Advancedpcscanner6.com

Advancedpcscanner6.com is a browser hijacker promoting the rogue anti-spyware application known as Personal Antivirus. Due to trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Advancedpcscanner6.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Personal Antivirus.

Posted on September 10, 2009 in Rogue Websites

W32/Agent.CKAD

W32/Agent.CKAD is a Trojan virus affecting the Windows platform, typically infiltrating a computer via security exploits with the assistance of browser hijackers. Once active, W32/Agent.CKAD may begin downloading additional malware onto the system as well as allowing an unauthorized user to gain remote access to the system, leading to identity theft.

Posted on September 10, 2009 in Trojans

Virus.Win32.Induc.a

Virus.Win32.Induc.a (also known as Detection Virus.Win32.Induc.a) is a dangerous virus that targets systems running the Delphi development environment. Virus.Win32.Induc.a was created to retrieve the installation folder for Delphi from the registry key and then infect it by adding its own malicious code in the implementation section. Virus.Win32.Induc.a only appears to infect version 4 through 7 of Delphi.

Posted on September 10, 2009 in Viruses

Stoned Bootkit: An Open Source Rootkit Revealed

Would you be scared if a hacker was threatening your network with a new type of open source rootkit software that allows him to install any type of malware onto any Windows PC bypassing passwords and encryption? Now, there is such a thing as an open source rootkit which is called the Stoned Bootkit. Stoned is a different type of rootkit, also called a Bootkit, known to be the first open source rootkit framework. A Bootkit is similar to a rootkit only it is able to initiate and load into memory before the startup of the operating system allowing it to have full access of the infected computer. The infamous rootkit is usually connected to a hacker or a trojan horse and now it can be associated to open source software, or Bootkit, that could allow a hacker to attack virtually any Windows operating system without the roadblocks of...

Posted on September 9, 2009 in Computer Security

Adware.Adware

Adware.Adware is a piece of malicious adware promoted and distributed by browser hijackers, masquerading as an ActiveX plug-in. Once installed manually by an unknowing user, Adware.Adware will begin to display obsessive and numerous pop-up advertisements that may cause the compromised machine to become useless for brief moments at a time. Adware.Adware may also monitor Internet activity and browsing habits, reporting this information to an unauthorized user at a remote server.

Posted on September 9, 2009 in Adware

Personal Guard 2009

Personal Guard 2009 screenshot

Personal Guard 2009 (also known as PersonalGuard2009) is a rogue anti-spyware application generally promoted via browser hijackers. Once on the computer, Personal Guard 2009 runs fake system scans that displays fictitious and sometimes grossly exaggerated infection results, accompanied by obsessive pop-up windows and fraudulent security alerts, in order to intimidate the user into purchasing the licensed version of Personal Guard 2009. Personal Guard 2009 belongs to a big family of rogue security programs, the family. All members of this family are clones of Personal Guard 2009. Personal Guard 2009 clones include

Posted on September 9, 2009 in Rogue Anti-Spyware Program

W32/Scribble-A

W32/Scribble-A is a polymorphic virus created for the Windows platform, and designed to infiltrate a computer without user knowledge or consent. Once active, W32/Scribble-A establishes backdoor ports using IRC channels, allowing an unauthorized user to gain remote access to the system. This may lead to identity theft.

Posted on September 9, 2009 in Viruses

Intellectual-vir-scan01.com

Intellectual-vir-scan01.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Personal Antivirus. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Intellectual-vir-scan01.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Personal Antivirus.

Posted on September 9, 2009 in Rogue Websites

Malware.Drsmart.A

Malware.Drsmart.A is a Trojan virus that infiltrates the computer via security exploits, typically via browser hijackers and other affiliated trojans. Once active, Malware.Drsmart.A may begin downloading additional malware onto the system, such as adware, spyware and others, without user knowledge or consent. This may place the computer at serious security risk.

Posted on September 9, 2009 in Trojans

Infostealer.Phax

Infostealer.Phax is a Trojan virus that seeks to steal sensitive information from the compromised machine. Once active, Infostealer.Phax may also download and install additional malware onto the system, causing serious risk to personal system security.

Posted on September 9, 2009 in Stealers

RemoteAcess.RealVNC

RemoteAcess.RealVNC is a Trojan virus that masquerades as a legitimate application, and will continue to hide any malicious activity from the user as long as it remains active. RemoteAcess.RealVNC typically allows an unauthorized user to gain remote access to the compromised machine via backdoors created by the Trojan itself.

Posted on September 9, 2009 in Trojans

Trojan.FakeSecSen

Trojan.FakeSecSen is a Trojan virus that infiltrates a computer system via security exploits and without user awareness or consent. Once active, Trojan.FakeSecSen downloads additional malware onto the compromised machine, causing serious harm, and may even allow an unauthorized user to gain access to personal and financial information.

Posted on September 9, 2009 in Trojans

Adware.InternetSpeedMonitor

Adware.InternetSpeedMonitor is an adware toolbar specifically created to reconfigure system processes on the Windows platform, and may even generate obsessive and numerous pop-up advertisement windows. In addition to this, Adware.InternetSpeedMonitor may also monitor Internet activity and browsing habits, reporting this information to an unauthorized user at a remote server.

Posted on September 9, 2009 in Adware

Worm.Huhk.C

Worm.Huhk.C is a computer worm that attempts to replicate across all existing networks while infecting processes of explorer.exe in the DLL cache folder. Worm.Huhk.C was created to collect personal and financial information from a computer and report this data back to an unauthorized user at a remote server. Worm.Huhk.C may also employ Rootkit techniques in order to proceed without being detected by the user or any anti-spyware applications being used.

Posted on September 9, 2009 in Worms

SaveKeeper

SaveKeeper screenshot

SaveKeeper (also known as Save Keeper) is a rogue anti-spyware application originating from the family. SaveKeeper displays fictitious and sometimes grossly exaggerated infection results, along with false security scan results and fake security alerts, in order to trick users into purchasing and downloading this fake spyware remover. SaveKeeper belongs to the same family of fake spyware removers such as

Posted on September 8, 2009 in Rogue Anti-Spyware Program