Be-secured2.com

Be-secured2.com is a deceptive website that assists in the advertising of the fake security application, Alpha Antivirus. Users are redirected to Be-secured2.com once they have been infected with a Trojan that modifies browser configurations. Once a user has visited Be-secured2.com a fake scan is conducted followed by exaggerated results of virus infections. Users are then urged to install Alpha Antivirus in order to remove all the purportedly detected threats. Be-secured2.com cannot be trusted and Alpha Antivirus should be removed immediately.

Posted on November 4, 2009 in Rogue Websites

Malware-url.com

Malware-url.com is a deceitful website used by cyber-criminals to promote the rogue Alpha Antivirus. Malware-url.com fabricates a warning that you are visiting a dangerous website. The targeted user is then given the choice to "Continue unprotected" or "Get security software". Choosing the latter will direct the user to other fraudulent pages that aggressively recommend the user to purchase Alpha Antivirus. Malware-url.com and Alpha Antivirus will only damage your computer and trick you out of your money.

Posted on November 4, 2009 in Rogue Websites

Troj/Bifrose-ZD

Troj/Bifrose-ZD is a Windows platform backdoor Trojan that makes victims' systems vulnerable to further malware attacks. Troj/Bifrose-ZD may provide cyber-criminals with remote control access over infected systems, giving them accesses to victims' personal information. Troj/Bifrose-ZD may also allow attackers to download additional malware onto the infected system. Troj/Bifrose-ZD is a threat to your stored information and it is recommended to remove it after detection.

Posted on November 4, 2009 in Trojans

W32/Autorun-AUE

W32/Autorun-AUE is a Windows platform worm that could seriously affect the smooth operation of your computer. W32/Autorun-AUE may spread by copying itself to removable drives. Once W32/Autorun-AUE has entered a system it will create an autorun.inf file to ensure that it is executed when an infected drive is attached to a PC running Windows. W32/Autorun-AUE may also modify certain registry keys in order to block some Windows services from running. W32/Autorun-AUE should be removed with an effective security tool as soon as it is detected.

Posted on November 4, 2009 in Worms

Trojan-Downloader.Win32.Genome.uiq

Trojan-Downloader.Win32.Genome.uiq may attempt to download other parasites from a remote server and execute them on an infected machine. Trojan-Downloader.Win32.Genome.uiq may also be programmed to execute malicious adware, collect private data and send the data to another host. Removal of Trojan-Downloader.Win32.Genome.uiq is recommended as it is harmful to your computer.

Posted on November 4, 2009 in Trojan Downloader

Troj/Bancos-BGK

Troj/Bancos-BGK is a Trojan that may gather private information on a victim's computer and send it to a remote attacker. Troj/Bancos-BGK may steal a user's online banking passwords and any other crucial information. Troj/Bancos-BGK may enter a system via browser vulnerabilities or drive-by downloads. Remove Troj/Bancos-BGK from your PC and prevent a possible case of Identity theft.

Posted on November 4, 2009 in Trojans

Trojan-Spy.Win32.VB

Trojan-Spy.Win32.VB is a keylogger program that captures victim's sensitive data and sends it to a remote attacker. Trojan-Spy.Win32.VB collects information such as credit card numbers, passwords and usernames, putting victims at risk of identity theft. Trojan-Spy.Win32.VB may open a security hole enabling attackers to install malware programs onto an infected system. Trojan-Spy.Win32.VB can be removed from your machine with a good anti-spware application.

Posted on November 4, 2009 in Trojans

Trojan.Win32.FraudPack.zcs

Trojan.Win32.FraudPack.zcs may penetrate users' systems via security holes, malicious file-sharing utilities or unsolicited spam mail. Once Trojan.Win32.FraudPack.zcs has gained access to a system, it may install damaging files or programs, sometimes activating the display of malicious pop-ups. Trojan.Win32.FraudPack.zcs is a security threat that may severely diminish your computer's performance.

Posted on November 4, 2009 in Trojans

Packed.Win32.Krap.ag

Packed.Win32.Krap.ag is the type of Trojan that comes packed with a number of different malware infections. Packed.Win32.Krap.ag is able to secretly penetrate a system without a victim's knowledge. Packed.Win32.Krap.ag may disperse itself via corrupted e-mail attachments or untrustworthy websites. Removing Packed.Win32.Krap.ag from your machine is strongly advised.

Posted on November 4, 2009 in Trojans

Downloader

Downloader is an undesirable Trojan that allows a compromised computer to be further infected with other parasites. Downloader is able to connect to a remote server in order to download more dangerous Trojans, worms or viruses. Downloader is a harmful computer threat that may put your sensitive data at risk.

Posted on November 4, 2009 in Trojans

Cyber Crooks Face the Wrath of China

Seoul, South Korea has asked China to help track the cyber attackers who briefly crippled the United States and South Korean governments earlier this year. A national police agency says they will seek help from Chinese authorities to launch a joint investigation to bring the offenders to justice. The move comes after last week's remarks by South Korea's intelligence service chief Won Sei-Hoon, who blamed North Korea's telecommunications ministry for the attacks. Won claims that their search into the route of the attacks on South Korean and US sites found a line coming from China. Won says the line was found to be on the IP (Internet Protocol) that the North Korean Ministry of Post and Telecommunications is using on rent (from China). It was the first time the National Intelligence Service had named a specific body as the user of the IP...

Posted on November 3, 2009 in Computer Security

Gawker Tricked by Scammers to Serve Malware Ads

A new scam that uses old tricks is turning into a serious epidemic as hackers and spammers have found new avenues of spreading malware by the use of ad networks. While the new scam remains to be the use of ad networks to propagate malicious adverts that are laced with malware, an older tactic is starting to appear where hackers start posing as media agencies once again. In a recent event that took place last week, sites within the Gawker Media network such as the popular gadget blog Gizmodo, were served up fake Suzuki adverts that lead computer users to some unwanted sites that were found to install malware. What left the group of Gawker Media employees in the dark was how malicious ads appeared on their sites. Their site was not hacked into nor was it compromised by any type of computer parasite. It was something that had to do with...

Posted on November 3, 2009 in Computer Security

BlockKeeper

BlockKeeper screenshot

BlockKeeper, also known as Block Keeper, is another rogue program from the malicious family of rogue anti-spyware applications. BlockKeeper penetrates computer systems with the help of a Trojan or other malware. BlockKeeper will run a scan and display fake virus alerts once it has entered a machine. BlockKeeper is neither capable of detecting nor removing malware from a machine. A legitimate security tool may be used to completely remove BlockKeeper and its related files. The FakeSmoke family includes fake security programs like

Posted on November 3, 2009 in Rogue Anti-Spyware Program

Worm.Win32.AutoRun.gsf

Worm.Win32.AutoRun.gsf is a network-aware worm that is very harmful to a computer system. Worm.Win32.AutoRun.gsf may cause your system to operate slower and expose it to additional malware infections. Worm.Win32.AutoRun.gsf may propagate via existing networks or removal drives. It is not advisable to leave Worm.Win32.AutoRun.gsf on your system, the sooner it is removed the better.

Posted on November 3, 2009 in Worms

Suspicious.MH690

The presence of Suspicious.MH690 on your computer may indicate that specific files are a potential or unknown computer threat. Suspicious.MH690 may have keylogger characteristics and steal victims' confidential details. Suspicious.MH690 may also give remote attackers access to a compromised machine, allowing for the additional download of malware. Should you detect Suspicious.MH690 on your computer, use a legitimate security program to verify its legitimacy.

Posted on November 3, 2009 in Trojans