W32.SillyDC is a menacing Windows platform worm from the W32.Silly family of worms. W32.SillyDC is able to disperse itself through removable media. Once installed, W32.SillyDC will modify the registry in order for it to execute on every system start-up. W32.SillyDC may cause critical damage to your computer system.

Posted on November 17, 2009 in Worms


Malware.Fiala is a Trojan horse program that may put a computer system at great risk. Malware.Fiala may drop dangerous files and involve an infected computer in botnet activities. Malware.Fiala may infect a computer system via web browser vulnerabilities or malicious websites. Malware.Fiala should not remain on a computer system; remove Malware.Fiala with a good security tool.

Posted on November 17, 2009 in Trojans


Win32.Alman.B is a malware program that can surreptitiously integrate itself into legitimate data or program files. Win32.Alman.B is a Windows platform infection that may infect files with malicious executable programs. Win32.Alman.B may make a compromised PC vulnerable to other attacks by downloading additional parasites onto the PC. For the safety of your computer remove Win32.Alman.B immediately.

Posted on November 17, 2009 in Malware


Troj/Clickr-N is a Windows platform Trojan that may spread via porn related websites or drive-by downloads. When Troj/Clickr-N enters a system, it may communicate with a remote server via the internet and install additional parasites onto the infected computer. The presence of Troj/Clickr-N will only weaken your computer, making it susceptible to other malware attacks.

Posted on November 17, 2009 in Trojans


Troj/Mdrop-CID is a harmful Trojan downloader program that includes the functionality to start services. Troj/Mdrop-CID enables remote attackers to access an infected PC and install other malicious programs on to the PC as well. Troj/Mdrop-CID may spread through the exploitation of security holes or porn related websites. Immediately removing Troj/Mdrop-CID is the best thing you can do for your PC.

Posted on November 17, 2009 in Trojans


W32/Autorun-AUW is a network worm that infects systems by replicating across accessible networks. W32/Autorun-AUW may install more dangerous programs onto a PC as well as produce outbound traffic. W32/Autorun-AUW can be detected and removed with a decent security application.

Posted on November 17, 2009 in Worms


PE_VIRUX.A-1 is a dangerous file infector program that opens a backdoor for remote attackers on a compromised computer. PE_VIRUX.A-1 gives remote attackers full control over a system, allowing them to install malicious parasites onto the infect computer. PE_VIRUX.A-1 can be installed onto a computer via drive-by downloads or malicious websites, without the user's knowledge or permission.

Posted on November 17, 2009 in Malware

Generic Dropper.mf

Generic Dropper.mf is a Trojan that drops harmful programs onto a compromised computer. Generic Dropper.mf may spread to different computer systems via spam mail or contaminated websites. Generic Dropper.mf may cause a compromised machine to operate slower than usual. To prevent further infection and more damage to your computer, remove Generic Dropper.mf as soon as possible.

Posted on November 17, 2009 in Trojans

Malware Makers Target Online Games to Spread Worms

A majority of computer users play online computer games for their pleasure or relaxation after a long workday. It be unfortunate to find out that an online computer game infected by a virus turns your day into a stressful one. Playing computer games can be enjoyable but is it really safe for your computer system? You may guess that surfing the Internet is not 100% secure but the last thing on your mind is getting a nasty computer virus from playing an online computer game. Microsoft Security has issued a research report where it notifies that virus creators are continuously assaulting online video game players. Also, a large number of malicious software programs are being developed to obtain authorization of renowned online games. According to the report, we were able to identify that the favorite objects to perform phishing attacks...

Posted on November 16, 2009 in Computer Security

Personal Protector

Personal Protector screenshot

Personal Protector is a vicious security application that pretends to be able to detect and remove computer parasites. Personal Protector is nothing more than a rogue anti-spyware program that comes from the same group of cyberthieves that created the fake security program called Personal Guard 2009. Because Personal Protector cannot detect or remove threats from your system, it is recommended that you remove Personal Protector immediately with a spyware removal tool. Not only can Personal Protector populate your system with other unknown malware files, but it can load into memory making it difficult to manually remove and potentially cause damage to system files.

Posted on November 16, 2009 in Rogue Anti-Spyware Program

Link Safeness

Link Safeness screenshot

Link Safeness is a deceitful security program created by the same group of hackers that made AntiAID and Site Villain. It is critical that once Link Safeness is detected on your system that action be taken to remove it at once. Link Safeness, once installed, will display fake parasite alerts and system scan results in an attempt to make you purchase the full Link Safeness program. All computer users must know that Link Safeness is completely unable to detect or remove computer parasites. It is best to avoid purchase of Link Safeness or you may end up with a non-working and fake security application.

Posted on November 16, 2009 in Rogue Anti-Spyware Program

Control Center

Control Center screenshot

Control Center (or ControlCenter) is a malicious anti-spyware application from the rogueware family of Privacy Center and Safety Center. With the help of stealthy Trojans, Control Center is able to surreptitiously enter user's systems. Control Center attempts to trick users into believing that their computers are infected with malware that can only be removed with Control Center itself. Do not be fooled by the scan reports, warnings and pop-ups displayed by Control Center, they are all fabricated and not to be trusted. Control Center will not only swindle you out of your money, but also greatly affect the operation of your computer system. If encountered on your computer, uninstall...

Posted on November 16, 2009 in Rogue Anti-Spyware Program


SiteVillain screenshot

SiteVillain, also known as Site Villain, is a fraudulent security application from the family. SiteVillain attempts to convince victims to purchase it by tricking them into believing that numerous parasite infections were detected on their computers. SiteVillain will conduct a fake scan, display random warning and alert messages as well as display annoying pop-ups in order to scare a victim. Site Villain may enter a computer system via a sneaky Trojan that can exploit security vulnerabilities. Site Villain can deteriorate the performance of an operating system; therefore it should be removed immediately after it is detected. Other members of SiteVillain family of threatening security...

Posted on November 16, 2009 in Rogue Anti-Spyware Program


Spyware.Perfect is a Trojan program that may put a victim's confidential information at risk. Spyware.Perfect has keylogger properties, enabling it to track a victim's keystrokes and collect sensitive data such as passwords or usernames. The manual removal of Spyware.Perfect is not preferable. Rather utilize a recognized anti-spyware application to completely remove Spyware.Perfect.

Posted on November 16, 2009 in Trojans


Backdoor.Ciadoor is a dangerous backdoor Trojan that is able to secretly infiltrate a computer without a user's consent. Backdoor.Ciadoor gives remote attackers access to a vulnerable system, enabling them to modify settings, steal data and install additional malware onto the compromised PC. Users are advised to use a security tool that will delete all associated files and folders, in order to completely remove Backdoor.Ciadoor from a computer system.

Posted on November 16, 2009 in Backdoors