is a malignant website used to help spread the fake anti-spyware application, Smart Protector. can be distributed via Trojans that are designed to penetrate systems without the knowledge or consent of the user. These Trojans are able to modify the hosts file to redirect browser searchers to

Posted on October 15, 2009 in Rogue Websites


FakeASC also known as Win32/FakeASC is a harmful Trojan. Should FakeASC infiltrate your system, it may launch bogus virus alerts in an attempt to persuade users to purchase rogue security software. FakeASC may also open a backdoor to your computer, giving attackers full access to your computer and the information stored on it. Remove FakeASC from your computer as soon as you detect it.

Posted on October 15, 2009 in Trojans


Exploit.IMG.WMF.oy is an exploit code that thrives on computer vulnerabilities. Exploit.IMG.WMF.oy generally targets browser, operating system or software vulnerabilities. Exploit.IMG.WMF.oy may secretly install dangerous malware onto a computer, giving an attacker unauthorized access to a victim's computer. Should you have Exploit.IMG.WMF.oy on your computer, consult a reliable anti-spyware program to remove this exploit.

Posted on October 15, 2009 in Malware


W32/Koobface.AWO is a computer worm that is able to infect a system without knowledge to the computer user. Once a system is infected with W32/Koobface.AWO, it can spread onto system files potentially causing damage to essential files needed for basic operation of Windows. W32/Koobface.AWO is related to the Koobface parasite and also known as W32.Koobface.A, Net-Worm.Win32.Koobface.awo and Worm.Koobface.ANF over the internet.

Posted on October 15, 2009 in Worms


Trojan.FakeVRL is a critical computer threat known to assist in the spread of malicious programs. Trojan.FakeVRL may infiltrate your system via program vulnerabilities or contaminated e-mails. Trojan.FakeVRL will display a number of pop-ups and bogus virus alerts once it has penetrated your system. These displays are part of a ploy to scare users into purchasing rogue anti-spyware that will further infect their computers. Users are advised to never purchase or install anything associated Trojan.FakeVRL.

Posted on October 15, 2009 in Trojans


RemoteAdmin.RemotelyAnywhere.a is a Remote Control Helper belonging to RemotelyAnywhere. Attackers may utilize the name RemoteAdmin.RemotelyAnywhere.a to disguise malware. The malicious version of RemoteAdmin.RemotelyAnywhere.a may modify the registry and install additional malware onto a compromised PC. A reliable anti-spyware program will help you identify if RemoteAdmin.RemotelyAnywhere.a is a dangerous threat to your computer.

Posted on October 15, 2009 in Remote Administration Tools

Multi-Million Dollar Click-Fraud Ring "DormRing1" Exposed

In the recent economic downturn we have witnessed an increase in cybercriminal activity and, on the flip-side, an up-rise in investigative forces to flush out these crooks. To support that very theory, a large group called DormRing1, the largest click-fraud ring discovered so far, was recently crippled when Anchor Intelligence, which keeps track of online traffic quality and suspicious click activity, shut down the revenue outlets to tens of thousands of false publishers. Click-fraud is an occurrence of an automated script or person imitating a computer user by clicking on an ad for the purpose of generating multiple clicks ultimately producing money for the clicks. Click-fraud has been a means for cybercrooks to get a quick pay-day by sending fake clicks generated by infected IP addresses. To always be ahead of the game, cybercrooks...

Posted on October 14, 2009 in Computer Security


FakeRean is a Trojan that is usually included and spread as an email attachment similar to ZBot. Spam messages are successful with spreading FakeRean by including an executable called "install.exe" within a zip archive. If a computer user downloads the ZIP file and runs the "install.exe" file, then they their system will be infected with the FakeRean Trojan horse. FakeRean can cause damage to a computer’s system files and prove difficult to manually detect and remove in some cases. FakeRean is also known as W32/FakeAV.AE!genr, W32/FakeRean.A.gen!Eldorado or TrojanDownloader:Win32/FakeRean.

Posted on October 14, 2009 in Trojans

Twitter Phishing Scams Spread Through Direct Messages

"I'll Be Back", the famous words of Arnold Schwarzenegger in "The Terminator" movie, is more of a common nomenclature of recent Twitter attacks, they keep coming back. New Twitter attacks are underway through direct messages sent via the popular social network. Reports are circulating of Twitter tweets that lead to a fake Twitter site or video web page to spread malware. An example of the Tweet is similar to figure 1 below. Figure 1. - Malicious Twitter tweet with a link to a fake video web page. [source: PCMag] Twitter has had a long drawn-out history of attacks from cybercrooks hacking into administrators' accounts, to malicious worms spread via messages on Twitter. Now it is direct messages sent from users that a person follows on Twitter. Some of the direct messages found to include malicious links read similar to the subjects...

Posted on October 14, 2009 in Computer Security is a hostile website that infects visitors' computers with malicious applications. is spread with the help of a Trojan that is designed to manipulate the browser configurations of a system. The browser is modified to redirect certain searches to, giving the site an opportunity to direct victims to pages that try to trick users into downloading and installing malicious software. Once has been visited, a scan with an interface that resembles the MS DOS blue screen of death will be conducted. The scan is run by the rogue application TrustFighter, therefore it cannot be trusted. and TrustFighter are both dangerous computer threats that should be removed with a recognized security tool.

Posted on October 14, 2009 in Rogue Websites


BrowserModifier.Fotomoto is an adware program that is designed to pollute your screen with various pop-up advertisements. BrowserModifier.Fotomoto may install dangerous malware onto your PC when you click on a malicious advert. BrowserModifier.Fotomoto may also monitor a user's browsing habits and pass the information on to a third-party.

Posted on October 14, 2009 in Adware


Trojan.Kissderfrom is an information stealing Trojan. Trojan.Kissderfrom is able to open a backdoor and communicate with a remote server. Trojan.Kissderfrom may record keystrokes typed into a user's browser and then send the data to its command and control server. It is not safe to keep Trojan.Kissderfrom on your computer.

Posted on October 14, 2009 in Trojans


VirTool.Tinxy.A is a ruthless Trojan out to infest user's computers with dangerous malware. VirTool.Tinxy.A may download malware from different remote sources. VirTool.Tinxy.A may also give remote attackers access to a system, putting a victim's confidential information at risk. The manual removal of VirTool.Tinxy.A is not recommended; rather use a legitimate anti-spyware program to completely remove it.

Posted on October 14, 2009 in Worms is a website that is not to be trusted. Visiting could lead to your computer being infected with harmful malware. may install malware onto your computer the moment you click on one of its links. For the safety of your computer and the valuable information stored on it, stay away from

Posted on October 14, 2009 in Rogue Websites has been listed as a suspicious website. may install dangerous malware onto a visitor's computer without his/her knowledge and consent. Browsing the website is a risk to your computer's security. It is recommended that you avoid visiting the website at all costs.

Posted on October 14, 2009 in Rogue Websites