System Files Modification Alert! Pop Up

System Files Modification Alert! Pop up is a fake security alert promoted by the rogue anti-spyware application ANG AntiVirus 09. The text of the alert reads: "System Files Modification Alert! Some important system files were modified by malicious application. It may potentially lead to system slowdowns and data loss. Click here to remove these system threats and stop unauthorized instrusions (Recommended)." The System Files Modification Alert! Pop up false alert is displayed in order to try to trick or scare the user into purchasing the rogue ANG AntiVirus 09 application. This is a common tactic used in promoting fraudulent products. The user should ignore these fake warnings and not purchase the ANG AntiVirus 09 program. It is strongly recommended that the user remove the infection immediately.

Posted on December 2, 2007 in Fake Error Messages

Worm.NetSky.Q, Email-Worm.Bugbear.b, Email-Worm.Tanatos.a, more - SpyHunter Update v.7.28

SpyHunter Spyware Definitions Update: v.7.28 (11/30/2007) SpyHunter Latest Program Update: v.3.2.0 Keep Your SpyHunter Up to Date New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update. Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner. Newly Added Threat List The following new parasites have been added to SpyHunter: Updated Threat List The following parasite threats were updated: Zlob.Trojan VirusProtect Worm.Mydoom Trojan.Surila Worm.Doombot MySpyProtector PWSteal.Lineage Trojan.Bancos...

Posted on November 30, 2007 in Database Updates

Worm.NetSky.Q

Worm.NetSky.Q is a dangerous mass mailing worm that spreads via the Internet as an infected email attachment. Once executed, Worm.NetSky.Q will install itself into your Windows registry so that it can automatically start on each Startup. Then Worm.NetSky.Q will try to spread itself to all addresses found on your PC. Worm.NetSky.Q also drops a backdoor Trojan into the Windows directory, which will allow a hacker to connect to your computer via several access methods. Worm.NetSky.Q places your sensitive information in a severe jeopardy and should be removed without delay.

Posted on November 30, 2007 in Worms

Email-Worm.Bugbear.b

Email-Worm.Bugbear.b is a malicious mass-mailing worm that is designed to spread as an email attachment. Once it is installed, Email-Worm.Bugbear.b will set in Windows Registry to be able to launch every time you load your computer. Email-Worm.Bugbear.b will search and send its copies to all addresses found onto your computer. Moreover, Email-Worm.Bugbear.b may open up a backdoor on your machine, and this places any financial or banking information stored on your computer in severe jeopardy and represents a serious security risk.

Posted on November 30, 2007 in Worms

Email-Worm.Tanatos.a

Email-Worm.Tanatos.a is a mass-mailing worm designed to install itself onto your machine without your knowledge and permission, either bundled with other malware, as an illicit email attachment, or via security exploits. Once it is installed, Email-Worm.Tanatos.a will spread its copies to several locations, including peer to peer file sharing directories. Email-Worm.Tanatos.a will search for email addresses in your PC and spread by emailing itself to all entries in your Outlook address book. In addition, Email-Worm.Tanatos.a will open a backdoor and this will allow your computer to be controlled by the remote attackers. Email-Worm.Tanatos.a may remove some files, including personal documents, images, etc. and terminate antivirus processes. Email-Worm.Tanatos.a opens a huge security hole on your machine and puts your personally...

Posted on November 30, 2007 in Worms

Worm.Mytob-F

Worm.Mytob-F is a mass-mailing worm that spreads in the Internet by email and in local networks by exploiting computers running the Windows operating system with known vulnerabilities. Worm.Mytob-F scans local drives for text and spreadsheet documents, as well as web pages and various programming files. Then Worm.Mytob-F sends e-mail messages to all the addresses it gathers from found files by using own mail engine. Worm.Mytob-F also opens a backdoor providing the attacker with remote unauthorized access to the compromised computer and allowing him to control the system and steal user sensitive information.

Posted on November 30, 2007 in Worms

ICQMonitor

ICQMonitor is a monitoring tool created to secretly monitor and record all your ICQ conversations. ICQMonitor uses packet sniffing methods to log all your ICQ chats. The logged conversations then maybe placed into a separate file and delivered to the creator of ICQMonitor. ICQMonitor seriously affects your security and privacy and is recommended to be removed with no delay.

Posted on November 30, 2007 in Spyware

IMDetect

IMDetect is a network monitoring program designed to log AIM (AOL Instant Messenger) communication packets. IMDetect seizes both server based and peer-to-peer chat sessions, and can incorporate its chat log into an HTML file for later use. IMDetect places high risk to your personal information and network's security.

Posted on November 30, 2007 in Spyware

IMMonitor

IMMonitor is a network surveillance program designed to stealthily steal Yahoo Messenger's communication packets. IMMonitor can either block or record all conversations on a local network. In addition, IMMonitor may save the logged data as an HTML file. IMMonitor is a serious threat to the network on which it is installed.

Posted on November 30, 2007 in Spyware

Spyware.MSNTrackMon

Spyware.MSNTrackMon is a spyware program, created to stealthily log all Windows instant messaging conversations. Spyware.MSNTrackMon may be installed to your system without your knowledge or consent in order to violate your privacy. Spyware.MSNTrackMon is a serious attempt to interfere with your security and privacy and is recommended to be removed immediately.

Posted on November 30, 2007 in Spyware

Trojan.Agent.xtn

Trojan.Agent.xtn is a nasty backdoor Trojan program. Once executed on your machine, Trojan.Agent.xtn provides a remote violator full access to your PC and any information stored on it. Your computer will become a proxy server and will be employed by a remote attacker who may use it for malicious purposes, including remote attacks. Trojan.Agent.xtn is a serious security risk and should be eliminated from your system immediately.

Posted on November 30, 2007 in Trojans

Adware.CPush

Adware.CPush is an unwanted and excessive adware program that installs on your machine as a BHO (Browser Helper Object). Adware.Cpush is designed to bombard your screen with large numbers of popup advertisements. This may disturb your Internet browsing experience and may result your system to perform more sluggish. Adware.CPush is a potentially unwanted and useless program that shouldn't remain on your system.

Posted on November 30, 2007 in Adware

Packer.Malware.NSAnti.J

Packer.Malware.NSAnti.J is a malicious program that employs NSAnti packing method, which is designed to masquerade the true nature of any software packed with it. Malware creators often use this tactic in order to distribute their malicious programs. Packer.Malware.NSAnti.J is not a legitimate or useful program and should be removed immediately.

Posted on November 30, 2007 in Malware

Adware.Baidu

Adware.Baidu is an adware application created to deliver popup advertisements. Adware.Baidu is reported to be installed via Trojan downloaders and through Javascript drive-by downloads. Baidu is related to a search engine of Chinese origin. Adware.Baidu is also capable to collect and send information on your browsing patterns.

Posted on November 30, 2007 in Adware

Adware.Cinmus

Adware.Cinmus is an adware application designed to distribute popup adverts. In addition, Adware.Cinmus will also collect and transmit information on your Internet browsing patterns. It embeds into your browser as a Browser Helper Object (BHO) and can be difficult to manually remove.

Posted on November 30, 2007 in Adware