Mal/EncPk-AO is a Trojan program that has been packed with a protection system generally utilized by malware creators. Mal/EncPk-AO may provide remote attackers with unauthorized access to a computer system, putting the computer at risk of becoming part of a botnet. Mal/EncPk-AO is a threat that should not remain on your PC.

Posted on November 13, 2009 in Trojans


Mal/Horst is from a family of downloading Trojans. Mal/Horst may access a user's computer system via malicious drive-by downloads or unsolicited e-mails. Mal/Horst may give remote attackers access to a victim's system, allowing them to steal confidential information. Remote attackers may also install additional infections onto a compromised computer. Mal/Horst is a danger to your computer system and the data stored on it.

Posted on November 13, 2009 in Trojans


Trojan-Downloader.Win32.Xanda.a contains malicious software that it drops and installs onto a victim's computer. Trojan-Downloader.Win32.Xanda.a may download a backdoor onto a compromised PC, giving remote attackers access to the system. Trojan-Downloader.Win32.Xanda.a may also surreptitiously turn a compromised PC into a bot that is used for other malicious activities. Trojan-Downloader.Win32.Xanda.a is a security threat that must be removed.

Posted on November 13, 2009 in Trojan Downloader


VirTool.Win32.VBInject is a Trojan that may be used by malware as an obfuscator. VirTool.Win32.VBInject may prevent the detection and examination of malware code it is applied to. Also, VirTool.Win32.VBInject may download additional parasites onto a compromised computer. It is not recommended to manually remove VirTool.Win32.VBInject; remove VirTool.Win32.VBInject with an effective anti-spyware program immediately after detection.

Posted on November 13, 2009 in Trojans

FireEye Strikes a Mighty Blow Against Ozdok/Mega-D Spam Botnet

A notorious botnet, responsible for almost a third of the world's spam emails, has been destroyed by a security firm. Most computer users may not notice the destruction of the botnet Ozdok due to the fact that most of it's IPs have already been blacklisted by most email services. Ozdok, dubbed Mega-D, was the leader of the spambot pack, spewing 32% of the world's spam, according to reliable spamtraps. Just recently the security firm FireEye, was able to put an end to this spam menacing botnet eliminating, at least for some time, the spread of a large number of spam messsages over the Internet. FireEye should however be praised for their efforts as the small company proved capable of dismantling what was found to be a large operation with lots of cash at their disposal. How Did Ozdok Meet its Demise? Ozdok boasted plenty of protection...

Posted on November 12, 2009 in Computer Security


AntiAID screenshot

AntiAID is a fake anti-spyware application from the same family as WiniBlueSoft. AntiAID was created with a slightly different graphical user interface than previous rogueware in its family. AntiAID generally spreads through infected video codecs or flash updates. Once AntiAID has managed to enter a system, it will conduct a fake system scan on a user's system. The scan will display exaggerated results of virus infections, followed by frequent displays of annoying pop-ups and recommendations to purchase the full version of AntiAID. AntiAID and all its related notifications are not to be trusted.

Posted on November 12, 2009 in Rogue Anti-Spyware Program is a malicious domain that advertises the rogue anti-spyware program AntiAID. Users will only encounter if they have previously been infected with a stealthy Trojan related to the infection. presents the fake security tool, AntiAID, as a reliable tool that can remove parasites. contains misleading information; do not be fooled into purchasing the AntiAID rogueware.

Posted on November 12, 2009 in Rogue Websites is a malicious web page that promotes the fake anti-spyware program Antivirus System PRO. Sneaky Trojans help spread by surreptitiously infecting users' systems. On entering a system, will display a fake warning that the victim is browsing an infected website. The victim will then be advised to purchase Antivirus System PRO in order to continue browsing safely. and Antivirus System PRO are not to be trusted and should be removed with a recognized security application immediately.

Posted on November 12, 2009 in Rogue Websites


Backdoor:WinNT/Festi.A is classified as a backdoor Trojan that allows remote attackers access to a victim's computer system. Backdoor:WinNT/Festi.A may distribute itself via contaminated e-mail attachments or infected websites. Backdoor:WinNT/Festi.A may also be involved in malicious botnet activities, therefore it is recommended to remove Backdoor:WinNT/Festi.A as soon as possible.

Posted on November 12, 2009 in Trojans


VirTool:Win32/Vbcrypt.AD is a Trojan program that can install additional malware onto a PC, as well as destroy or modify certain registry files. VirTool:Win32/Vbcrypt.AD may spread through malicious drive-by downloads or web pages. VirTool:Win32/Vbcrypt.AD is a computer threat that should be removed with a reliable security program.

Posted on November 12, 2009 in Trojans


W32.Daprosy is a pesky worm that may severely affect the normal operation of your computer system. W32.Daprosy may enter unsuspecting users' computers via infected e-mail attachments. Once the malicious attachment is executed, W32.Daprosy will proceed to infect mapped, fixed, as well as removable drives. W32.Daprosy may also send infected e-mails to users listed on a victim's e-mail contact list. It's recommended to remove W32.Daprosy with a reputable security application.

Posted on November 12, 2009 in Worms


Mal/Dropper-AE is a malignant Trojan horse program that is mainly found on Windows platform systems. Mal/Dropper-AE may put your computer in more danger by involving it in botnet activities. Mal/Dropper-AE may also allow for additional malware to be installed onto a victim's computer. Attempting to manually remove Mal/Dropper-AE is not advisable; rather use an effective anti-spyware tool.

Posted on November 12, 2009 in Trojans


The dangerous Backdoor.Win32.Popwin, is a Trojan designed to exploit vulnerabilities on Windows platform systems. Backdoor.Win32.Popwin may put your private information at risk by providing remote attackers with backdoor access to your system. Once Backdoor.Win32.Popwin has accessed a system, it may attach itself to Windows System32 files in order to open at every Windows start-up. Backdoor.Win32.Popwin may decrease the security of your system for future attacks; therefore it should be removed immediately.

Posted on November 12, 2009 in Backdoors


SystemVeteran screenshot

SystemVeteran or System Veteran is a fake security application. SystemVeteran uses misleading popup alerts in addition to fabricated system scan results to scare computer users into purchasing the full SystemVeteran application. SystemVeteran is not viable security program which means it is completely unable to detect or remove parasites including spyware, viruses or malware. It is suggested that once SystemVeteran is detect that it be removed at once before it is able to cause system damage. SystemVeteran belongs to the familya and has, among its many clones,

Posted on November 12, 2009 in Rogue Anti-Spyware Program


The Mal/EncPk-DW Trojan is able to surreptitiously infiltrate a system and run in the background without a user's knowledge. Mal/EncPk-DW may give remote attackers access to victims' systems, enabling them to install more malicious malware onto the already infected system. Mal/EncPk-DW is a threat to your computer and the confidential information stored on it.

Posted on November 12, 2009 in Trojans