Trojan.BHO.cs is a Trojan application that propagates via email spam. Trojan.BHO.cs embeds itself on Internet Explorer as Browser Helper Objects (BHO) to observe user's browsing habits. Trojan.BHO.cs may log keystrokes to steal confidential information. In addition, Trojan.BHO.cs will display hundreds of advertisements and redirect your browser to specific web pages based on users browsing habits.

Posted on October 18, 2007 in Trojans


This is a trojan horse program, it is designed to covertly infiltrate your computer and open up a backdoor. If it is successful it will allow a remote hacker to gain full control over your machine and all information stored on it.

Posted on October 18, 2007 in Trojans

Trojan.BHO.d is designed to covertly infect your system (it is usually presented as a Browser Helper Object), generating numerous popup advertisements. Additionally, it will monitor and analyze all websites you visit in order to match the advertisements it displays to your taste. It may also hijack your browser to specific web pages based your browsing habits.

Posted on October 18, 2007 in Trojans


Trojan.Rbot-BBQ is a Trojan designed to open up a backdoor on the computer it infects allowing access to malicious individuals. Additionally the Trojan downloads even more malware onto the victim machine. All-in-all the Trojan can cause both leaks of sensitive information to remote hackers and serious system instability or failures.

Posted on October 18, 2007 in Trojans

ICQ Boom

ICQ Boom is AOL spyware that exploits the security vulnerabilitiesof AOL, aiming ICQ hacks and DoS attacks at AOL users. ICQ Boom is also known to steal passwords and personal information data pertaining to AOL users and their messenger accounts (AIM).

Posted on October 18, 2007 in AOL Parasites


Spector is a keylogger which monitors the user's keystrokes without the user's knowledge or consent. By monitoring the user's keystrokes, the attacker has access to the user's online activity which includes sensitive personal information such as passwords, credit card numbers, bank account numbers, emails, chat room conversations and websites visited. Spector stores the logs in "%SystemDir%\netext\".

Posted on October 15, 2007 in Keyloggers

Adware Spyware Be Gone, XPAntiVirus, WebSpyShield, more - SpyHunter Update v.6.62

SpyHunter Spyware Definitions Update: v.6.62 (10/12/2007) SpyHunter Latest Program Update: v.2.9.5018 Keep Your SpyHunter Up to Date New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update. Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner. Newly Added Threat List The following new parasites have been added to SpyHunter: Updated Threat List The following parasite threats were updated: Trojan.Tibs Worm.Zhelatin.GQ Vixup.Trojan Trojan.Dropper-Delf Trojan-PSW.OnLineGames.vm...

Posted on October 12, 2007 in Database Updates

Adware Spyware Be Gone

This is a fake spyware removal application aimed at tricking the user into purchacing its payed version by repeatedly generating false system security alerts. The program is usually downloaded onto the victim machine by a trojan.

Posted on October 12, 2007 in Rogue Anti-Spyware Program

XP Antivirus

XP Antivirus screenshot

XP Antivirus is a corrupt anti-spyware application that may infiltrate your computer with the help of a Trojan via browser security loopholes. Once installed, XP Antivirus will perform a deceitful scan that will result in fake threat notifications. The notifications that XP Antivirus displays are false and are used by malicious hackers to profit from credible computer users. Exaggerated threat reports are meant to scare you into purchasing the full version of the program, which is also a fraud and cannot perform duties of a credible anti-spyware application. You should remove XP Antivirus from your system with no hesitation.

Posted on October 12, 2007 in Rogue Anti-Spyware Program


WebSpyShield screenshot

WebSpyShield is a rogue anti-spyware application that creates a browser toolbar and fake security warnings. It can be downloaded by other Trojans and/or browser security exploits. Also, when browsing the internet, you will be redirected to the WebSpyShield homepage.

Posted on October 12, 2007 in Rogue Anti-Spyware Program


This is a virus designed to propagate via open network shares. After an infected file is launched on the victim machine the virus scans the hard drive and infects all .exe files it comes across. Moreover, the virus may infect your computer with additional spyware or adware.

Posted on October 12, 2007 in Viruses


Email-Worm.Zafi is worm designed to spread via p2p networks and emails. Once run on your computer the worm opens a backdoor that allows a remote malicious individual to connect to you computer and gather up your personal information.

Posted on October 12, 2007 in Worms


Email-Worm.Erkez.F is a mass-mailing worm designed to spread through computer networks by exploiting security holes on machines connected to the Internet. Once it is executed on your machine, Email-Worm.Erkez.F will continue to propagate itself by sending its copies to email addresses gathered from your PC. Occasionally Email-Worm.Erkez.F may download additional malware onto your computer. In addition, Email-Worm.Erkez.F may cause a sluggish performance of your computer. It is recommended to remove Email-Worm.Erkez.F from your machine as soon as possible.

Posted on October 12, 2007 in Worms


Email-Worm.Erkez.D is an e-mail worm that is capable of self-replication. It can be caught when opening suspicious e-mails, downloading unknown e-mail attachments or using internet file sharing networks. Email-Worm.Erkez.D may change security settings, disable firewalls and even stop antivirus software from working. Your computer may also be remotely hijacked when infected with Email-Worm.Erkez.D, allowing someone else to control various processes of the machine. Email-Worm.Erkez.D is a very high risk parasite to any personal or financial information.

Posted on October 12, 2007 in Worms is a Trojan designed to acquire any stored login or password information. It is known to steal online gaming accounts as well as financial information. then sends the stolen content to a remote server.

Posted on October 12, 2007 in Trojans