Packed.Generic.232 is a Trojan horse that may be a security threat to a compromised system or its existing network. Packed.Generic.232 may display bot characteristics and allow attackers remote access to a compromised system. Packed.Generic.232 may also put your sensitive information, such as usernames or passwords, at risk. Remove Packed.Generic.232 from your PC before it causes severe damage.

Posted on November 3, 2009 in Trojans


W32.Sality.AM is a Windows platform malware parasite that may spread via removable drives or network shares. W32.Sality.AM may infect or modify certain files on a compromised PC, specifically exe. and src. files. Additionally, W32/Sality-AM may download malicious files from a remote location onto a victim's machine without notification. W32.Sality.AM can seriously damage a computer system and should be removed immediately.

Posted on November 3, 2009 in Malware


Backdoor.Win32.VB.gpx is a dangerous backdoor Trojan that exposes a victim's PC to remote attackers. Backdoor.Win32.VB.gpx is known to spread via infected e-mails or malicious browser downloads. Backdoor.Win32.VB.gpx may gather a victim's confidential information and send it to a remote attacker, often leading to Identity theft. It is preferable to remove Backdoor.Win32.VB.gpx with a reliable security tool.

Posted on November 3, 2009 in Backdoors


Troj/VB-EJW is a Trojan that tends to display itself as a legitimate program. Troj/VB-EJW may enter a user's PC via malicious websites or contaminated e-mail attachments. Troj/VB-EJW may enable an attacker to download additional parasites onto a compromised PC as well as steal a victim's sensitive data stored on the hard drive. Troj/VB-EJW should be detected and removed with a reputable spyware removal tool.

Posted on November 3, 2009 in Trojans is designed to run in the background of a compromised PC without a user's knowledge or consent. is a Windows platform Trojan that may spread via malicious adware or drive-by-downloads. may install and execute other malware on a victim's machine, putting the infected computer and any stored information at great risk. should be removed from a system when detected.

Posted on November 3, 2009 in Trojans


Trojan-GameThief.Win32.OnLineGames.vjpn is a dangerous Trojan created to steal account details for the online game, LineAge2. Trojan-GameThief.Win32.OnLineGames.vjpn is able to enter user's computers without their knowledge. Trojan-GameThief.Win32.OnLineGames.vjpn monitors user's gaming activities and gathers information such as online login passwords and usernames. Trojan-GameThief.Win32.OnLineGames.vjpn may be safely removed with a computer security application.

Posted on November 3, 2009 in Trojans


Infostealer.Banker.C is a Trojan horse with the ability to steal confidential data from a targeted computer. Infostealer.Banker.C may spread via infected e-mails purportedly from ABN-AMRO bank. Infostealer.Banker.C may gather banking details and send them to a remote attacker. The manual removal of Infostealer.Banker.C is not advised due to it stealth tactics and risk of damage to essential system files.

Posted on November 3, 2009 in Stealers


Hacktool is a dangerous rootkit that can manipulate a set of programs and scripts in order to give a remote attacker access to a system. Once Hacktool has secretly infiltrated a vulnerable system it gives an attacker administrative access to the compromised computer. Hacktool may also utilize legitimate programs to assist in the execution of malicious tasks. Hacktool must be removed with a reliable security application as soon as it is detected to prevent further damage.

Posted on November 3, 2009 in Trojans

FDIC Warns Banks of an Increase in "Money Mule" Scams

As if we didn't have enough to worry about in our suffering economy we get news from the Federal Deposit Insurance Corporation (FDIC) now warning financial institutions about an increase in the number of banking criminal activity from "money mules" used to transfer funds from hacked online banking accounts. "Money mules" has become a term for people who were hired through those infamous work-at-home scams who find themselves assisting in cybercriminal money laundering activities that usually takes place overseas. Little do some of the work-at-home "employees" know that they are duped into assisting in criminal activity or basically, money laundering. The FDIC has identified that these incidents involve cases where banking customers make several deposits, totaling less than $10,000 so a red flag is not raised, and then withdraw all of...

Posted on November 2, 2009 in Computer Security


BlockScanner screenshot

BlockScanner is a rogue security application and one more member of the infamous family. BlockScanner is the latest rogue within this group which poses as a legitimate security program. BlockWatcher acts as spyware removal software or a registry repair utility but in fact floods the desktop of an infected system with false system errors and critical spyware infections warnings. Most of BlockScanner's spyware tools uses Trojan Zlob or Vundo Trojan horses to persuade computer users to download a free trial program. BlockScanner uses a fake scanner to generate exaggerated spyware results which are false positives. BlockScanner should not be given the leeway to mislead the computer user and...

Posted on November 2, 2009 in Rogue Anti-Spyware Program


Backdoor.Win32.SubSeven.19 is a Backdoor Trojan which provides the hacker with remote-administration of victim machines. Backdoor.Win32.SubSeven.19 can be instructed to send, receive, execute and delete files while harvesting confidential data from the computer, loging activity on the computer and many more malicious operations. The platform this malware used to operate from is a Windows PE EXE file. Backdoor.Win32.SubSeven.19 affects Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista and Windows XP. Backdoor.Win32.SubSeven.19 is a definite threat to the security of any PC and if detected should be immediately removed.

Posted on November 2, 2009 in Trojans


Backdoor.Win32.Agent.agbb is a software program that gives an attacker unauthorized access to a computer before remotely controlling the machine without the user's knowledge. Backdoor.Win32.Agent.agbb compromises the system's integrity by making changes to the system that allow the hacker to maliciously obtain information and release other malware parasites onto the computer or network. Backdoor.Win32.Agent.agbb should be removed from the system immediately to prevent damage to essential system files.

Posted on November 2, 2009 in Trojans


Worm.Win32.AutoRun.arcx is a network-aware worm that infects a system and then attempts to replicate across the entire existing network. Worm.Win32.AutoRun.arcx has been found to produce outbound traffic and also illegally download unknown files from the Internet. Worm.Win32.AutoRun.arcx also creates a startup registry entry and contains all the characteristics of a severe security risk. Worm.Win32.AutoRun.arcx should be exterminated from the infected system immediately to limit further damage.

Posted on November 2, 2009 in Worms


Mal/KeyGen-A is a dangerous virus that targets systems running the Delphi development environment. Mal/KeyGen-A was created to retrieve the installation folder for Delphi from the registry key and then infects it by adding its own malicious code in the implementation section. Mal/KeyGen-A should be removed from any computer system immediately to prevent system damage.

Posted on November 2, 2009 in Viruses


Trojan-Spy.Win32.Agent.bawr is a keylogger program that can capture all user keystrokes including confidential details such username, password and credit card number. Trojan-Spy.Win32.Agent.bawr makes an ominous entry and often tries try to steal your usernames and passwords to send them to an attacker. Once infected, your computer may be rendered defenseless as Trojan-Spy.Win32.Agent.bawr may bypass any installed security programs.

Posted on November 2, 2009 in Keyloggers