Email-Worm.Win32.Joleee.efc is a dangerous worm that targets Windows operating systems. Email-Worm.Win32.Joleee.efc replicates itself across different existing networks. Email-Worm.Win32.Joleee.efc may add a link to its executable file in the registry in order to ensure that it is automatically launched when Windows is started up. Email-Worm.Win32.Joleee.efc may also disable the system firewall making it vulnerable to further attacks.

Posted on November 6, 2009 in Worms


Trojan.FakeAV is from a family of Trojans that assist in the spread of fake anti-spyware and anti-virus applications. Trojan.FakeAV may download malicious files onto a compromised PC and display frequent pop-ups and fake virus alerts. Trojan.FakeAV may also be associated with botnet activities. You can remove Trojan.FakeAV and its related rogueware with a trustworthy computer security program.

Posted on November 6, 2009 in Trojans


Srgo.exe is a harmful executable file that may modify a computer's settings to conduct malicious tasks. Srgo.exe is a Trojan horse that is often bundled with other malware such as herss.exe. Srgo.exe may spread via infected spam mail or malicious web pages and may be located in the C: drive. Srgo.exe must be removed from your PC as soon as possible to reduce the risk of damage.

Posted on November 6, 2009 in Trojans


W32/Koobface-Q is a troublesome worm that may slow down the operation of an infected PC. W32/Koobface-Q generally distributes itself through social networking websites such as Facebook or Myspace. W32/Koobface-Q may utilize the private message feature of a social networking site to send e-mails to users on a victims contact list. Remove W32/Koobface-Q as soon as it is detected.

Posted on November 6, 2009 in Worms

MaCatte Antivirus 2009

MaCatte Antivirus 2009 screenshot

MaCatte Antivirus 2009 is a bogus anti-spyware application that mimics the McAfee security program. MaCatte Antivirus 2009 is not able to detect or remove computer parasites. If you have MaCatte Antivirus 2009 installed on your system, then you may notice the many parasites that it supposedly finds during system scans. Each of these parasites are nonexistent. MaCatte Antivirus 2009 is not a trusted security program. MaCatte Antivirus 2009 is designed to load at startup where it will display multiple misleading threat alerts and asks you to update the application which can redirect you to a site to purchase a full version of MaCatte Antivirus 2009. In addition, MaCatte Antivirus 2009 has...

Posted on November 5, 2009 in Rogue Anti-Spyware Program

Windows 7 Still Vulnerable to 8 out of 10 Viruses Despite Improved UAC

An experiment conducted by the security company Sophos revealed that the User Account Control (UAC) feature built into Windows 7 is not enough to provide ample protection by itself and the aid of an anti-virus program is still needed. In the recent experiment it basically shows how Windows 7 is still vulnerable to various types of viruses. Particularly, out-of-the-box Windows 7 PCs are still vulnerable to eight out of ten viruses. In the Sophos experiment, Windows 7 with UAC (User Account Control), a much improved Windows security feature over then one that Microsoft first introduced with Vista, in default configuration and no anti-virus package installed was tested against ten badware samples resulting in only 2 infections failing to work on Windows 7. In the test, each malware was run as if a user had been tricked to launch a file...

Posted on November 5, 2009 in Computer Security


BlockProtector screenshot

BlockProtector is a fake security application from the family of roguewares. BlockProtector is installed onto users' computers with the help of sneaky Trojans that modify the settings to ensure that BlockProtector will automatically run when Windows is started up. Once BlockProtector has accessed a system, it will conduct a fake scan that will report that the system is infected with multiple parasites. Targeted users will then be advised to purchase BlockProtector in order to remove all the detected parasites. All spyware alerts or notifications displayed by BlockProtector are false. It is best that you remove BlockProtector from your PC at your earliest convenience. BlockProtector's...

Posted on November 5, 2009 in Rogue Anti-Spyware Program


Trojan.Win32.Larchik.v is a dangerous Trojan horse that may be involved in botnet activities. Trojan.Win32.Larchik.v may be distributed via contaminated websites or unsolicited spam e-mails. Trojan.Win32.Larchik.v may download malicious files onto a compromised PC. Trojan.Win32.Larchik.v may also affect the operation of a system and should be removed immediately to limit further damages.

Posted on November 5, 2009 in Trojans


W32.Looked.P is a Windows platform worm that is harmful to a computer system. W32.Looked.P may spread via remote network shares, specifically those with weak passwords. W32.Looked.P targets .exe files and installs other malicious files onto an infected PC. W32.Looked.P may also modify a computer's security settings. W32.Looked.P may be removed with a reliable anti-spyware application.

Posted on November 5, 2009 in Worms


VirTool:Win32/Injector.gen!AG is a Trojan that may greatly affect and compromise the security of a computer system. VirTool:Win32/Injector.gen!AG may access a system via infected e-mail attachments or malicious websites. VirTool:Win32/Injector.gen!AG may also give remote attackers access to an infected machine therefore it should be removed immediately.

Posted on November 5, 2009 in Trojans


Backdoor.Win32.Small.vy is a malignant backdoor Trojan that can run in the background of a system without a user's awareness. Backdoor.Win32.Small.vy makes it possible for remote attackers to access and control a victim's computer system. Backdoor.Win32.Small.vy may download other malicious programs onto the infected system, further compromising the security of the computer system.

Posted on November 5, 2009 in Backdoors


TrojanClicker:Win32/Yabector.A is a Trojan that may install contaminated files from the internet onto a compromised computer. TrojanClicker:Win32/Yabector.A may spread via drive-by downloads and does not require a user's permission to run on a computer. TrojanClicker:Win32/Yabector.A may come bundled with a malicious installation program. It is advisable to remove TrojanClicker:Win32/Yabector.A as soon as it is detected.

Posted on November 5, 2009 in Trojans


Trojan.Win32.Cosmu.xz may compromise the security of computer systems, therefore it is advisable to remove it when detected. Trojan.Win32.Cosmu.xz is able to enter a user's system without the user's awareness. Trojan.Win32.Cosmu.xz may spread via unsolicited e-mails and may also be involved in malicious botnet activities.

Posted on November 5, 2009 in Trojans

The Number of Worm Parasites Doubled In First 6 Months of 2009

On Monday, Microsoft released the latest Security Intelligence Report. The software giant has released details revealing that a number of computer worms in enterprise environments have doubled during the first six months of 2009. On the contrary, this particular tendency hasn't been noticed in home environments as of yet. Microsoft has counted the number of threats detected by its anti-malware desktop products and found out Conficker and Taterf worms as the top threats. A revival of worms has become a serious problem to computer users. A computer worm is malicious software that is able to steal information or stored data on an infected systems hard drive. Worms are created to copy themselves where they can quickly crawl from PC to PC by hiding in legitimate software programs and USB drives or other portable data storage devices. Such...

Posted on November 4, 2009 in Computer Security

FBI Warns Small Businesses of $100 Million Cyber-Threat

The FBI has warned small and medium sized business that they are a prime target for cyber-thieves hacking into their network systems and stealing millions of dollars out of their U.S. bank accounts weeks at a time. The National Cyber Forensics and Training Alliance (NCFTA) who works closely with the FBI, has identified this new cyber threat to be one of their top problems to be addressed. The FBI has said that there has been a "significant increase" in ACH fraudulent activity in the past several months while the Rob Plesco, NCFTA's Executive Director, says "Every year there seems to be a trend and this has been the trend this year." Cybercrooks have found ways to move money overnight from a victim's account, ranging from thousands to millions of dollars, and add new payees to the organization's bank account. The whole process is...

Posted on November 4, 2009 in Computer Security