SunshineSpy

SunshineSpy screenshot

SunshineSpy is a rogue anti-spyware application. It is aimed at tricking the user into believing that his or her system is infected with spyware. This is accomplished by presenting the user with a number of fake security alerts, pop-ups and desktop wallpaper swaps. The reason for this masquerade is persuading the user to buy the full version which will allegedly cure the system.

Posted on October 30, 2007 in Rogue Anti-Spyware Program

AdwareCops

AdwareCops screenshot

AdwareCops is also known as BPS AntiSpyware Remover. It is classified as rogue anti-spyware application. In most cases it is secretly downloaded to your computer by a resident trojan or thru a security hole of your browser. The program then begins presenting the user with numerous fake security alerts in its attempt to persuade him or her to purchase the paid version of the program.

Posted on October 30, 2007 in Rogue Anti-Spyware Program

Scan and Repair Utilities 2007

Scan and Repair Utilities 2007 screenshot

Scan & Repair Utilities 2007 is a fake spyware removal tool that is designed to get into the computer through browser security exploits, Trojans, or under dubious circumstances without your knowledge and consent. Once it is executed, Scan & Repair Utilities 2007 will irritate you with fake warning messages claiming that your system security is in serious danger. This is the manner how Scan & Repair Utilities 2007 attempts to trick users into purchasing its full commercial version. In addition, Scan & Repair Utilities 2007 may be distributed as a spam via Skype messenger.

Posted on October 30, 2007 in Rogue Anti-Spyware Program

Worm.Storm

Worm.Storm is a Trojan application that secretly gets into the system and turns it into a proxy. This allows the remote attacker to get full control over your computer and perform various malicious activities. For instance, after infecting your PC with Worm.Storm the hacker may use your computer for relaying spam emails and perform attacks on remote Internet hosts. In addition, Worm.Storm opens up a huge security hole on your browser and this places any financial or banking information stored on your computer in severe jeopardy and represents a serious security risk.

Posted on October 30, 2007 in Worms

Trojan.Zapchast

Trojan.Zapchast is a Trojan designed to hijack and infect your PC and steal personal information. Trojan.Zapchast may open a backdoor through which a remote attacker can break into your computer or use it for malicious reasons, including sending spam emails via your PC or launching attacks on remote computers. In addition, Trojan.Zapchast places any financial or banking information stored on your computer in severe jeopardy and represents a serious security risk.

Posted on October 30, 2007 in Trojans

Keylogger.MGShadow

Keylogger.MGShadow screenshot

Keylogger.MGShadow is a spyware application designed to record all activity on your computer. Once executed, Keylogger.MGShadow will log all your keystrokes, your surfing habits, conversations and even email messages that you get. Moreover, it may be configured to take screenshots regularly. Keylogger.MGShadow collects all the data and sends it to a remote attacker. Keylogger.MGShadow places any financial or banking information stored on your computer in severe jeopardy and represents a serious security risk.

Posted on October 30, 2007 in Keyloggers

Trojan-Downloader.VB.ajz

Trojan-Downloader.VB.ajz is a malicious Trojan application that installs onto your PC without your knowledge and permission. Once it is installed, Trojan-Downloader.VB.ajz will open a large security hole on your machine through which other malicious applications can be installed. This parasite can inject itself into system processes via rootkit techniques. Trojan-Downloader.VB.ajz is a serious threat to your PC and should be removed without delay.

Posted on October 30, 2007 in Trojan Downloader

Backdoor.Hupigon.mqe

Backdoor.Hupigon.mqe is a backdoor Trojan designed to get into your computer through browser security holes or via other illicit and unethical mechanisms. Once executed, Backdoor.Hupigon.mqe will give the remote attacker a full control over your machine and all the data stored on it. Usually Backdoor.Hupigon.mqe allows the hacker to use your computer for various malicious purposes, including sending spam email or attacking other remote computers via your PC. In addition, Backdoor.Hupigon.mqe poses a serious security risk for your personal and financial information and it is recommended to remove it from your machine without delay.

Posted on October 30, 2007 in Backdoors

BPS Remover

BPS Remover screenshot

BPS Remover is a fake anti-spyware program that is often downloaded and installed by a Trojan, through browser security exploits, or via other illicit mechanisms. Once it is installed, BPS Remover will show notifications of imaginary security and privacy risks in its attempts to trick the user into purchasing the commercial version of the program. Do not buy it because BPS Remover program is not going to clean your computer from spyware but might actually expose you to more security threats.

Posted on October 30, 2007 in Rogue Anti-Spyware Program

Trojan.Small.AL

Trojan.Small.AL is a Trojan application created to hijack and infect your PC and to open a security hole as well, so additional malicious software programs can be imported to your computer. Trojan.Small.AL is a real danger to your personal and financial data, because it steals your personal information and passwords and sends it to the third parties. In addition, Trojan.Small.AL may produce numerous annoying and intrusive popup adverts and may also affect the stability of your system.

Posted on October 30, 2007 in Trojans

Backdoor.Beastdoor.206.a

Backdoor.Beastdoor.206.a is a backdoor Trojan that is a serious threat to your sensitive information stored onto your computer. Usually Backdoor.Beastdoor.206.a infiltrates computer systems with the help of browser security exploits and other unethical mechanisms. Once it is installed, Backdoor.Beastdoor.206.a will give the remote attackers full access to your machine and allow them to steal your personal data. Backdoor.Beastdoor.206.a is a serious security danger and should be removed from your computer as soon as possible.

Posted on October 30, 2007 in Backdoors

Backdoor.Prorat.h

Backdoor.Prorat.h is a nasty backdoor Trojan designed to creep into the system through browser security exploits or under dubious circumstances without your knowledge and consent. Once it is installed, Backdoor.Prorat.h will open up a huge security loophole on your machine through which a remote attacker will get a full control over your PC. Backdoor.Prorat.h is a severe violation of your privacy and the safety of your personal and financial data, including banking information and credit card numbers.

Posted on October 30, 2007 in Backdoors

Backdoor.Satan

Backdoor.Satan is malicious backdoor Trojan that is created to hijack your computer and provide a remote attacker with a full access to your machine. Once it is installed, Backdoor.Satan will open up a huge security loophole through which the hacker will be able to control your machine and steal all the personal and financial information stored onto your PC. Backdoor.Satan is a serious danger to the security of your sensitive information and we recommend to remove it immediately.

Posted on October 30, 2007 in Backdoors

Backdoor.WinCrash.a

Backdoor.WinCrash.a is a Trojan Backdoor application which creeps into your PC through browser security exploits without your knowledge and consent. Once executed, Backdoor.WinCrash.a will allow the remote attacker to connect to your machine and gain full control over it. Then the hacker is able to steal or destroy your sensitive data stored onto your PC. Backdoor.WinCrash.a poses a serious security threat to your personal and financial information and should be removed without delay.

Posted on October 30, 2007 in Backdoors

Trojan.Gromp.b

Trojan.Gromp.b is a trojan horse program, once launched on your computer it will use its rootkit features to further infect your system. Afterwards it will open up a backdoor, thru which a number of other malicious applications may be downloaded onto your pc. This program is considered a high level threat and is to be removed immediately.

Posted on October 30, 2007 in Trojans