VirTool:Win32/Vbcrypt.AD

VirTool:Win32/Vbcrypt.AD is a Trojan program that can install additional malware onto a PC, as well as destroy or modify certain registry files. VirTool:Win32/Vbcrypt.AD may spread through malicious drive-by downloads or web pages. VirTool:Win32/Vbcrypt.AD is a computer threat that should be removed with a reliable security program.

Posted on November 12, 2009 in Trojans

W32.Daprosy

W32.Daprosy is a pesky worm that may severely affect the normal operation of your computer system. W32.Daprosy may enter unsuspecting users' computers via infected e-mail attachments. Once the malicious attachment is executed, W32.Daprosy will proceed to infect mapped, fixed, as well as removable drives. W32.Daprosy may also send infected e-mails to users listed on a victim's e-mail contact list. It's recommended to remove W32.Daprosy with a reputable security application.

Posted on November 12, 2009 in Worms

Mal/Dropper-AE

Mal/Dropper-AE is a malignant Trojan horse program that is mainly found on Windows platform systems. Mal/Dropper-AE may put your computer in more danger by involving it in botnet activities. Mal/Dropper-AE may also allow for additional malware to be installed onto a victim's computer. Attempting to manually remove Mal/Dropper-AE is not advisable; rather use an effective anti-spyware tool.

Posted on November 12, 2009 in Trojans

Backdoor.Win32.Popwin

The dangerous Backdoor.Win32.Popwin, is a Trojan designed to exploit vulnerabilities on Windows platform systems. Backdoor.Win32.Popwin may put your private information at risk by providing remote attackers with backdoor access to your system. Once Backdoor.Win32.Popwin has accessed a system, it may attach itself to Windows System32 files in order to open at every Windows start-up. Backdoor.Win32.Popwin may decrease the security of your system for future attacks; therefore it should be removed immediately.

Posted on November 12, 2009 in Backdoors

SystemVeteran

SystemVeteran screenshot

SystemVeteran or System Veteran is a fake security application. SystemVeteran uses misleading popup alerts in addition to fabricated system scan results to scare computer users into purchasing the full SystemVeteran application. SystemVeteran is not viable security program which means it is completely unable to detect or remove parasites including spyware, viruses or malware. It is suggested that once SystemVeteran is detect that it be removed at once before it is able to cause system damage. SystemVeteran belongs to the familya and has, among its many clones,

Posted on November 12, 2009 in Rogue Anti-Spyware Program

Mal/EncPk-DW

The Mal/EncPk-DW Trojan is able to surreptitiously infiltrate a system and run in the background without a user's knowledge. Mal/EncPk-DW may give remote attackers access to victims' systems, enabling them to install more malicious malware onto the already infected system. Mal/EncPk-DW is a threat to your computer and the confidential information stored on it.

Posted on November 12, 2009 in Trojans

SystemWarrior

SystemWarrior screenshot

System Warrior is a fake security application. System Warrior comes from the group of attackers that created the various members of the family, to which SystemWarrior belongs. Other rogue anti-spyware programs that are part of SystemWarrior's family include System Warrior uses various methods to make unsuspecting computer users believe that they need to purchase the full System Warrior program to remove a threat. These threats are usually brought to a user's attention through fake popup warning messages and bogus system scan results. System Warrior is not able to effectively detect or remove computer parasites.

Posted on November 11, 2009 in Rogue Anti-Spyware Program

Email-Worm.Win32.Iksmas.frg

Email-Worm.Win32.Iksmas.frg is a computer worm infection that can use a network attached to the infected system to replicate itself. Email-Worm.Win32.Iksmas.frg can spread malicious emails onto a computer user’s contact list causing it to further spread. Email-Worm.Win32.Iksmas.frg can lead to compromising personal information so it is best to remove it before damage is caused.

Posted on November 11, 2009 in Worms

HeurEngine.Malautoit

HeurEngine.Malautoit is a malware parasite that can be used to download other malicious files or programs onto an infected machine. Once a computer is infected with HeurEngine.Malautoit, then it is vulnerable to other parasites that can infect the computer without knowledge to the computer user. HeurEngine.Malautoit should be detected and safely removed with a spyware removal tool to reduce the risk of further damage.

Posted on November 11, 2009 in Malware

Win-Trojan/Xema.variant

Win-Trojan/Xema.variant is a backdoor Trojan parasite that can be installed and run undetected. Win-Trojan/Xema.variant has the ability to download other malware onto the infected computer and then record internet activity while logging keystrokes. Win-Trojan/Xema.variant can seriously compromise personal user data as well as lead to further destruction if not removed.

Posted on November 11, 2009 in Trojans

Spyware.Keylogger

Spyware.Keylogger is a dangerous keylogger program that can record keystrokes and then use them to port to a remote attacker. Spyware.Keylogger can seriously compromise personal user data including banking login credentials. Spyware.Keylogger can also use rootkit methods to go undetected from security applications. Detection and removal of Spyware.Keylogger should be performed with a spyware removal tool to ensure that the system is not damaged.

Posted on November 11, 2009 in Spyware

Trojan-PSW.Lemir

Trojan-PSW.Lemir is a keylogger parasite known to record user activity and keystrokes. Trojan-PSW.Lemir could give up personal information to a remote hacker leading to identity theft. Trojan-PSW.Lemir can be used as a surveillance application monitoring online activity. Trojan-PSW.Lemir used as a malicious tool can seriously compromise a user's personal information.

Posted on November 11, 2009 in Keyloggers

Trojan.Crypt

Trojan.Crypt is a computer Trojan horse that can drop other malware infections onto the infected system without a user’s knowledge or permission. Trojan.Crypt has the ability to compromise personal data by stealing passwords and login credentials to online accounts. Hackers can obtain personal information through Trojan.Crypt by a remote connection. It is very important to detect and safely remove Trojan.Crypt with a spyware detection tool.

Posted on November 11, 2009 in Trojans

Mal/Behav-116

Mal/Behav-116 is a dangerous computer Trojan horse that can be ported into a system through a security hole or backdoor. Mal/Behav-116 can be installed to open up the infected system to outside attackers where remote access to the computer can be obtained. Mal/Behav-116 can also disable security applications on the infected computer leaving it vulnerable to other attacks.

Posted on November 11, 2009 in Trojans

Internet Virus Frames Innocent PC Users for Child Pornography

In an unforeseen situation an internet virus was found to frame a computer user as a collector of child pornography. Out of all of the menacing things that a computer Virus could do, this ranks at the top. Ever heard of the excuses that school aged kids make when they didn't finish their homework? You usually get, "my dog ate it" or "I lost it". What if someone was wrongly accused of having child pornography on their computer? Surely that case is just as easy to solve as the kid that didn't do his homework right? Well, not exactly. Their are cases that computer users have had a type of virus on their system that purportedly frames them as a pedophile or collector of illegal images of nude children. We found where a recent investigation by Associated Press discovered cases of innocent people that because of a virus infection were being...

Posted on November 10, 2009 in Computer Security