Email-Worm.Win32.NetSky.x

Email-Worm.Win32.NetSky.x is a mass-mailing worm that spreads to different systems as an infected e-mail attachment. Email-Worm.Win32.NetSky.x e-mails itself to addresses harvested from specific files on a compromised PC. Email-Worm.Win32.NetSky.x is executed when an unsuspecting user clicks on the infected attachment, then it proceeds to create a start-up registry entry. Email-Worm.Win32.NetSky.x may slow down the operation of a system and install other parasites onto the system. A decent security application is required to protect your e-mail against malicious programs such as PC Email-Worm.Win32.NetSky.x.

Posted on December 11, 2009 in Worms

Trojan.Win32.Delf.kf

Trojan.Win32.Delf.kf is an information stealing program that targets Windows operating systems. Trojan.Win32.Delf.kf is able to trick users into downloading it by disguising itself as a legitimate program. Trojan.Win32.Delf.kf is able to monitor a victim's internet activities and capture confidential information such as banking details and passwords. The stolen information is then sent to a remote attacker through a predefined e-mail address.

Posted on December 11, 2009 in Trojans

SpamTool.Win32.Delf.h

SpamTool.Win32.Delf.h is a Trojan program that can use a compromised computer as an e-mail relay. SpamTool.Win32.Delf.h is able to send spam mail to e-mail contacts harvested from a victim's computer system. On infiltrating a system, SpamTool.Win32.Delf.h will register itself in the registry to ensure that it launches with every Windows start-up. SpamTool.Win32.Delf.h will also enable file settings such as 'Hidden', 'System' or 'ReadOnly' in order to avoid detection. SpamTool.Win32.Delf.h may also download other harmful files onto a compromised machine.

Posted on December 11, 2009 in Trojans

Trojan-Clicker.Win32.VB.dgz

Trojan-Clicker.Win32.VB.dgz is a program created to maliciously increase the amount of times a particular website appears to be visited. Once Trojan-Clicker.Win32.VB.dgz is executed, it may copy its body to the Windows system directory. Trojan-Clicker.Win32.VB.dgz will then proceed to download additional malware from a remote server onto the compromised PC. Trojan-Clicker.Win32.VB.dgz may also be involved in botnet activities; therefore it is advisable to promptly remove Trojan-Clicker.Win32.VB.dgz from your PC if detected.

Posted on December 11, 2009 in Trojans

Worm.Allaple.AA

Worm.Allaple.AA is a polymorphic network worm that may contain a malicious executable file. Worm.Allaple.AA typically spreads via networks with weak passwords or removal storage devices. Worm.Allaple.AA may also exploit vulnerabilities in order to access and replicate across networks. Worm.Allaple.AA is also able to run in the background of a system without a victim's knowledge, and give unauthorized users access to the system.

Posted on December 11, 2009 in Worms

FakeAlert-BB

FakeAlert-BB is a Trojan that displays bogus malware alerts in order to trick users into purchasing a rogue anti-spyware program. Once inside a system, FakeAlert-BB displays scan reports of an alarming amount of computer threats on a user's computer. The user will then be presented with the option to purchase the licensed version of fake security programs such as VirusRemover 2008. FakeAlert-BB is a dangerous program that promotes useless applications that may only harm your computer system.

Posted on December 11, 2009 in Trojans

ParentalFilter

ParentalFilter is a potentially malicious program that was originally designed to block pornographic websites. ParentalFilter is a free software download that, in the hands of a cyber-criminal, may be utilized for malicious activities. ParentalFilter may also come bundled with other dangerous programs that can secretly run in the background of a system. Should you detect ParentalFilter on your PC, it's advisable to scan you system for malware with a recognized security application.

Posted on December 11, 2009 in Malware

Fake Skype 'Urgent System Scan Notification' Points to Rogue Anti-Spyware Programs

Once more, hackers are abusing Skype to lure unwary users to a rogue website to trick them into purchasing useless software. Cyber criminals have created fake profiles on Skype's interface and are sending corrupt messages to Skype users to con them into purchasing rogue anti-spyware programs. Similar to other hacks of this nature, the message contains a fake computer scan, which warns of various programs being infected with computer viruses. The full Skype text message will resemble as follows: "****************************************** URGENT SYSTEM SCAN NOTIFICATION ! PLEASE READ CAREFULLY !! http://www. {rogueAV domain}.net/ For the link to become active, please click on 'Add to contacts' skype button or type it in manually into your web browser ! FULL DETAILS OF SCAN RESULT BELOW ****************************************** WINDOWS...

Posted on December 10, 2009 in Computer Security

Internet Security 2010

Internet Security 2010 screenshot

Internet Security 2010 is a rogue anti-spyware application that can be compared to other fake security tools such as its predecessor called Advanced Virus Remover. Internet Security 2010, through the use of deceiving tactics, is able to persuade computer users to purchase a full version of the Internet Security 2010 program. Some of these methods include conducting fake system scans that return bogus parasite results or displaying several false alert messages that attempt to warn users of a detected threat. Internet Security 2010 should never be used for detection or removal of parasites because it will do nothing but disappoint. If Internet Security 2010 is detected, then it should be a...

Posted on December 10, 2009 in Rogue Anti-Spyware Program

Adware.Component.Unrelated

Adware.Component.Unrelated is an advertising program that contains common components of different threats that are not in any way related to each other. Adware.Component.Unrelated may display potentially unwanted pop-up adverts on an infiltrated system. Adware.Component.Unrelated may also record a user's surfing habits and other internet related activities. It is advisable to protect your PC from potentially unwanted programs such as Adware.Component.Unrelated.

Posted on December 10, 2009 in Adware

Mal/Xilcter-A

Mal/Xilcter-A is a computer threat that may download harmful programs onto a compromised machine. Mal/Xilcter-A may be obtained from contaminated websites or unsolicited e-mails. Mal/Xilcter-A may also provide a remote attacker with full access to an infected PC, giving the attacker an opportunity to steal a victim's private information. For the safety of your PC and the information stored on it, remove Mal/Xilcter-A as soon as it is detected.

Posted on December 10, 2009 in Malware

DefenceLab

DefenceLab screenshot

DefenceLab (aka Defence Lab Removal Tools) is a fake anti-virus program that advertises itself as a legitimate application. DefenceLab displays fake scan reports, warning notifications and pop-up messages in order to convince users that their computers are infected. Once the users are informed about the numerous malware infections, they are conveniently advised to purchase the full version of DefenceLab in order to get their computers malware free. DefenceLab is a fabricated program that spreads with the help of sneaky Trojans. Purchasing the full version of DefenceLab will only result in you losing your money for a useless application.

Posted on December 10, 2009 in Rogue Anti-Virus Program

Mal/Pukish-B

Mal/Pukish-B is a Trojan that downloads malicious files from the internet. Mal/Pukish-B may access a computer system via untrustworthy websites or infected e-mail attachments. Mal/Pukish-B may put a computer system at great risk by exposing it to other malware attacks and giving unauthorized users access to the system. Mal/Pukish-B should be eradicated as soon as it is detected, with a good anti-spyware application.

Posted on December 10, 2009 in Trojans

Adware.Rugo

Adware.Rugo is a software application that displays frequent advertisements on a computer system. Adware.Rugo may enter a system via drive-by downloads or unsolicited e-mails. Adware.Rugo often installs itself as a Browser Helper Object in order to avoid immediate detection. Adware.Rugo is able to display adverts in the form of pop-up windows, a bar across a computer screen or via integrated search results. Adware.Rugo may also gather a user's private information and send it to a remote server.

Posted on December 10, 2009 in Adware

Adware.UCMore

Adware.UCMore is able to enter a system without explicit consent from a user, and display potentially unwanted advertisements. Adware.UCMore often stores itself as an Internet Explorer toolbar that recommends and displays links to other websites according to a user's surfing habits. Some earlier versions of Adware.UCMore are involved in activities such as dropping adware related content and blocking the use of certain search engines. Adware.UCMore can be automatically removed with an effective security program.

Posted on December 10, 2009 in Adware