Adware.Toprebates.C is a type of a malicious Trojan infection. As an adware application, Adware.Toprebates.C aims to promote malware through deceiving popup alerts. In order to assure if a computer system has been infiltrated by the Adware.Toprebates.C, it is recommended to make a full computer system scan with a legitimate anti-spyware software program. The case that Adware.Toprebates.C is able to invade any computer system through security exploits and flaws, in most cases without the user’s interaction, it could mean that your system has become compromised.

Posted on December 16, 2009 in Adware


Spyware.Webdir is malicious application that can compromise a system without the user's permission. Spyware.Webdir operates as an Internet Explorer Browser Helper Object. Spyware.Webdir can make users land on malicious web pages if they type words into a search engine which are spelled incorrect. Spyware.Webdir can install itself onto user's PC and boot up automatically each time that Windows or the Internet Explorer browser starts. The main aim of Spyware.Webdir is to earn money off user’s searches and Internet activity.

Posted on December 16, 2009 in Spyware


Heur.Downloader is a Trojan Downloader and heuristic detection routine. Usually, Heur.Downloader could be installed through an exploit or some other tricky ways. Heur.Downloader helps to download and install other malware and undesired software onto a victim's PC. Heur.Downloader may download adware, spyware or other malware from multiple servers or sources on the Internet. Heur.Downloader is commonly installed without user's interaction through security exploits, and can severely compromise computer system security.

Posted on December 16, 2009 in Trojan Downloader


Trojan.Stesid.F is a malicious Trojan infection. Trojan.Stesid.F may look an innocent computer program that seems to carry out legitimate and useful functions, but at the same time deceitfully accomplishes damaging and illegal functions that include killing the stored data or enabling a hacker to obtain access to the system without authorization. Trojan.Stesid.F generally does not replicate itself from one computer to another for spreading across a wide range but can be obtained through the internet.

Posted on December 16, 2009 in Trojans


GuardPcs screenshot

GuardPcs, also known as Guard Pcs, is a fake security application that comes from the family. Malware makers must be desperate and in a hurry to distribute new rogue software to avoid detection since GuardPcs is an exact mock up of iGuardPC; even the Graphical User Interface (GUI) are exactly the same. Guard Pcs distributes itself with the aid of Trojans found on fake video codecs, hijacker websites, or malware-based advertisements. Malware makers may also use social networks like Facebook and MySpace to trick users to download Trojans. Once the Trojan install GuardPcs on a user's machine, fake security messages meant to like a Windows notification message with links that take the user to...

Posted on December 15, 2009 in Rogue Anti-Spyware Program


BackDoor-DOQ.gen.y is an ominous Trojan that opens backdoors into victim's systems allowing attackers to access private data. Once BackDoor-DOQ.gen.y has entered a system, it can connect to an IRC port and download more dangerous computer parasites from a remote server. BackDoor-DOQ.gen.y will slow down the performance of a system and put a victim's confidential information at risk of being stolen.

Posted on December 15, 2009 in Backdoors


PWS-Zbot.gen.v is a stealthy Trojan that is able to inject itself into legitimate system processes in order to avoid detection. PWS-Zbot.gen.v may enter a computer user's system through the exploitation of system vulnerabilities and web browser holes. PWS-Zbot.gen.v is designed to steal a victim's sensitive information, such as online banking details, by making screen snapshots and recording a victim's keystrokes. Dangerous Trojans like PWS-Zbot.gen.v should not remain on a computer system.

Posted on December 15, 2009 in Trojans

Generic PWS.y!bhd

Generic PWS.y!bhd is a password stealing Trojan that will put a victim's private data in danger of being stolen and used for malicious activities. Generic PWS.y!bhd usually spreads via infected spam e-mails or browser holes. Generic PWS.y!bhd is known to steal information such as online banking credentials, passwords, usernames and more. Victims are advised to utilize an anti-spyware program to detect and remove Generic PWS.y!bhd.

Posted on December 15, 2009 in Trojans


W32/Sdbot.worm!fn is a virus with backdoor functionalities, giving attackers unauthorized access to victims' computers. W32/Sdbot.worm!fn is able to spread via poorly secured network shares, malicious web pages or the exploitation of system vulnerabilities. With the use of an IRC protocol, W32/Sdbot.worm!fn is able to connect with a remote attacker and possibly download additional malware. Users should scan their computer systems with an anti-virus program in order to locate and remove W32/Sdbot.worm!fn.

Posted on December 15, 2009 in Viruses


Backdoor.PcClient.Gen.3 is a dangerous Trojan used by cyber-criminals to break into victim's systems. Backdoor.PcClient.Gen.3 typically spreads to different computer systems via software exploits. On penetrating a system, Backdoor.PcClient.Gen.3 contacts a remote server and surreptitiously downloads harmful malware onto a victim's system. Keep your security software and other programs updated in order to avoid being infected with malware such as Backdoor.PcClient.Gen.3.

Posted on December 15, 2009 in Backdoors


Trojan:Win32/Daonol.H is a keylogger program that secretly runs in the background of a victim's system. Trojan:Win32/Daonol.H may enter a user's system via infected e-mail attachments or malicious drive-by downloads. Once inside a system, Trojan:Win32/Daonol.H will modify certain registry settings and block access to websites such as MSN, PrevX, McAfee, etc. Trojan:Win32/Daonol.H is able to steal confidential data, disable certain security programs and redirect searches to malicious websites. Trojan:Win32/Daonol.H should be removed promptly, before it causes further damage.

Posted on December 15, 2009 in Trojans


Mal/Zlob-G is a harmful Trojan program that may register itself as a Browser Helper Object once it has surreptitiously accessed a PC. Mal/Zlob-G may also create a registry key that will ensure that it is executed with every Windows start-up. Mal/Zlob-G is able to connect with a remote server via the internet and download more parasites onto a compromised machine. Mal/Zlob-G is a computer security threat that should be removed.

Posted on December 15, 2009 in Trojans


Trojan:Win32/Delf.EP is created to target and infiltrate Windows operating systems. On accessing a system Trojan:Win32/Delf.EP may open security holes and download other dangerous malware onto a compromised PC. Trojan:Win32/Delf.EP may also affect the normal operation of a victim's system and disable certain security settings. The immediate removal of Trojan:Win32/Delf.EP is strongly advised.

Posted on December 15, 2009 in Trojans


Backdoor:Win32/IRCbot.gen!P is a Windows platform Trojan that uses a backdoor to transport malicious programs onto a victim's system. Backdoor:Win32/IRCbot.gen!P also gives unauthorized users access to a victim's machine, allowing them to steal any sensitive information found. A security application should be used to remove Backdoor:Win32/IRCbot.gen!P and any files related to it.

Posted on December 15, 2009 in Trojans

Top 5 Steps to a Healthy Running Computer

Computers have become a vital part of daily life and people depend on them to complete various day-to-day tasks. It would be very hard to image life without computers, let alone a system that performs poorly. So why not take the necessary steps to keep your computer running healthy? It is very important to perform the proper computer maintenance now rather than later to keep your system running healthy so you do not face potential issues down the road. If you do not have the time to sacrifice to repair your system when it crashes, then you may want to follow and apply our top 5 easy steps to a healthy running computer below. Here are five important steps to ensure that your system is healthy and running at its peak performance. Step 1: Perform a registry scan and repair. An error-free Windows registry is one of the most crucial aspects...

Posted on December 14, 2009 in Computer Security