XPdefender

XPdefender is a rogue anti-spyware application that is usually downloaded and installed onto your computer by a Trojan finding its way through browser security holes. As soon as it is installed it will display notifications of non-existent security and privacy risks and try to trick you into buying the full version. This program may slow down your system and cause its instability. XPdefender can be highly difficult to remove manually XPdefender belongs to a famous family of rogue security programs named . XPdefender has numerous clones that include

Posted on January 18, 2008 in Rogue Anti-Spyware Program

Trojan-Spy.Goldun.cv

Trojan-Spy.Goldun.cv is a malicious spyware Trojan. It installs itself on your system secretly via browser security holes or other unconventional and unethical mechanisms. This malware application will take over your computer and create a security hole in order to open up a path for additional malicious software applications. Trojan-Spy.Goldun.cv will also try to steal your passwords and account details enabling a remote hacker to take hold of it. Trojan-Spy.Goldun.cv may violate your privacy severely and therefore it is advised to be removed straight away.

Posted on January 18, 2008 in Trojans

Trojan.Inject.t

Trojan.Inject.t is a malicious Trojan application. It embeds itself into Windows system processes in order to sidestep most firewall software. After doing so it will contact remote websites on a pursuit to download supplementary malware onto your computer without your permission or accord. Trojan.Inject.t hides itself by applying rootkit techniques which enables it to hide from visible system processes.

Posted on January 18, 2008 in Trojans

Email-Worm.Pacrac

Email-Worm.Pacrac is a malware application that spreads through computer networks by imposing upon security holes on connected machines. As soon as it is executed Email-Worm.Pacrac will continue to multiply by sending itself to email addresses kept in your computer. Email-Worm.Pacrac can download and install additional malware onto your computer. In doing so it can cause system and Internet slowdown.

Posted on January 18, 2008 in Worms

Trojan-Proxy.Webber.x

Trojan-Proxy.Webber.x is a malicious Trojan application that exploits the computer by creating a proxy server on your machine. This proxy server enables a remote hacker to chart HTTP traffic, and in doing so use your computer to send enormous amounts of spam email, host phishing sites, and implement other malicious activities. In addition, it can also cause sluggish computer performance and Internet slowdown.

Posted on January 18, 2008 in Trojans

RegClean

RegClean screenshot

RegClean is a rogue registry cleaner application that is usually downloaded and installed onto your computer by a Trojan finding its way through browser security holes. As soon as it is installed it will display notifications of non-existent and overemphasized system errors in order to trick you into purchasing the full version. RegClean is a clone of ErrorSweeper.

Posted on January 18, 2008 in Rogue Anti-Spyware Program

ErrorSweeper

ErrorSweeper screenshot

ErrorSweeper is a rogue registry cleaner application that is usually downloaded and installed onto your computer by a Trojan finding its way through browser security holes. As soon as it is installed it will display notifications of non-existent and overemphasized system errors in order to trick you into purchasing the full version. ErrorSweeper is a clone of RegClean.

Posted on January 18, 2008 in Rogue Anti-Spyware Program

NeoSpy

NeoSpy screenshot

NeoSpy is a spyware application that records user’s keystrokes. This keylogger application can be configured to log your instant messenger and email conversations and therefore violating your privacy. It can also log every web page the user visits. NeoSpy runs in stealth mode and in doing so remains hidden from the user who is unaware that his personal and financial data is at risk.

Posted on January 18, 2008 in Keyloggers

Super WinSpy

Super WinSpy is a commercial surveillance tool allowing a remote hacker to monitor your computer usage activities that may include visited websites, sent emails, viewed images and text. Super WinSpy can also log any of executed searches and loaded programs. In doing all of the above Super WinSpy violates your privacy and the safety of your personal and financial data.

Posted on January 18, 2008 in Keyloggers

Trojan.Agent-WX

Trojan.Agent-WX is a spyware application that hijacks your computer and opens up a hole in your system, via which enormous amounts of adware and spyware can be downloaded to your machine. This additional adware will generate large amounts of popup advertisements. By creating a security hole in your system Trojan.Agent-WX will also enable unauthorized usage of your personal and financial data.

Posted on January 18, 2008 in Trojans

Trojan.BHO.Agent.BY

Trojan.BHO.Agent.BY is a spyware application that embeds itself into your web browser as a Browser Helper Object (BHO). This spyware Trojan hijacks your computer and opens up a hole in your system, via which enormous amounts of adware and spyware can be downloaded to your machine. The additional adware will generate large amounts of popup advertisements. By creating a security hole in your system Trojan.BHO.Agent.BY will also enable unauthorized usage of your personal and financial data.

Posted on January 18, 2008 in Trojans

Trojan-Downloader.Matcash

Trojan-Downloader.Matcash is a spyware Trojan. Once executed Trojan-Downloader.Matcash will open up a security-free conduit in your system, via which enormous amounts of adware and spyware can be downloaded to your machine. By creating a security hole in your system Trojan-Downloader.Matcash will also enable unauthorized usage of your personal and financial data.

Posted on January 18, 2008 in Trojans

Trojan.Peed.INM

Trojan.Peed.INM is a spyware Trojan. Once executed Trojan.Peed.INM will open up a security-free conduit in your system, via which enormous amounts of adware and spyware can be downloaded to your machine. By creating a security hole in your system Trojan.Peed.INM will also enable unauthorized usage of your personal and financial data.

Posted on January 18, 2008 in Trojans

Trojan-Downloader.Alphabet.gen

Trojan-Downloader.Alphabet.gen is a spyware application that embeds itself into your web browser as a Browser Helper Object (BHO). This spyware Trojan hijacks your computer and opens up a hole in your system, via which enormous amounts of adware and spyware can be downloaded to your machine. The additional adware will generate large amounts of popup advertisements. By creating a security hole in your system Trojan-Downloader.Alphabet.gen will also enable unauthorized usage of your personal and financial data.

Posted on January 18, 2008 in Trojans

EliteProtector

EliteProtector screenshot

EliteProtector is a rogue anti-spyware application that is usually downloaded and installed onto your computer by a Trojan finding its way through browser security holes. As soon as it is installed it will display notifications of non-existent security and privacy risks and try to trick you into buying the full version. This program may slow down your system and cause its instability. EliteProtector can be highly difficult to remove manually.

Posted on January 18, 2008 in Rogue Anti-Spyware Program