your system is not compromised, you must remove all traces of Virus.Fontra. Detection and removal of Virus.Fontra may be difficult to perform manually.

Posted on April 11, 2009 in Viruses is a browser hijacker promoting the rogue anti-spyware application known as Internet Antivirus Pro (or, alternatively, InternetAntivirusPro). Due to trojan viruses that infiltrate your system via security exploits and modify your browser settings, you will find your web-surfing activities being redirected to the web page. Here your computer is subject to a fake online scan that reports numerous fictitious infection results, while extensive and aggressive advertising also helps in persuading you to purchase the fake spyware remover Internet Antivirus Pro to help combat these threats.

Posted on April 11, 2009 in Rogue Websites is a browser hijacker promoting the rogue anti-spyware application called System Security 2009. Due to affiliated trojans infiltrating your system via security exploits and modifying browser settings, web-surfing activities are typically interrupted and then redirected to the domain. Here a fake online scan results in fictitious infection reports that are used to persuade you to purchase the fake spyware remover System Security 2009.

Posted on April 10, 2009 in Rogue Websites


Trojan.Agent.cchq is a malicious Trojan horse infection that may compromise a user's system. Trojan.Agent.cchq may allow an outside attacker to gain access to personal files or data that could be used for identity theft. Once Trojan.Agent.cchq opens up a back door to the compromised system, a hacker could also take over certain functions of the user's system, using it to perform illegal actions over the internet. To ensure the safety of personal information and data stored on the hard drive, it is best to detect and remove Trojan.Agent.cchq with a spyware removal tool.

Posted on April 9, 2009 in Trojans


Trojan.Agent.bpro is a Trojan horse infection that could modify or change a user's Internet Explorer settings. Trojan.Agent.bpro may have the capability to download other malicious files onto a system without permission. The system may be vulnerable to outside attacks where an attacker could steal personal information. Manual removal of Trojan.Agent.bpro may be difficult to perform in many cases. It is recommended that a spyware removal tool is used to safely detect and completely remove Trojan.Agent.bpro.

Posted on April 9, 2009 in Trojans

Conficker Worm Awakens to Drop Potentially Dangerous Payload

The Conficker worm is currently active and updating via peer-to-peer (P2P). Researchers and security experts are analyzing the code of the software that is being dropped onto infected computers. We suspect that the code may be some type of logging program that has the ability to steal or compromise data on an infected system. Many people are surprised as to the new developments of Conficker as they thought April 1st marked the date for Conficker performing any malicious actions but they failed to realize that Conficker only downloaded an update on April Fool’s day. Judging from today's actions, it is safe to say that we have yet to see the true devastation of Conficker.C. The Conficker worm, once awakened, attempted to connect to,,, and in order to determine if the infected computer had...

Posted on April 9, 2009 in Computer Security

Virus Sweeper

Virus Sweeper screenshot

Virus Sweeper is a fake anti-virus program, also known as a rogue. Malware researchers have identified Virus Sweeper as a possible update of the widespread rogue anti-virus Virus Doctor. Other clones of Virus Sweeper include Antivirus 2009, Power Antivirus 2009, Vista Antivirus 2009 and AntiVir64. Rogueware like Virus Sweeper are programs designed superficially to look like real anti-virus programs. In fact, there is little more to Virus Sweeper than Virus Sweeper's interface. Virus Sweeper's only other functional elements are Virus Sweeper's credit card information entry form, and a collection of Trojans and malicious scripts designed to cause problems deliberately on a computer system....

Posted on April 9, 2009 in Rogue Anti-Spyware Program


INF/Autorun is a dangerous computer infection that is known to use Autorun.inf files in order to launch backdoor and Trojan horse infections automatically. INF/Autorun may be hidden on an executable file making it very difficult to detect and remove. INF/Autorun may also spread through removable media such as USB flash drives and then infect another system that connects to the infected drive. INF/Autorun should be detected and removed with a spyware removal tool to insure you do not spread this infection onto other computers.

Posted on April 9, 2009 in Trojans screenshot is a malicious website associated with a browser hijacker known by the same name. promotes the rogue security application System Security 2009. At this website, the victim will be urged to run a free online scan of their hard drives which will invariably return a large number of false positive results. This fake scan is done to convince visitors to the site that their computer system is in severe trouble and that it is necessary to download and install the fake security program System Security 2009. This is part of an elaborate online scam that is quite prevalent and has claimed a huge number of victims over the...

Posted on April 8, 2009 in Rogue Websites


Win32/Qhost is a Trojan horse infection that is used to replace or change the HOSTS file where corresponding IP addresses and names of remote computers are contained. Win32/Qhost uses a tactic of increasing the incoming traffic volume to a particular site. Once your system is infected with Win32/Qhost, you may get several warning or pop-up messages that could redirect you to a malicious website. Manual removal of Win32/Qhost may be difficult and dangerous to perform as you could delete essential system files in the process.

Posted on April 8, 2009 in Trojans


INF/Conficker is an infection allowing the Conficker Worm to spread through Autorun.inf files. Through this propogating process, INF/Conficker is able to infect removable drives. Any system that the INF/Conficker infected drive is given access to, is vulnerable to being infected with Conficker. The Autorun.inf process is able to automatically execute a newly attached drive such as an USB flash device. Mapped network drives are also vulnerable to spreading infections through INF/Conficker infected Autorun.inf files.

Posted on April 8, 2009 in Trojans