HEUR.Crypted

HEUR.Crypted is a detection method for malicious files intentionally encrypted in order to avoid detection from antivirus programs and software security, and remain concealed on system processes. HEUR.Crypted is packed using illegitimate software.

Posted on August 26, 2009 in Malware

Intelinet Smart Security

ESG security researchers have issued a warning concerning Intelinet Smart Security 3.1.0. This supposed anti-malware application is really a rogue security program. As of the writing of this article, websites promoting Intelinet Smart Security 3.1.0 still appear near the top of Google searches, and Intelinet Smart Security 3.1.0 still shows up on file-downloading websites. While there is no doubt that this will change in time, Intelinet Smart Security 3.1.0 will have infected numerous computer systems while PC security researchers determined its true nature. In fact, Intelinet Smart Security 3.1.0 has various clones, which have passed through the same process. This is one of the reasons why criminals tend to create numerous clones of their malware-laced programs, in order to infect as many computer systems as possible before the...

Posted on August 26, 2009 in Rogue Anti-Spyware Program

Dream Media Player

Dream Media Player is a fraudulent video codec usually downloaded and installed manually onto a computer via an adult-related pornographic website. Once active, Dream Media Player will cause your system to be infected with the adware Zango.

Posted on August 26, 2009 in Misleading Programs

TrustNinja

TrustNinja (also known as Trust Ninja) is a fake optimization tool presented as a useful program in order to gain the trust of the user. TrustNinja that is a member of the family, must be installed manually, and once active, begins display fake infection results in order to trick the user into believing that the computer has been compromised. The user is then prompted to purchase the commercial version of TrustNinja in order to combat these threats or fix the various problems. The family of TrustNinja has various members, all of them clones of TrustNinja. These members include

Posted on August 26, 2009 in Rogue Anti-Spyware Program

JS/Downloader-BNL

JS/Downloader-BNL is a Trojan virus that infiltrates a computer via security exploits and typically attempts to connect to a specified server in order to download and install additional malware and configuration files onto the compromised system. JS/Downloader-BNL may also create its own registry entry so that it will begin running every time Windows starts up.

Posted on August 26, 2009 in Trojans

Osadwarekill.microsoft.com

Osadwarekill.microsoft.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Antivirus System PRO. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Osadwarekill.microsoft.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing and downloading the fake spyware remover Antivirus System PRO.

Posted on August 26, 2009 in Rogue Websites

Osadwarekill.com

Osadwarekill.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Antivirus System PRO. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Osadwarekill.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing and downloading the fake spyware remover Antivirus System PRO.

Posted on August 26, 2009 in Rogue Websites

W32.Feberr

W32.Feberr is a computer worm that propagates by infecting removable storage devices and file-sharing networks, infecting other computers when the storage device is connected to them. W32.Feberr may also create a registry entry so that the worm begins running every time Windows starts up.

Posted on August 26, 2009 in Worms

Trojan.Delflob.I

Trojan.Delflob.I is a Trojan virus that infiltrates a computer system via exploits located in security software. Once active, Trojan.Delflob.I may begin downloading additional forms of malware onto the compromised machine. Trojan.Delflob.I may also record keystrokes, gathering personal and financial information and transmitting this to a remote unauthorized user. This may lead to identity theft.

Posted on August 25, 2009 in Trojans

Adware.Hotbar

Adware.Hotbar (also known as W32.Adware.Hotbar) is a simple form of adware, that uses graphical skins added onto Internet Explorer, Microsoft Outlook and Outlook Express toolbars to get the user to trust it. Adware.Hotbar targets specific advertising to specific users depending on search terms typed into the fake toolbar. Adware.Hotbar appears to be a legitimate toolbar for web browser applications. Several of the Hotbar buttons redirect users to pages that advertise products or services. Many times these pages are designed to obtain personal data from the user in addition to enticing clicks onto contextual adverts. Adware.Hotbar is known to bombard computer users with annoying messages basically interrupting internet surfing. Adware.Hotbar may also gather personal information from the websites that a computer user visits. If left on a...

Posted on August 25, 2009 in Adware

Bestscanpc.biz

Bestscanpc.biz is a browser hijacker promoting the distribution of the rogue anti-spyware application known as System Security 2009. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Bestscanpc.biz domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing and downloading the fake spyware remover System Security 2009.

Posted on August 25, 2009 in Rogue Websites

W32.SillyFDC.BCT

W32.SillyFDC.BCT is a computer worm that propagates by infecting removable storage devices and file-sharing networks, infecting other computers when the storage device is connected to them. W32.SillyFDC.BCT may also create a registry entry so that the worm begins running every time Windows starts up.

Posted on August 25, 2009 in Worms

Credit Card Fraud: Are We Fighting a Losing Battle?

Just how safe are we when using our credit card, whether it be online or in the fast-paced working world? Many of the new security measures put in place to keep us protected, such as PIN or chip numbers, may no longer be enough, as the British government has effectively decriminalized routine credit card fraud in the United Kingdom and the United States seeks to convict a former US secret service individual for the theft of 40 million credit identities. In the US, the Secret Service handles crimes related to the U.S. money supply, including credit cards, with a limit of $150,000 before triggering an investigation. Criminals are able to stay below the radar by limiting transactions below $150,000. The FTC, or Federal Trade Commission, handles credit card fraud reports outside of local authorities. In the UK, a Fraud Act was introduced...

Posted on August 25, 2009 in Computer Security

Antivirus-scannerv12.com

Antivirus-scannerv12.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Personal Antivirus. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Antivirus-scannerv12.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing and downloading the fake spyware remover Personal Antivirus.

Posted on August 25, 2009 in Rogue Websites

Packed.Generic.248

Packed.Generic.248 is a detection method for malicious files intentionally encrypted in order to avoid detection from antivirus programs and software security, and remain concealed on system processes. Packed.Generic.248 is packed using illegitimate software.

Posted on August 25, 2009 in Malware