Surabaya

Surabaya is a Windows startup worm that will appear during bootup. It spreads on computer and comes embedded with File Sharing applications. It displays a message on Windows startup: "Surabaya in my birthday Don't kill me, I'm just a send message from your computer Terima kasih telah menemaniku walaupun hanya sesaat, tapi bagiku sangat berarti Maafkan jika kebahagiaan yang kuminta adalah teman sepanjang hidupku Seharusnya aku mengerti bahwa keberadaanku bukanlah disisimu, hanyalah lamunan dalam sesal Untuk kekasih yang tak kan pernah kumiliki 3r1k1m0"

Posted on July 22, 2009 in Worms

Trojan.Win32.BHO.abo

Trojan.Win32.BHO.abo is a trojan virus that generally installs malicious toolbars using browser security backdoors. There are some programs, however, that display Trojan.Win32.BHO.abo fake detection messages as their scan/detection results. Trojan.Win32.BHO.abo may also be distributed by a new fraudulent codec.

Posted on July 22, 2009 in Trojans

"Home Antivirus 33 Unwanted Files" pop-up

"Home Antivirus 33 Unwanted Files" pop-up is a fraudulent warning notification designed to intimidate a user into purchasing the rogue anti-spyware application known as Home Antivirus 2010 in order to combat the fictitious threats posed against the computer. The "Home Antivirus 33 Unwanted Files" pop-up reads as follows: "WARNING! Home Antivirus 2010 has found 33 useless and UNWANTED files on your computer! - 21 of those items are considered critical privacy compromising content - 9 of those items are considered medium privacy threats - 3 of those items are considered to be junk content of low privacy threats Personal data at the reach of anyone's hand Internet history records available Compromising and adult material stored on your system Chat sessions' logs and personal Emails easily reachable You need to register Home Antivirus 2010...

Posted on July 22, 2009 in Fake Error Messages

PP10.exe

PP10.exe is a backdoor trojan infiltrates a system with veritable ease and typically without the user being aware of the intrusion. PP10.exe allows an unauthorized user remote access to the compromised computer. This may lead to identity theft and the loss of personal and financial information.

Posted on July 22, 2009 in Backdoors

Windowsclick

Windowsclick, also known as WindowsClick.com, is a tracking cookie that may allow unauthorized third party users access to browser activity. Windowsclick is installed onto the system through gambling and pornographic-related adult websites.

Posted on July 22, 2009 in Cookies

Backdoor.Java.KBD

Backdoor.Java.KBD is a backdoor trojan infiltrates a system with veritable ease and typically without the user being aware of the intrusion. Backdoor.Java.KBD allows an unauthorized user remote access to the compromised computer. This may lead to identity theft and the loss of personal and financial information.

Posted on July 22, 2009 in Backdoors

Spywarefolderscannerv2.com

Spywarefolderscannerv2.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Personal Antivirus. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Spywarefolderscannerv2.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Personal Antivirus.

Posted on July 22, 2009 in Rogue Websites

Adware/EShoper.v

Adware/EShoper.v is an adware program specifically designed to generate and display advertisements according to the users personality based on information acquired by monitoring search results. Once Adware/EShoper.v has begun running, it displays numerous forms of advertisement in the guise of pop-up windows, browser toolbars, etc.

Posted on July 22, 2009 in Adware

Blue Streak

Blue Streak, also known as BlueStreak.com, is a tracking cookie that may allow unauthorized third party users access to browser activity. Blue Streak is installed onto the system through gambling and pornographic-related adult websites.

Posted on July 22, 2009 in Cookies

Backdoor.Gen

Backdoor.Gen is a backdoor worm that infiltrates a system with veritable ease and typically without the user being aware of the intrusion. Backdoor.Gen spreads via network shares and allows an unauthorized user remote access to the compromised computer. This may lead to identity theft and the loss of personal and financial information.

Posted on July 22, 2009 in Backdoors

Backdoor.Bot

Like its name suggests, Backdoor.Bot is a backdoor Trojan. Like most backdoor Trojans, Backdoor.Bot is designed to allow a hacker to obtain illegal access to a computer through a digital 'backdoor'. Much like a real-life backdoor allows a robber to enter a house or a building without being seen, a backdoor into a computer like the one the Backdoor.Bot establishes allows a criminal to gain access to the infected computer without being detected by the infected computer's security. Once installed, the Backdoor.Bot will open up an unauthorized opening that allows criminals to carry out tasks by gaining access to the infected computer from a remote location. If you are afraid that your PC has been in contact with Backdoor.Bot, you should scan your computer with a reliable anti-malware tool after restarting Windows in Safe Mode. While a...

Posted on July 22, 2009 in Backdoors

Adinterax.com

Adinterax.com, also known as simply Adinterax, is a tracking cookie that may allow unauthorized third party users access to browser activity. Adinterax.com is installed onto the system through gambling and pornographic-related adult websites.

Posted on July 22, 2009 in Cookies

WildTangent

WildTangent is an online gaming plugin bundle from Wildtangent.com. It is also classified as adware and contains the WildTangent Web Driver, WildTangent Multiplayer Library, WildTangent Updater as well as the WildTangent GameChannel. WildTangent is downloaded as a standard setup .exe file or installed by an ActiveX control from the vendor's web site. Though not seriously damaging to a computer system, WildTangent can cause performance degradation and speed loss with its numerous pop-up advertisements.

Posted on July 22, 2009 in Adware

NTOSKRNL-HOOK

NTOSKRNL-HOOK (also known as Generic Rootkit.d!) is a detection for techniques used by Rootkits to hide malicious files and processes. NTOSKRNL-HOOK Rootkits are programs that can be utilized by malware to conceal them from security programs.

Posted on July 22, 2009 in Rootkits

Twitter Gets Cracked. Could You Be Next?

A common approach 'password cracking' is to repeatedly guess the password. This might not sound very technical, but you would be surprised at just how successful most hackers are when using this simplistic method. What it all boils down to is poor password practices, and Twitter employees learned this the hard way. Recently it was reported that the French hacker calling himself Hacker Croll broke into Twitter's Google Apps and stole more than 300 private company documents, which were subsequently sent to various web sites to be posted for public scrutiny. One such web site was TechCrunch, whom managed to gain Hacker Croll's trust through hours of online conversations and persuade him to reveal how exactly he did it. How did Hacker Croll steal more than 300 private Twitter documents? It seems Hacker Croll found one weakness many of us...

Posted on July 21, 2009 in Computer Security