Researcher Defies Microsoft's Report on the Root Cause of Hijacked Hotmail, Gmail, and Yahoo Passwords

Now is the time to change your password regardless if the recent hijacking of 30,000 web-based email accounts proves to be a massive phishing attack or one from a botnet or keylogging applications. By now, if you have been following all of the recent news on 30,000 web-based email account login credentials being stolen and posted online, you are almost sick of hearing about it. It is still rather important that computer users know how this happened and how to keep themselves safe from future attacks. The only problem is, no one is 100% sure of what the root cause of the hijacking was. Some security researchers are claiming that the recent hijacking of thousands of web-based email accounts was the result of a phishing attack while others believe it was a harvest performed by computers with keylogging or Trojan software that came from...

Posted on October 8, 2009 in Computer Security

Safe Fighter

Safe Fighter is a fake security program that comes from the same group of rogue anti-spyware programs Secure Fighter, Secure Warrior, Trust Cop, WiniFighter and others. Safe Fighter, after installed, can display fake Windows Security Center messages and even conduct system scans that return falsified results. Safe Fighter is incapable of detecting and removing legitimate computer parasites. Safe Fighter can be installed onto a computer without permission from a Trojan horse infection or malicious source online. Removal of Safe Fighter is recommended to be performed by a spyware detection and removal tool.

Posted on October 8, 2009 in Rogue Anti-Spyware Program


FakeAlert.AQF is a dangerous Trojan that can install rogue anti-spyware applications onto the infected computer. FakeAlert.AQF can lead to the installation of other malware parasites without permission from the computer user. FakeAlert.AQF is also known to populate the system registry with malicious entries that can cause parasites to load into memory at startup of Windows making it difficult to manually remove.

Posted on October 8, 2009 in Trojans


Trojan.Zlobou is a very dangerous Trojan horse that uses instant messaging applications and p2p file sharing sites to infect a computer with malware. This process may be accomplished without notification to the computer user. Personal information can be compromised through Trojan.Zlobou by it allowing an attacker remote access to the infected computer.

Posted on October 8, 2009 in Trojans


Worm.Hikjav.A is a dangerous computer worm infection. Worm.Hikjav.A has the ability to spread onto local drives of the infected system. Once a system is infected with Worm.Hikjav.A, it can delete and create system files causing operational issues of the computer. Worm.Hikjav.A loads at startup making it very difficult to manually detect and remove from an infected computer.

Posted on October 8, 2009 in Worms


Trojan.FakeRemoc is a malicious Trojan horse that can perform various actions that infect a computer with other unknown malware infections. Trojan.FakeRemoc can be installed through a security hole or browser exploit without the computer user’s knowledge. After installed, Trojan.FakeRemoc can damage a computer by deleting or adding system files. Detection and manual removal of Trojan.FakeRemoc can be difficult to perform due to its ability to load at startup.

Posted on October 8, 2009 in Trojans

The Use of Weak Hotmail Passwords Make Phishing Attacks Easier for Hackers

Is it ever a good idea to use the password "111111" on a web-based email account? You might as well post your own login information online just like the hackers did with thousands of compromised Hotmail and Gmail accounts. After hackers were able to compromise thousands of Hotmail accounts and post the details online, it was later revealed that many of the passwords used on the affected accounts were week or simple passwords such as "1234567". It does not take an expert to figure out that "1234567" is not a very effective or remotely safe password to have. Because the Hotmail login credentials of thousands of users were posted onto (site used to post and share snippets of source code) last week, security researchers among others were able to view them before they were taken down. After security researchers took a look at...

Posted on October 7, 2009 in Computer Security

Cyber Security

Cyber Security screenshot

Cyber Security is a fake security application. Cyber Security comes from the same hackers that make and aggressively market the rogue anti-spyware programs that belong to the family. Cyber Security, through the use of fabricated warning popup messages and systems scans that return bogus results, is able to scare computer users into purchasing the full version of Cyber Security. Cyber Security is not able to detect and remove legitimate computer parasites including spyware, malware, Trojans and even viruses. Manual detection and removal of Cyber Security can be difficult to successfully perform. Other members of the Cyber Security family include

Posted on October 7, 2009 in Rogue Anti-Spyware Program


Trojan.Ircbrute is a dangerous computer Trojan horse. Trojan.Ircbrute may be referred to as TrojanIrcbrute or Trojan Ircbrute over the internet. Trojan.Ircbrute can be installed onto a system through a web browser exploit or security hole. After Trojan.Ircbrute is installed, it can open up the infected system to outside attackers. Communication through an IRC remote server can be initiated which can compromise personal information stored on a computer.

Posted on October 7, 2009 in Trojans


Packed.Autoit is a computer Trojan infection that can be installed from a malicious source online without knowledge to the computer user. After installed, Packed.Autoit can download other malware parasites onto the infected computer. A system infected with Packed.Autoit could slow down drastically or crash. Detection and removal of Packed.Autoit can be difficult to perform manually in many cases.

Posted on October 7, 2009 in Trojans

Trojan.Mailfinder is a very dangerous computer Trojan horse that could compromise your computer. is usually automatically installed from a malicious source or website without your knowledge. After is installed, it can greatly diminish the performance of computer. Removal of can be difficult to perform manually.

Posted on October 7, 2009 in Trojans


Worm.Rudov.B is a dangerous worm parasite that is associated with the svs.exe executable system file. Svs.exe is related to the advertising program made by Odysseus Marketing. Once installed, Worm.Rudov.B can drastically reduce system performance and may cause the infected computer to crash. Removal of Worm.Rudov.B can be difficult to complete manually.

Posted on October 7, 2009 in Worms

5 Easy Steps to Keep Your Gmail, Hotmail, Yahoo and Other Online Accounts Away from Hackers

Scared by all of the headlines of Gmail and Hotmail accounts getting hacked? Are you concerned that your Hotmail or Gmail account could be next in line to be attacked? Interestingly enough, this is a trend that we will unfortunately see happening until computer users take the necessary steps to proactively protect themselves. Here are 5 crucial safety steps that you can take to prevent your email accounts from being hacked. 5 Steps to Protect Your Gmail, Hotmail, Yahoo and Other Accounts Crucial Safety Step #1: Never give out or post your login credentials. It may seem like common sense but you may be surprised to know that a number of computer users have simply posted their login information online accidentally given it to someone either by instant message or via email. You must never provide your password to anyone even if it seems...

Posted on October 6, 2009 in Computer Security

Warning: Over 20,000 Gmail, AOL, and Yahoo Email Accounts Hacked!

A major email security scam has taken place today where hackers compromised over 20,000 Gmail, AOL and Yahoo email accounts and posted the login details of them online. It is apparent that there is a phishing scheme happening where hackers are able to obtain thousands of login credentials from users of Hotmail, and now, AOL, Yahoo, Gmail, Comcast and Earthlink accounts. The phishing scheme must be rather advanced as they are able to obtain the login information of over 30,000 accounts combined. Just the other day, it was found where over 10,000 Hotmail accounts were compromised and login information was posted online. Many of the email service providers have taken action to address this situation such as in the case of Gmail where Google is forcing password resets on all of the affected accounts. Precautionary Tip: Users of the other...

Posted on October 6, 2009 in Computer Security


Backdoor.HareBot is a computer Trojan that is known to allow a remote attacker access to the infected system. Backdoor.HareBot was designed to be a legitimate remote administration tool but in the hands of a hacker can be very dangerous and lead to identity theft. Backdoor.HareBot can launch at startup and go undetected while it opens up the infected computer to remote users.

Posted on October 6, 2009 in Trojans