PC Antispyware 2010

PC Antispyware 2010 screenshot

PC Antispyware 2010 is a rogue anti-spyware application that generailly installs itself onto a computer via Braviax infections. Once active, PC Antispyware 2010 launches fake system scans that display fictitious and sometimes grossly exaggerated infection results, along with fraudulent security alert messages. These methods are enacted to ensure the user is intimidate into purchasing the licensed version of the fake spyware remover PC Antispyware 2010.

Posted on August 3, 2009 in Rogue Anti-Spyware Program

2009 Sees Previous Malware Record Broken

In the first half of 2009, McAfee recorded more than 1.2 million unique samples of malware, putting the year well on course to breaking last year's record in malware creation. For the full year of 2008, McAfee identified a total of only 1.5 million unique pieces of malware. There were many frightening statistics expressed in the report, such as the average loss per victim from phishing is $866, and 80 percent of all banking emails are fraudulent. According to the numbers, 30 to 40 percent of all password stealing trojans focus on gaming and virtual worlds, illustrating the high profit potential of virtual goods. The Director of Security Research and Communications at McAfee, Dave Marcus, said that, "In the first half of 2009, we have seen about three times the unique malware discovered in the same period in 2008. This tremendous growth...

Posted on August 3, 2009 in Computer Security

Smart Protector

Smart Protector is a bogus security application that may be confused with the legitimate Smart Protector Pro application that comes from SmartSoft. Smart Protector may be advertised as a program capable of detecting and removing spyware and viruses. Not only is Smart Protector unable to detect and remove parasites, but it is also unable to fix any type of security issue that your system may be facing. System scans are initiated by Smart Protector to only confuse you by returning several falsified results.

Posted on July 31, 2009 in Rogue Anti-Spyware Program

Top 10 Botnet Threats in the United States

Did you know that Botnets are some of the most dangerous computer infections around? Botnets, or groups of compromised computers, have made a huge commotion by spreading malicious infections onto millions of computers around the world over the past few years. Many of the most popular and dangerous botnets have been identified and compiled into a list of the 10 most active botnets in the United States by online security company Damballa, based in Atlanta, GA. Many botnets have originated from countries outside of the U.S. but continue to be a threat to millions of computers located inside the United States. Some of the most popular and effective botnets have spread to literally millions of computers around the world including a large majority of vulnerable systems in the United States. The top 10 Botnet threats in the U.S. list that was...

Posted on July 30, 2009 in Computer Security

Repair Registry 2008

ESG security researchers warn against using the fake registry repair program Repair Registry 2008. This bogus computer optimization tool is designed to take over your computer system and pester you with fake error messages until you purchase a useless 'full version' of this malicious application. Repair Registry 2008 belongs to a category of malware known as rogue security programs. Rogue security programs impersonate anti-virus applications or, in this case, computer optimization tools in order to scam their victims so that they will pay for a useless product. ESG security analysts recommend not paying attention to Repair Registry 2008's claims and multiple fake error messages. Repair Registry 2008 should be removed with a reliable anti-malware tool and a full scan of your computer system should be carried out in order to ensure that...

Posted on July 30, 2009 in Rogue Registry Cleaner

Win-Trojan/Refroso.22016

Win-Trojan/Refroso.22016 is a backdoor Trojan that spreads through the exploitation of local network shares. Win-Trojan/Refroso.22016 also has the capability of taking part in DDos attacks by joining a predefined IRC server and channel. Win-Trojan/Refroso.22016 presents a serious security risk for the system that it is installed onto. In some cases, the installation of Win-Trojan/Refroso.22016 can take place without notification to the computer user.

Posted on July 30, 2009 in Backdoors

RegistryEasy

RegistryEasy is an unwanted program that uses scare tactics for persuading computer users to purchase full version of RegistryEasy. RegistryEasy, advertised as a registry cleaning application, is unable to detect or repair registry issues. Once installed, RegistryEasy will drop several malicious files within your Program Files directory. Manual removal of RegistryEasy can be difficult to perform because RegistryEasy loads into memory at startup of Windows.

Posted on July 30, 2009 in Rogue Registry Cleaner

Clampi Trojan Causing Theft of Online Banking Credentials from Thousands

Hundreds of thousands to possibly a million computers are believed to be infected with Clampi, a Trojan that was discovered to be stealing banking and other log-in credentials from hijacked systems. Security researcher, Joe Stewart from SecureWorks, has traced Clampi back to the year 2007 and revealed that it has been stealing log-in credentials since then. The Clampi Trojan is able to infect computers through drive-by downloads installing code when a user visits a website that hosts malicious code that exploits vulnerabilities within ActiveX or Flash plug-ins. Clampi Trojan is also known as Rscan, Ligats and Ilomo. Recently, Clampi has spread through Microsoft based networks similar to that of a worm parasite. Clampi goes undetected by encryption methods and acts as a proxy server allowing criminals to stay anonymous when logging into...

Posted on July 30, 2009 in Computer Security

Clampi

Clampi is a dangerous Trojan that dropped several malicious executables onto the infected system. When executed, the infected system can become compromised and used to perform malicious actions. Clampi can connect to several different remote servers for the purpose of downloading updates or receive new instructions for the compromised system to perform. Manual detection and remove of Clampi is difficult as it uses advanced methods to remain undetected.

Posted on July 29, 2009 in Trojans

Spyware Cleaner 2009

Spyware Cleaner 2009 screenshot

Spyware Cleaner 2009 is a fake anti-spyware program. Once installed, Spyware Cleaner 2009 may scan your computer. The system scan can take over an hour, returning several Trojan and virus parasites that are not actually present on the system. Spyware Cleaner 2009 is based out of the UK and may be promoted and sold on several downloads web sites. Spyware Cleaner 2009 is not able to detect and remove legitimate spyware, virus or trojan parasites. It is recommended that use of Spyware Cleaner 2009 be discontinued and removed before it causes damage to the system that it is installed on.

Posted on July 29, 2009 in Rogue Anti-Spyware Program

W32.Palevo

W32.Palevo (also known as Palevo Worm) is a worm virus that typically infects a computer by exploiting known software vulnerabilities. W32.Palevo may also designate its own registry entries in order to begin running as soon as Windows starts up. In addition to this, W32.Palevo may end security-related processes on the compromised computer, lowering security settings.

Posted on July 29, 2009 in Worms

W32.Neeris.C

W32.Neeris.C is a self-replicating worm that spreads by copying itself onto removable storage devices and creating backdoors on infected computers to allow remote access to the system. W32.Neeris.C may also exploit the Microsoft Windows Server Service RPC Handling Remote Code Execution vulnerability in order to propagate.

Posted on July 29, 2009 in Worms

Spam and Botnet Threats Increasing Exponentially

In recent Internet threat reports distributed among software security web sites and blogs, it's become apparent that not only are we continuously vulnerable to cybercrimes, but that the perpetrators of such attacks are gaining speed in their development of new malware trends. While old trends remain, new threats are being established, and some of the more notorious malware authors are coming into their own with the improvements made regarding specific parasites. Spam volumes have actually increased 141 percent since March this year, making this the longest running streak of increasing spam volumes ever. Unfortunately, the rise in spam is not our only concern. There remains the dramatic expansion of botnets and the threat from Auto-Run malware. It has been reported that more than 14 million computers have been enslaved by cybercriminal...

Posted on July 29, 2009 in Computer Security

Security Center

Security Center is a fake security application. Security Center is a copy of the rogue applications Privacy Components and Secret Service. Security Center is usually installed via a Trojan horse such as Vundo. In the case that your system is infected with a Trojan, Security Center can be installed without any actions from you or the administrator. Security Center is not able to detect or remove spyware, viruses or fix other security issues. Security Center, like other rogue applications, conducts systems scans only to mislead users with bogus results.

Posted on July 28, 2009 in Rogue Anti-Spyware Program

Trojan.Swifi

Trojan.Swifi (also simply known as Swifi) is a Trojan horse virus that infiltrates a computer via a vulnerability in Adobe flash. Typically Trojan.Swifi is downloaded from a malicious website without user knowledge or consent, and may cause performance degradation, a decrease in speed and security malfunctions leading to unauthorized users gaining remote access to the compromised machine. Remove as soon as possible.

Posted on July 28, 2009 in Trojans