Troj/ReopnPPT-A

Troj/ReopnPPT-A is a Trojan virus for the Windows operating system. Troj/ReopnPPT-A is mainly utilized by malicious PowerPoint documents in order to terminate the exploited PowerPoint process and re-launch the process, opening a non-malicious document.

Posted on September 4, 2009 in Trojans

Troj/FFSpy-A

Troj/FFSpy-A is a Trojan virus masquerading as a Firefox add-on that, once actively running on the system, monitors and records browsing habits, reporting this information to an unauthorized user at a remote server. Troj/FFSpy-A may also act as though it is an Adobe Flash update, and when executed, begins running installations for various java script components onto Firefox.

Posted on September 4, 2009 in Trojans

W32/PinkRen-A

W32/PinkRen-A is an XSS computer worm designed to target the Chinese social media website renren.com. W32/PinkRen-A typically posts offers to view the music video for the Pink Floyd song, "Wish You Were Here", on renren.com as a way to spread W32/PinkRen-A.

Posted on September 4, 2009 in Worms

Win32/Taterf

Win32/Taterf is a computer worm designed to steal personal information data such as user names and passwords, and typically targets the users of online games. Win32/Taterf may also seek to disable anti-virus and anti-spyware applications in order to remain undetected. Win32/Taterf is also known as Trojan.Lineage.Gen!Pac.3, PWS-Gamania.gen.a, and Mal/EncPk-CE.

Posted on September 3, 2009 in Worms

Trojan.Win32.FakeRean

Trojan.Win32.FakeRean is a Trojan virus that infiltrates a computer via security exploits and is capable of going undetected by most anti-virus and anti-spyware applications. Once active, Trojan.Win32.FakeRean downloads additional malware onto the compromised machine, as well as allowing an unauthorized user remote access to the system. This may lead to the loss of personal and financial information.

Posted on September 3, 2009 in Trojans

Trojan-PWS.Win32.Frethog

Trojan-PWS.Win32.Frethog is a Trojan virus and password stealer that infiltrates a computer via security exploits. Once active, Trojan-PWS.Win32.Frethog begins stealing personal information data, which includes user names, passwords and financial credentials. This information is then transmitted to an unauthorized user at a remote server.

Posted on September 3, 2009 in Trojans

Email-Worm.JS.Gigger

Email-Worm.JS.Gigger is a fraudulent infection used for the purpose of malware distribution. PC Antispyware 2010, a rogue anti-spyware application, will state that a computer has been infected with Email-Worm.JS.Gigger and that the only solution is to purchase and install the fake spyware remover in order to combat the fictitious worm.

Posted on September 3, 2009 in Fake Error Messages

Proof Defender 2009

Proof Defender 2009 screenshot

Proof Defender 2009 is a rogue anti-spyware program designed to extort money from gullible computer users through deceiving methods. Proof Defender 2009 is part of the family, and comes in the form of an application that appears to be a program that detects and removes computer threats. When installed, Proof Defender 2009 will scan your computer only to return several exaggerated threat results. This is used as a scare tactic persuading you to purchase a full version of the Proof Defender 2009 program in order to remove the threats. Proof Defender 2009 in registered form is unable to remove any type of computer parasite or fix security related issues. There are various clones of Proof...

Posted on September 2, 2009 in Rogue Anti-Spyware Program

SystemCop

SystemCop screenshot

SystemCop is a fake spyware remover originating from the family. Due to affiliated trojans infiltrating the computer via security exploits, SystemCop is installed onto the system and from there, begins launching various fake security alerts. Along with the fictitious and sometimes grossly exaggerated infection reports supplied by the counterfeit system scans, these tactics ensure the user is intimidated enough into purchasing the fake spyware remover SystemCop in order to combat these non-existent threats Other members of SystemCop's family include

Posted on September 2, 2009 in Rogue Anti-Spyware Program

Nortel Antivirus

Nortel Antivirus screenshot

Nortel Antivirus is a rogue anti-spyware application that belongs to a family of fake security programs called . Nortel Antivirus utilizes fraudulent scare tactics in order to intimidate users into purchasing the malicious software. Nortel Antivirus displays fictitious and sometimes grossly exaggerated infection results, along with false security scan results and fake security alerts, in order to trick users into purchasing and downloading this fake spyware remover. omputer users that believe on the Nortel Antivirus fake promises and buy its useless program will, automatically, put their financial information at risk because they will need to provide it in orcder to purchase Nortel...

Posted on September 2, 2009 in Rogue Anti-Spyware Program

Trojan.Ffsearch

Trojan.Ffsearch is a Trojan virus that infiltrates a computer system via security exploits and begins reconfiguring Internet search results in order to redirect the user to browser hijackers and rogue websites. This may lead to additional malware being downloaded onto the already compromised machine.

Posted on September 2, 2009 in Trojans

Virusermoverpro.com

Virusermoverpro.com is a browser hijacker promoting the rogue anti-spyware application known as Antivirus System PRO. Due to trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Virusermoverpro.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Antivirus System PRO.

Posted on September 2, 2009 in Rogue Websites

W32.Stealsmth

W32.Stealsmth is a virus that infects various system files on the compromised computer. W32.Stealsmth may also steal valuable personal and financial data and transmit this information to a remote unauthorized user.

Posted on September 2, 2009 in Viruses

Fake.Vir.A

Fake.Vir.A is a Trojan virus that generally infiltrates a computer via security exploits, and without user knowledge or consent. Once active, Fake.Vir.A may download additional malware onto the compromised machine, as well as allow an unauthorized user remote access to the computer system, leading to identity theft.

Posted on September 2, 2009 in Trojans

Smart Antivirus 2010

Smart Antivirus 2010 is a rogue anti-spyware program and the latest version of Smart Antivirus. Smart Antivirus 2010 can be installed without user permission through a Trojan horse infection or fake advertisements found on malicious websites. Smart Antivirus 2010 uses various malicious tactics to scare computer users into purchasing the full Smart Antivirus 2010 application. Not only can you not remove from startup, once Smart Antivirus 2010 is installed, it runs system scans displaying fictitious or exaggerated results. Fake security alerts and aggressive pop-up notifications are also displayed in order to persuade users into purchasing Smart Antivirus 2010.

Posted on September 2, 2009 in Rogue Anti-Spyware Program