WinPC Defender

WinPC Defender screenshot

WinPC Defender, or WinPCDefender, is a rogue anti-spyware program. WinPC Defender is usually installed in the user's computer system with the help of Trojan Zlob or the user may have downloaded it from a malicious website. Once installed, the user may receive annoying popup notifications of imaginary spyware infections. These fake notifications redirect the user to fraudulent websites that sell WinPC Defender as a legitimate software. WinPC Defender is not able to detect nor remove any spyware infections. WinPC Defender is an infection itself In addition, WinPC Defender is able to emulate a computer system scan and trick users into believing their computer systems are flooded with...

Posted on March 15, 2009 in Rogue Anti-Spyware Program

'Spyware Alarm!' Pop-Up

"Spyware Alarm!" Pop-up is nothing more than a fraudulent system alert notification generated by the rogue anti-spyware program called Home Malware Cleaner (sometimes referred to as Malware Cleaner). This deceptive piece of software uses pop-up windows, such as this "Spyware Alarm!" pop-up, in order to intimidate you into purchasing the MalwareCleaner fake spyware remover. This application offers no aid or protection for your system and should be avoided at all costs. The "Spyware Alarm!" Pop-up reads as follows: "Spyware alarm! Our scan has reported that pieces of malicious spyware code are present on your hard drive. To get rid of security threats, click here for a Malware Cleaner scan."

Posted on March 15, 2009 in Fake Error Messages

Theonlinesecurity.com

Theonlinescanner.com is a rogue website sponsoring the fake spyware remover called System Security 2009. Redirection to this browser hijacker is due to Trojans infiltrating your system and altering your browser settings. Once diverted to Theonlinesecurity.com web page, your computer is subject to a fraudulent online scan that claims you have various infections, and it is suggested you purchase and install System Security 2009. It is important to note, however, that these infection reports are fictitious and should not be taken seriously.

Posted on March 14, 2009 in Rogue Websites

Securityexamine.com

Securityexamine.com is a rogue website and browser hijacker sponsoring the dangerous rogue anti-spyware program called System Security 2009 In order to accomplish this goal, trojan viruses infiltrate your computer and modify your browser settings, causing web-surfing activities to be diverted to the Securityexamine.com web page. Here your computer is subject to a free, albeit fake, online scan, which inevitably reports dozens of fraudulent infections. To combat these threats, Securityexamine.com suggests purchasing and installing System Security 2009, a program that neither repairs nor protects your system from parasites.

Posted on March 14, 2009 in Rogue Websites

Trojan.Downloader.Geral

Trojan.Downloader.Geral is a Trojan downloader of dubious intent, that infiltrates a computer due to vulnerabilities in the security software. Once installed and active, Trojan.Downloader.Geral may begin downloading additional malware on the compromised machine, while also stealing personal information data, which can lead to identity theft. Trojan.Downloader.Geral can be very difficult to remove manually, as the trojan is able to transform itself, disable already existing security software and modify files.

Posted on March 13, 2009 in Trojans

Trojan.Ghost.lkz

Trojan.Ghost.lkz is a computer Trojan infection. Trojan.Ghost.lkz comes from malicious internet sources such as a suspicious web page or newsgroup. Trojan.Ghost.lkz is know to cause a multitude of issues on the infected system including loss or damage of data. Trojan.Ghost.lkz should be detected and removed immediately to abolish the threat of Trojan.Ghost.lkz.

Posted on March 13, 2009 in Trojans

Trojan.Agent.ble

Trojan.Agent.ble is a malicious Trojan that infiltrates a computer through deceptive means, usually through vulnerabilities in security software. Once installed, Trojan.Agent.ble creates many problems, such as the opening of illicit network connections, the use of polymorphic tactics to self-mutate, the disabling of already existing security software, modifications of system files, and the downloading and installation of additional malware. Trojan.Agent.ble is known to compromise entire networks, too.

Posted on March 12, 2009 in Trojans

Rootkit.Tiny.cr

Rootkit.Tiny.cr is a form of software used to conceal the presence of specific files and data, in order to evade detection, while allowing an outside party to gain control of your computer without your awareness or approval. Typically, Rootkit.Tiny.cr is used by malware including viruses, spyware, Trojans, and backdoors, in order to hide them from both the system user and from malware detection software (such as anti-virus and anti-spyware applications). Rootkit.Tiny.cr is designed to open remote access to another machine, whereby large amounts of adware and spyware can be launched onto your computer. Rootkit.Tiny.cr also opens up a large security hole on your computer and is a very dangerous threat to the security of your personal and financial data.

Posted on March 11, 2009 in Rootkits

Backdoor.Win32.Poison.fdb

Backdoor.Win32.Poison.fdb is a Backdoor program that appears in most false security scans and fake system alerts generated by rogue anti-spyware application, Advanced Spyware Detect. The main purpose of Backdoor.Win32.Poison.fdb is to frighten you into believing your computer is infected with serious threats, and trick you into purchasing Advanced Spyware Detect, a product that neither detects nor protects against parasites.

Posted on March 11, 2009 in Backdoors

Backdoor.PcClient.akx

Backdoor.PcClient.akx is a backdoor Trojan that has been known to conceal itself away inside a computer system and provide remote access to its creator. Backdoor.PcClient.akx is typically installed onto a system by running infected documents or executables. Backdoor.PcClient.akx launches and runs imperceptibly, without your consent or knowledge, in order to send, receive, execute and delete files, harvest confidential data from the computer, log activity and more.

Posted on March 11, 2009 in Backdoors

Rootkit.Podnuha.cbn

Rootkit.Podnuha.cbn is a form of software used to conceal the presence of specific files and data, in order to evade detection, while allowing an outside party to gain control of your computer without your awareness or approval. Typically, Rootkit.Podnuha.cbn is used by malware including viruses, spyware, Trojans, and backdoors, in order to hide them from both the system user and from malware detection software (such as anti-virus and anti-spyware applications). Rootkit.Podnuha.cbn is designed to open remote access to another machine, whereby large amounts of adware and spyware can be launched onto your computer. Rootkit.Podnuha.cbn also opens up a large security hole on your computer and is a very dangerous threat to the security of your personal and financial data.

Posted on March 11, 2009 in Rootkits

PC Antispyware

PC-Antispyware is a corrupt anti-spyware program that may be downloaded and installed onto your machine by a Trojan parasite. Brought in by the Trojan, the trial version of PC-Antispyware will be installed and executed onto your machine without your authorization. PC-Antispyware will then display exaggerated virus threat notifications, and offer to eliminate all of the parasites it "detected" if you purchase the full version of the program. PC-Antispyware is not to be trusted. Immediate removal PC-Antispyware is strongly recommended.

Posted on March 10, 2009 in Rogue Anti-Spyware Program

Malware Defender 2009

Malware Defender 2009 screenshot

Malware Defender 2009 (or MalwareDefender 2009, Malware Defender2009) is a rogue anti-spyware application, usually promoted along with Trojan viruses, such as Vundo or similar. These Trojans display fake security alerts and pop-up windows about various security threats, suggesting that you download Malware Defender 2009 in order to remove infections or protect your system from further possible infections. Once you have Malware Defender 2009 installed and active on your computer, Malware Defender 2009 is configured to load automatically when you start your PC. Running fake system scans and displaying numerous malware infections, Malware Defender 2009 prompts you to purchase the full...

Posted on March 10, 2009 in Rogue Anti-Spyware Program

Backdoor.Small.hwc

Backdoor.Small.hwc is a malicious backdoor trojan that runs in the background and allows remote access to the compromised computer system. As a malware application, Backdoor.Small.hwc tends to masquerade as a helpful tool, in addition to making use of other misleading tactics. Backdoor.Small.hwc is typically delivered onto a system via other trojan viruses, where it imitates system scans and reports numerous false infections in order to intimidate you into purchasing the full version of the software Backdoor.Small.hwc advertises. It is important to note that Backdoor.Small.hwc will slow down a system's performance and tends to limit internet connection.

Posted on March 10, 2009 in Backdoors

'Spyware object detected!' Popup

The 'Spyware object detected!' pop-up notification is an adware that enters into a computer system via the blind spots in the user's security system or via Trojan horses. It is important to note that the 'Spyware object detected!' pop-up window is fictitious. The fake message displayed reads as follows: "Spyware object detected! You are recommended to scan the whole system and remove all suspicious objects. Detected threat: Cookie: Double-Click." By clicking on this pop-up window, the user is redirected to a domain that contains malicious scripts and rogue advertisements, promoting fake spyware remover tools such as WiniBlueSoft.

Posted on March 9, 2009 in Fake Error Messages