SystemVeteran screenshot

SystemVeteran or System Veteran is a fake security application. SystemVeteran uses misleading popup alerts in addition to fabricated system scan results to scare computer users into purchasing the full SystemVeteran application. SystemVeteran is not viable security program which means it is completely unable to detect or remove parasites including spyware, viruses or malware. It is suggested that once SystemVeteran is detect that it be removed at once before it is able to cause system damage. SystemVeteran belongs to the familya and has, among its many clones,

Posted on November 12, 2009 in Rogue Anti-Spyware Program


The Mal/EncPk-DW Trojan is able to surreptitiously infiltrate a system and run in the background without a user's knowledge. Mal/EncPk-DW may give remote attackers access to victims' systems, enabling them to install more malicious malware onto the already infected system. Mal/EncPk-DW is a threat to your computer and the confidential information stored on it.

Posted on November 12, 2009 in Trojans


SystemWarrior screenshot

System Warrior is a fake security application. System Warrior comes from the group of attackers that created the various members of the family, to which SystemWarrior belongs. Other rogue anti-spyware programs that are part of SystemWarrior's family include System Warrior uses various methods to make unsuspecting computer users believe that they need to purchase the full System Warrior program to remove a threat. These threats are usually brought to a user's attention through fake popup warning messages and bogus system scan results. System Warrior is not able to effectively detect or remove computer parasites.

Posted on November 11, 2009 in Rogue Anti-Spyware Program


Email-Worm.Win32.Iksmas.frg is a computer worm infection that can use a network attached to the infected system to replicate itself. Email-Worm.Win32.Iksmas.frg can spread malicious emails onto a computer user’s contact list causing it to further spread. Email-Worm.Win32.Iksmas.frg can lead to compromising personal information so it is best to remove it before damage is caused.

Posted on November 11, 2009 in Worms


HeurEngine.Malautoit is a malware parasite that can be used to download other malicious files or programs onto an infected machine. Once a computer is infected with HeurEngine.Malautoit, then it is vulnerable to other parasites that can infect the computer without knowledge to the computer user. HeurEngine.Malautoit should be detected and safely removed with a spyware removal tool to reduce the risk of further damage.

Posted on November 11, 2009 in Malware


Win-Trojan/Xema.variant is a backdoor Trojan parasite that can be installed and run undetected. Win-Trojan/Xema.variant has the ability to download other malware onto the infected computer and then record internet activity while logging keystrokes. Win-Trojan/Xema.variant can seriously compromise personal user data as well as lead to further destruction if not removed.

Posted on November 11, 2009 in Trojans


Spyware.Keylogger is a dangerous keylogger program that can record keystrokes and then use them to port to a remote attacker. Spyware.Keylogger can seriously compromise personal user data including banking login credentials. Spyware.Keylogger can also use rootkit methods to go undetected from security applications. Detection and removal of Spyware.Keylogger should be performed with a spyware removal tool to ensure that the system is not damaged.

Posted on November 11, 2009 in Spyware


Trojan-PSW.Lemir is a keylogger parasite known to record user activity and keystrokes. Trojan-PSW.Lemir could give up personal information to a remote hacker leading to identity theft. Trojan-PSW.Lemir can be used as a surveillance application monitoring online activity. Trojan-PSW.Lemir used as a malicious tool can seriously compromise a user's personal information.

Posted on November 11, 2009 in Keyloggers


Trojan.Crypt is a computer Trojan horse that can drop other malware infections onto the infected system without a user’s knowledge or permission. Trojan.Crypt has the ability to compromise personal data by stealing passwords and login credentials to online accounts. Hackers can obtain personal information through Trojan.Crypt by a remote connection. It is very important to detect and safely remove Trojan.Crypt with a spyware detection tool.

Posted on November 11, 2009 in Trojans


Mal/Behav-116 is a dangerous computer Trojan horse that can be ported into a system through a security hole or backdoor. Mal/Behav-116 can be installed to open up the infected system to outside attackers where remote access to the computer can be obtained. Mal/Behav-116 can also disable security applications on the infected computer leaving it vulnerable to other attacks.

Posted on November 11, 2009 in Trojans

Internet Virus Frames Innocent PC Users for Child Pornography

In an unforeseen situation an internet virus was found to frame a computer user as a collector of child pornography. Out of all of the menacing things that a computer Virus could do, this ranks at the top. Ever heard of the excuses that school aged kids make when they didn't finish their homework? You usually get, "my dog ate it" or "I lost it". What if someone was wrongly accused of having child pornography on their computer? Surely that case is just as easy to solve as the kid that didn't do his homework right? Well, not exactly. Their are cases that computer users have had a type of virus on their system that purportedly frames them as a pedophile or collector of illegal images of nude children. We found where a recent investigation by Associated Press discovered cases of innocent people that because of a virus infection were being...

Posted on November 10, 2009 in Computer Security

Fake 'Facebook Account Update' and 'Myspace Password Reset Confirmation' Phishing Emails Contain Malware

If you are an active user of Facebook or MySpace, then you may want to take note of the recent scamming and phishing attacks that could install malware on your computer. Computer users have encompassed various phishing attacks through Facebook and MySpace spam messages. These messages were found to be laden with malicious links that redirect users to a phishing site where login credentials can be obtained. The latest malicious spam can persuade users to log in by using a false link. The email pretends to make a computer user’s online experience more secure and pleasing by updating their credentials. The fake messages allege to come from either Facebook or MySpace. Users will receive an email that appears to be an official Facebook invite or a password reset confirmation but actually contains a zip file that, if opened, loads an .exe...

Posted on November 10, 2009 in Computer Security


UnlimitedGuard is an online scam, which was created by web criminals in order to imitate a real security application. UnlimitedGuard poses as a legitimate anti-spyware program; however, in reality, UnlimitedGuard will not provide you any PC security services that would assure your computer?s safety. UnlimitedGuard is not able to detect and remove any type of computer infections. UnlimitedGuard supposedly detects malware threats in order to trick PC users into thinking their computers have been infected with numerous malware threats. Once installed, UnlimitedGuard starts performing fake PC scans and returns false malware results in order to scare potential victims into believing they have serious computer problems. To get rid of imaginary security issues, UnlimitedGuard offers PC users to buy its bogus software, which will allegedly...

Posted on November 10, 2009 in Rogue Anti-Spyware Program


Trojan-GameThief.Win32.Magania.cmak is a Trojan program that may attempt to steal confidential data such as passwords, usernames or login details. Trojan-GameThief.Win32.Magania.cmak may enter a computer system through porn related websites, infected downloads or malicious websites. Trojan-GameThief.Win32.Magania.cmak may also download other dangerous malware onto a victim's machine. It's important to remove Trojan-GameThief.Win32.Magania.cmak and all its components immediately after detection.

Posted on November 10, 2009 in Trojans


Trojan.Zbot!gen2 is a dangerous program that may be associated with malicious botnet activities. Trojan.Zbot!gen2 may open a conduit on a victim's PC, giving remote attackers access to a victim's stored personal information. The presence of Trojan.Zbot!gen2 on a system will also allow remote attackers to install several types of infections onto a compromised PC. Trojan.Zbot!gen2 represents a serious security risk to a victim's financial or banking information.

Posted on November 10, 2009 in Trojans