Trojan-Dropper.Win32.Flystud.lc

Trojan-Dropper.Win32.Flystud.lc is designed to run in the background of a compromised PC without a user's knowledge or consent. Trojan-Dropper.Win32.Flystud.lc is a Windows platform Trojan that may spread via malicious adware or drive-by-downloads. Trojan-Dropper.Win32.Flystud.lc may install and execute other malware on a victim's machine, putting the infected computer and any stored information at great risk. Trojan-Dropper.Win32.Flystud.lc should be removed from a system when detected.

Posted on November 3, 2009 in Trojans

Trojan-GameThief.Win32.OnLineGames.vjpn

Trojan-GameThief.Win32.OnLineGames.vjpn is a dangerous Trojan created to steal account details for the online game, LineAge2. Trojan-GameThief.Win32.OnLineGames.vjpn is able to enter user's computers without their knowledge. Trojan-GameThief.Win32.OnLineGames.vjpn monitors user's gaming activities and gathers information such as online login passwords and usernames. Trojan-GameThief.Win32.OnLineGames.vjpn may be safely removed with a computer security application.

Posted on November 3, 2009 in Trojans

Infostealer.Banker.C

Infostealer.Banker.C is a Trojan horse with the ability to steal confidential data from a targeted computer. Infostealer.Banker.C may spread via infected e-mails purportedly from ABN-AMRO bank. Infostealer.Banker.C may gather banking details and send them to a remote attacker. The manual removal of Infostealer.Banker.C is not advised due to it stealth tactics and risk of damage to essential system files.

Posted on November 3, 2009 in Stealers

Hacktool

Hacktool is a dangerous rootkit that can manipulate a set of programs and scripts in order to give a remote attacker access to a system. Once Hacktool has secretly infiltrated a vulnerable system it gives an attacker administrative access to the compromised computer. Hacktool may also utilize legitimate programs to assist in the execution of malicious tasks. Hacktool must be removed with a reliable security application as soon as it is detected to prevent further damage.

Posted on November 3, 2009 in Trojans

FDIC Warns Banks of an Increase in "Money Mule" Scams

As if we didn't have enough to worry about in our suffering economy we get news from the Federal Deposit Insurance Corporation (FDIC) now warning financial institutions about an increase in the number of banking criminal activity from "money mules" used to transfer funds from hacked online banking accounts. "Money mules" has become a term for people who were hired through those infamous work-at-home scams who find themselves assisting in cybercriminal money laundering activities that usually takes place overseas. Little do some of the work-at-home "employees" know that they are duped into assisting in criminal activity or basically, money laundering. The FDIC has identified that these incidents involve cases where banking customers make several deposits, totaling less than $10,000 so a red flag is not raised, and then withdraw all of...

Posted on November 2, 2009 in Computer Security

BlockScanner

BlockScanner screenshot

BlockScanner is a rogue security application and one more member of the infamous family. BlockScanner is the latest rogue within this group which poses as a legitimate security program. BlockWatcher acts as spyware removal software or a registry repair utility but in fact floods the desktop of an infected system with false system errors and critical spyware infections warnings. Most of BlockScanner's spyware tools uses Trojan Zlob or Vundo Trojan horses to persuade computer users to download a free trial program. BlockScanner uses a fake scanner to generate exaggerated spyware results which are false positives. BlockScanner should not be given the leeway to mislead the computer user and...

Posted on November 2, 2009 in Rogue Anti-Spyware Program

Backdoor.Win32.SubSeven.19

Backdoor.Win32.SubSeven.19 is a Backdoor Trojan which provides the hacker with remote-administration of victim machines. Backdoor.Win32.SubSeven.19 can be instructed to send, receive, execute and delete files while harvesting confidential data from the computer, loging activity on the computer and many more malicious operations. The platform this malware used to operate from is a Windows PE EXE file. Backdoor.Win32.SubSeven.19 affects Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista and Windows XP. Backdoor.Win32.SubSeven.19 is a definite threat to the security of any PC and if detected should be immediately removed.

Posted on November 2, 2009 in Trojans

Backdoor.Win32.Agent.agbb

Backdoor.Win32.Agent.agbb is a software program that gives an attacker unauthorized access to a computer before remotely controlling the machine without the user's knowledge. Backdoor.Win32.Agent.agbb compromises the system's integrity by making changes to the system that allow the hacker to maliciously obtain information and release other malware parasites onto the computer or network. Backdoor.Win32.Agent.agbb should be removed from the system immediately to prevent damage to essential system files.

Posted on November 2, 2009 in Trojans

Worm.Win32.AutoRun.arcx

Worm.Win32.AutoRun.arcx is a network-aware worm that infects a system and then attempts to replicate across the entire existing network. Worm.Win32.AutoRun.arcx has been found to produce outbound traffic and also illegally download unknown files from the Internet. Worm.Win32.AutoRun.arcx also creates a startup registry entry and contains all the characteristics of a severe security risk. Worm.Win32.AutoRun.arcx should be exterminated from the infected system immediately to limit further damage.

Posted on November 2, 2009 in Worms

Mal/KeyGen-A

Mal/KeyGen-A is a dangerous virus that targets systems running the Delphi development environment. Mal/KeyGen-A was created to retrieve the installation folder for Delphi from the registry key and then infects it by adding its own malicious code in the implementation section. Mal/KeyGen-A should be removed from any computer system immediately to prevent system damage.

Posted on November 2, 2009 in Viruses

Trojan-Spy.Win32.Agent.bawr

Trojan-Spy.Win32.Agent.bawr is a keylogger program that can capture all user keystrokes including confidential details such username, password and credit card number. Trojan-Spy.Win32.Agent.bawr makes an ominous entry and often tries try to steal your usernames and passwords to send them to an attacker. Once infected, your computer may be rendered defenseless as Trojan-Spy.Win32.Agent.bawr may bypass any installed security programs.

Posted on November 2, 2009 in Keyloggers

Trojan.Win32.Inhoo

Trojan.Win32.Inhoo is a trojan program that is deceptively installed to download malware and unwanted software onto an unsuspecting victim's computer. Trojan.Win32.Inhoo may download adware, spyware or other malware from multiple servers on the Internet. Trojan.Win32.Inhoo poses a high risk to a PC's security. Trojan.Win32.Inhoo's symptoms include illicit network connections, self-mutation, disabling of security software and the installation of harmful malware. Trojan.Win32.Inhoo may also transmit personal information without your consent and severely compromise the performance of your computer.

Posted on November 2, 2009 in Trojans

Virus.Win32.CeeInject

Virus.Win32.CeeInject is a trojan which can infect Windows systems and attempt to steal personal information from the compromised computer. Virus.Win32.CeeInject may download adware, spyware or other malware from multiple servers on the Internet while going undetected. Virus.Win32.CeeInject poses a high risk to a PC's security. Additional Virus.Win32.CeeInject symptoms include illicit network connections, self-mutation, disabling of security software and the installation of harmful malware.

Posted on November 2, 2009 in Trojans

Trojan.Win32.Iyeclore

Trojan.Win32.Iyeclore shows significant characteristics to present a severe security risk. Trojan.Win32.Iyeclore enters the computer or network without the user knowing and opens a backdoor for other malicious viruses to enter the already compromised system. Trojan.Win32.Iyeclore will steal personal information from an infected PC by monitoring the user's online activities. Poor passwords and login information are quickly acquired. Credit card numbers are also stolen and the information is then sent to a remote server for the hacker's convenience. Trojan.Win32.Iyeclore should be detected and safely removed with a spyware detection and removal tool. Author of Trojan.Win32.Iyeclore: Ikarus

Posted on November 2, 2009 in Trojans

Trojan.Win32.Buzus.bumi

Trojan.Win32.Buzus.bumi is a modified backdoor Trojan that gives attackers access to an infected computer or network. Trojan.Win32.Buzus.bumi may enter a user's system via browser holes or malicious e-mail attachments. Trojan.Win32.Buzus.bumi can also gather sensitive personal information from the PC and send it to a remote server where hackers gain access to the information. It is advisable to remove Trojan.Win32.Buzus.bumi before it takes control of the infected system and puts the owner's security in jeopardy.

Posted on November 2, 2009 in Trojans