Security Mechanic

Security Mechanic is a rogue anti-spyware application originating from the same family as System Protector and SpyProtector. Security Mechanic spreads by way of trojans and malicious websites, infiltrating computers in order to flood the user with popup windows and fake security alerts, in order to trick the user into believing that the computer is compromised and the only solution is to purchase and download the commercial version of the fake spyware remover Security Mechanic. Fabricated system scan results also accomplish this goal.

Posted on July 20, 2009 in Rogue Anti-Spyware Program

Totalvirusscanc3.com

Totalvirusscanc3.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Personal Antivirus. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Totalvirusscanc3.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Personal Antivirus.

Posted on July 20, 2009 in Rogue Websites

Security-mechanic.com

Security-mechanic.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Security Mechanic. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Security-mechanic.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Security Mechanic.

Posted on July 20, 2009 in Rogue Websites

Bloodhound.Exploit.264

Bloodhound.Exploit.264 is a trojan virus that serves as a detection method used to detect files which may attempt to exploit security vulnerabilities in a computer. Bloodhound.Exploit.264 may also download additional malware onto the compromised computer, causing severe computer performance degradation and a decrease in speed.

Posted on July 20, 2009 in Trojans

Basic-security-scan.com

Basic-security-scan.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Security Mechanic. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Basic-security-scan.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Security Mechanic.

Posted on July 20, 2009 in Rogue Websites

Koobface.C

Koobface.C (also known as W32.Koobface.C) is a computer worm designed to infect a computer once the malicious link sent via Twitter social networking has been executed. Koobface.C may then infect the registry on the system, causing Koobface.C to begin running as soon as Windows starts up.

Posted on July 20, 2009 in Worms

Packed.Generic.240

Packed.Generic.240 is a common detection utility for a trojan that represents a malicious hidden file. Packed.Generic.240 was intentionally encrypted using unknown packers in order to conceal itself from antivirus programs and to avoid detection.

Posted on July 17, 2009 in Trojans

Livefolderscannerv6.com

Livefolderscannerv6.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Personal Antivirus. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Livefolderscannerv6.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate you into purchasing the fake spyware remover Personal Antivirus.

Posted on July 17, 2009 in Rogue Websites

Zocleaner.com

Zocleaner.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as System Security 2009. Due to affiliated trojans infiltrating the computer and modifying the browser settings, web-surfing activities are redirected to the Zocleaner.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover System Security 2009.

Posted on July 17, 2009 in Rogue Websites

Tacoda.Cookie

Tacoda.Cookie (also simply referred to as Tacoda) is a tracking cookie. While not all Internet cookies are invasive, tracking cookies violate the privacy of a user by logging web-surfing activity. Tacoda then records the information and shares the data with multiple domains, or the information is sold to third party websites for marketing purposes.

Posted on July 17, 2009 in Cookies

Revsci

Revsci, also known as Revsci.net, is a tracking cookie that may allow unauthorized third party users access to browser activity. Revsci.net is installed onto the system through gambling and pornographic-related adult websites.

Posted on July 17, 2009 in Cookies

How Strong is Your Password?

We all know that a good, strong password is the best means by which one can keep their personal and financial information secure, discouraging hackers from attempting to access our computers. But what makes a strong password? If you, like me, are uncertain as to what constitutes a good, strong password, then perhaps you should try a password checker application to ensure that you are utilizing a strong password. There are free tools available such as Microsoft's Password Checker, which is an application designed to give your password a rating of "Weak," "Medium," "Strong" or "Best." "Best" being the strength level that you hope your password meets. The Microsoft password checker page doesn't record what you type so you not need to worry about Microsoft recording the information entered into the password field. Screenshot of Microsoft's...

Posted on July 16, 2009 in Computer Security

Helkern Worm

Helkern Worm (sometimes referred to simply as Helkern) is a computer worm designed to specifically infect servers running on Microsoft SQL Server 2000. By exploiting a security breach in Microsoft SQL Server known as the Buffer Overrun, the Helkern Worm is capable of sending a request to a target computer that, when processed, automatically executes the Helkern Worm code. In this manner, an unauthorized user can run malicious code without approved consent.

Posted on July 16, 2009 in Worms

Troj/Wimad-J

Troj/Wimad-J arrives on a computer system masquerading as a license-protected multimedia file, typically causing its download and installation to be manual as the user believes the file to be legitimate. Once active, however, Troj/Wimad-J proceeds to download a file from a remote web site by taking advantage of the Digital Rights Management (DRM) technology commonly available on Windows operating systems.

Posted on July 16, 2009 in Trojans

Antivirus-doktor.com

Antivirus-doktor.com is a browser hijacker promoting the distribution of the rogue anti-spyware application known as Antivirus Doktor 2009. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Antivirus-doktor.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results in order to intimidate the user into purchasing the fake spyware remover Antivirus Doktor 2009.

Posted on July 16, 2009 in Rogue Websites