Koobface.C

Koobface.C (also known as W32.Koobface.C) is a computer worm designed to infect a computer once the malicious link sent via Twitter social networking has been executed. Koobface.C may then infect the registry on the system, causing Koobface.C to begin running as soon as Windows starts up.

Posted on July 20, 2009 in Worms

Packed.Generic.240

Packed.Generic.240 is a common detection utility for a trojan that represents a malicious hidden file. Packed.Generic.240 was intentionally encrypted using unknown packers in order to conceal itself from antivirus programs and to avoid detection.

Posted on July 17, 2009 in Trojans

Livefolderscannerv6.com

Livefolderscannerv6.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Personal Antivirus. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Livefolderscannerv6.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate you into purchasing the fake spyware remover Personal Antivirus.

Posted on July 17, 2009 in Rogue Websites

Zocleaner.com

Zocleaner.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as System Security 2009. Due to affiliated trojans infiltrating the computer and modifying the browser settings, web-surfing activities are redirected to the Zocleaner.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover System Security 2009.

Posted on July 17, 2009 in Rogue Websites

Tacoda.Cookie

Tacoda.Cookie (also simply referred to as Tacoda) is a tracking cookie. While not all Internet cookies are invasive, tracking cookies violate the privacy of a user by logging web-surfing activity. Tacoda then records the information and shares the data with multiple domains, or the information is sold to third party websites for marketing purposes.

Posted on July 17, 2009 in Cookies

Revsci

Revsci, also known as Revsci.net, is a tracking cookie that may allow unauthorized third party users access to browser activity. Revsci.net is installed onto the system through gambling and pornographic-related adult websites.

Posted on July 17, 2009 in Cookies

How Strong is Your Password?

We all know that a good, strong password is the best means by which one can keep their personal and financial information secure, discouraging hackers from attempting to access our computers. But what makes a strong password? If you, like me, are uncertain as to what constitutes a good, strong password, then perhaps you should try a password checker application to ensure that you are utilizing a strong password. There are free tools available such as Microsoft's Password Checker, which is an application designed to give your password a rating of "Weak," "Medium," "Strong" or "Best." "Best" being the strength level that you hope your password meets. The Microsoft password checker page doesn't record what you type so you not need to worry about Microsoft recording the information entered into the password field. Screenshot of Microsoft's...

Posted on July 16, 2009 in Computer Security

Helkern Worm

Helkern Worm (sometimes referred to simply as Helkern) is a computer worm designed to specifically infect servers running on Microsoft SQL Server 2000. By exploiting a security breach in Microsoft SQL Server known as the Buffer Overrun, the Helkern Worm is capable of sending a request to a target computer that, when processed, automatically executes the Helkern Worm code. In this manner, an unauthorized user can run malicious code without approved consent.

Posted on July 16, 2009 in Worms

Troj/Wimad-J

Troj/Wimad-J arrives on a computer system masquerading as a license-protected multimedia file, typically causing its download and installation to be manual as the user believes the file to be legitimate. Once active, however, Troj/Wimad-J proceeds to download a file from a remote web site by taking advantage of the Digital Rights Management (DRM) technology commonly available on Windows operating systems.

Posted on July 16, 2009 in Trojans

Antivirus-doktor.com

Antivirus-doktor.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Antivirus Doktor 2009. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Antivirus-doktor.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results in order to intimidate the user into purchasing the fake spyware remover Antivirus Doktor 2009.

Posted on July 16, 2009 in Rogue Websites

Downloader.Fostrem

Downloader.Fostrem is a trojan that utilizes an unpatched software vulnerability in a system in order to spread. Once active, Downloader.Fostrem may connect to a remote host and download additional malware onto the system. This can lead to computer performance degradation, a decrease in speed and further function loss.

Posted on July 16, 2009 in Trojans

W32.Pavsee.C

W32.Pavsee.C is a computer worm said to be related in the promotion and subsequent distribution of the rogue anti-spyware application known as Personal Antivirus. Once active on a computer, W32.Pavsee.C issues fake security alerts stating that the system is infected with a virus that contaminates .com and .exe files. These notifications are there to ensure that the user follows the prompts to purchase and download Personal Antivirus. It is best to avoid this avenue altogether, and so the removal of W32.Pavsee.C if extremely important.

Posted on July 16, 2009 in Worms

Bloodhound.Malautoit

Bloodhound.Malautoit is a trojan virus that spreads throughout local and network drives due to the common detection for malicious AutoIt compiled scripts. Bloodhound.Malautoit may also download additional malware onto the compromised computer, causing severe computer performance degradation and a decrease in speed.

Posted on July 16, 2009 in Trojans

Trojan.Win32.Pakes.nlx

Trojan.Win32.Pakes.nlx is a dangerous trojan virus that hijacks a computer as soon as it has infiltrated and installed itself onto the system. Once active, Trojan.Win32.Pakes.nlx opens a security-free backdoor in your system through which a large amount of adware and spyware can be filtered into the compromised machine without informed consent. In addition to this, Trojan.Win32.Pakes.nlx enables a remote unauthorized user to gain access to the computer and steal valuable personal and financial data information, leading to identity theft.

Posted on July 16, 2009 in Trojans

Bestscanpc.info

Bestscanpc.info is a browser hijacker promoting the distribution of the rogue anti-spyware application known as System Security 2009. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Bestscanpc.info domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover System Security 2009.

Posted on July 16, 2009 in Rogue Websites