W32.Gosys

W32.Gosys is a worm that distributes itself via network shares and local removal drives. W32.Gosys is able to open a backdoor on a compromised PC, making the system vulnerable to other malware attacks. W32.Gosys may install malware that records keystrokes, executes malicious commands and downloads infected files. If you detect W32.Gosys on your system, it is best to automatically remove it with an anti-spyware application.

Posted on November 18, 2009 in Worms

Win32.Virut.Gen.4

Win32.Virut.Gen.4 is a virus with the ability to modify legitimate files by infecting or overwriting them with malicious code. The Win32.Virut.Gen.4 file infector may also have IRC bot functionalities. Win32.Virut.Gen.4 may create a backdoor in order to communicate with a server outside the user's computer. Win32.Virut.Gen.4 is a dangerous security risk that must be removed.

Posted on November 18, 2009 in Viruses

IBM researcher Uses SSL Flaw to Demonstrate How An Attacker Can Steal Twitter Logins

If well all knew the culprit of every hacking incident on Twitter then computer users would never have to worry about the dangers of using social networks ever again. Too bad we do not live in that perfect world and the reality we face is that Twitter is one of the many social networks that continues to be a huge target for hackers. A flaw within SSL (Secure Sockets Layer) protocol could be used to trick Twitter users into sending messages that contains their login password. This discovery was made last week by an IBM researcher. This process can only be successfully accomplished through a hacker gaining access onto the unsuspecting user's network to initiate what is called a 'man-in-the-middle attack'. Basically, this process will probably not affect a large number of Twitter users. With the recent discovery of an SSL flaw in Twitter,...

Posted on November 17, 2009 in Computer Security

Trojan-Downloader.VBS.Agent

Trojan-Downloader.VBS.Agent is computer threat that is able to download malicious files via the internet and execute them on a victim's computer. Trojan-Downloader.VBS.Agent may surreptitiously infiltrate a user's system via contaminate e-mail attachments or links. Trojan-Downloader.VBS.Agent may also disturb the regular running of your computer system.

Posted on November 17, 2009 in Trojan Downloader

W32.SillyDC

W32.SillyDC is a menacing Windows platform worm from the W32.Silly family of worms. W32.SillyDC is able to disperse itself through removable media. Once installed, W32.SillyDC will modify the registry in order for it to execute on every system start-up. W32.SillyDC may cause critical damage to your computer system.

Posted on November 17, 2009 in Worms

Malware.Fiala

Malware.Fiala is a Trojan horse program that may put a computer system at great risk. Malware.Fiala may drop dangerous files and involve an infected computer in botnet activities. Malware.Fiala may infect a computer system via web browser vulnerabilities or malicious websites. Malware.Fiala should not remain on a computer system; remove Malware.Fiala with a good security tool.

Posted on November 17, 2009 in Trojans

Win32.Alman.B

Win32.Alman.B is a malware program that can surreptitiously integrate itself into legitimate data or program files. Win32.Alman.B is a Windows platform infection that may infect files with malicious executable programs. Win32.Alman.B may make a compromised PC vulnerable to other attacks by downloading additional parasites onto the PC. For the safety of your computer remove Win32.Alman.B immediately.

Posted on November 17, 2009 in Malware

Troj/Clickr-N

Troj/Clickr-N is a Windows platform Trojan that may spread via porn related websites or drive-by downloads. When Troj/Clickr-N enters a system, it may communicate with a remote server via the internet and install additional parasites onto the infected computer. The presence of Troj/Clickr-N will only weaken your computer, making it susceptible to other malware attacks.

Posted on November 17, 2009 in Trojans

Troj/Mdrop-CID

Troj/Mdrop-CID is a harmful Trojan downloader program that includes the functionality to start services. Troj/Mdrop-CID enables remote attackers to access an infected PC and install other malicious programs on to the PC as well. Troj/Mdrop-CID may spread through the exploitation of security holes or porn related websites. Immediately removing Troj/Mdrop-CID is the best thing you can do for your PC.

Posted on November 17, 2009 in Trojans

W32/Autorun-AUW

W32/Autorun-AUW is a network worm that infects systems by replicating across accessible networks. W32/Autorun-AUW may install more dangerous programs onto a PC as well as produce outbound traffic. W32/Autorun-AUW can be detected and removed with a decent security application.

Posted on November 17, 2009 in Worms

PE_VIRUX.A-1

PE_VIRUX.A-1 is a dangerous file infector program that opens a backdoor for remote attackers on a compromised computer. PE_VIRUX.A-1 gives remote attackers full control over a system, allowing them to install malicious parasites onto the infect computer. PE_VIRUX.A-1 can be installed onto a computer via drive-by downloads or malicious websites, without the user's knowledge or permission.

Posted on November 17, 2009 in Malware

Generic Dropper.mf

Generic Dropper.mf is a Trojan that drops harmful programs onto a compromised computer. Generic Dropper.mf may spread to different computer systems via spam mail or contaminated websites. Generic Dropper.mf may cause a compromised machine to operate slower than usual. To prevent further infection and more damage to your computer, remove Generic Dropper.mf as soon as possible.

Posted on November 17, 2009 in Trojans

Malware Makers Target Online Games to Spread Worms

A majority of computer users play online computer games for their pleasure or relaxation after a long workday. It be unfortunate to find out that an online computer game infected by a virus turns your day into a stressful one. Playing computer games can be enjoyable but is it really safe for your computer system? You may guess that surfing the Internet is not 100% secure but the last thing on your mind is getting a nasty computer virus from playing an online computer game. Microsoft Security has issued a research report where it notifies that virus creators are continuously assaulting online video game players. Also, a large number of malicious software programs are being developed to obtain authorization of renowned online games. According to the report, we were able to identify that the favorite objects to perform phishing attacks...

Posted on November 16, 2009 in Computer Security

Personal Protector

Personal Protector screenshot

Personal Protector is a vicious security application that pretends to be able to detect and remove computer parasites. Personal Protector is nothing more than a rogue anti-spyware program that comes from the same group of cyberthieves that created the fake security program called Personal Guard 2009. Because Personal Protector cannot detect or remove threats from your system, it is recommended that you remove Personal Protector immediately with a spyware removal tool. Not only can Personal Protector populate your system with other unknown malware files, but it can load into memory making it difficult to manually remove and potentially cause damage to system files.

Posted on November 16, 2009 in Rogue Anti-Spyware Program

Link Safeness

Link Safeness screenshot

Link Safeness is a deceitful security program created by the same group of hackers that made AntiAID and Site Villain. It is critical that once Link Safeness is detected on your system that action be taken to remove it at once. Link Safeness, once installed, will display fake parasite alerts and system scan results in an attempt to make you purchase the full Link Safeness program. All computer users must know that Link Safeness is completely unable to detect or remove computer parasites. It is best to avoid purchase of Link Safeness or you may end up with a non-working and fake security application.

Posted on November 16, 2009 in Rogue Anti-Spyware Program