SpySheriff is a fraudulent anti-spyware application that is designed by devious hackers to profit from credible computer users. SpySheriff may be brought into your computer by a Trojan through browser security cracks, or may be downloaded directly from www.spysheriff.com. SpySheriff has the ability to generate false warning messages that appear in your taskbar. These fake messages are produced after a "scan" that SpySheriff emulates to raise its credibility. After SpySheriff "detects" parasites on your computer, it will continuously offer you to purchase the full version of the program, in order to dispose of the non-existent threats. Immediate removal of SpySheriff is strongly recommended.

Posted on June 24, 2005 in Rogue Anti-Spyware Program


SmitFraud (also known as W32/SmitFraud.A) is a malicious spyware application that may install itself secretly via adware. SmitFraud may also be brought into your computer bundled with a fake codec (that may include the following: BrainCodec, VideoKeyCodec or PCodec). SmitFraud is designed to inject a corrupt code in Windows DLL that usually results in Blue Screen of Death (a nasty desktop modification). SmitFraud may also generate misleading warning messages, in order to scare gullible computer users into buying fraudulent anti-spyware applications. It is strongly recommended to dispose of SmitFraud as soon as possible.

Posted on April 28, 2005 in Trojans


Zlob is a kind of malicious software known as a Trojan horse. This is a kind of attacker that exploits vulnerabilities in a computer to wreak havoc. The first time the Zlob Trojan was identified was in the last months of 2005. Since the middle of 2006, this Trojan has gained considerable attention from computer security experts.   Who Created the Zlob Trojan? The Zlob Trojan is thought to have been created by hackers in the Russian Federation. It is still not known exactly who created the Zlob Trojan, but it has been used in many of the criminal activities of the Russian Business Network. This is a shadowy criminal organization dedicated to providing hosting for criminal activities, child pornography, and distributing harmful malware.   How Does the Zlob Trojan Get into a Computer? Like many Trojans, the Zlob Trojan is often disguised...

Posted on April 25, 2005 in Trojans


RelevantKnowledge screenshot

RelevantKnowledge is software that exists in a moral grey area. RelevantKnowledge is widely considered spyware, because RelevantKnowledge will collect huge amounts of information about your Internet usage, and then use that information to put together even more information about you. That information is then sold, anonymously, either individually or as part of aggregate data. Given the way that RelevantKnowledge is installed on most computers, it is unlikely that most of those users are fully aware of the facts about RelevantKnowledge. What RelevantKnowledge is, and Where it Comes From RelevantKnowledge is a product of the company MarketScore, formerly called Netsetter. MarketScore...

Posted on April 8, 2005 in Adware


Hack99 is a Trojan keylogger that monitors and records every keystroke the user makes in order to capture usernames and passwords for online accounts. Once this information is acquired, it is sent to a remote unauthorized user. Hack99 is typically disguised as a computer game and downloaded manually this way.

Posted on April 5, 2005 in Keyloggers


FamilyKeyLogger screenshot

Keylooger.FamilyKeyLogger is a program that is able to record keystrokes and computer activity. Internet activity can be recorded and used to access a computer user’s online banking accounts or gain entry to steal other personal information. Ultimately, Keylooger.FamilyKeyLogger can lead to identity theft.

Posted on March 29, 2005 in Keyloggers


DoubleClick is an online business that is affiliated with Google. However, many PC security researchers and organizations consider their HTTP cookies as spyware since they can track a computer user's online activity and record any advertisements that are viewed on that Internet browser. In fact, many anti-malware programs remove or block the DoubleClick tracking cookie. It does not help matters that the DoubleClick opt-out option is not a solution. Security analysts have found that opting out of the DoubleClick tracking cookie does not eliminate tracking based on the computer users' IP address. There was also a period when criminals took advantage of DoubleClick and MSN in order to deliver malware through a security exploit. An Overview of the DoubleClick Tracking Cookie While DoubleClick has the capacity to monitor your online...

Posted on March 26, 2005 in Cookies


Advertising (also known as Advertising.com) is a tracking cookie that monitors a user's Internet activity and gathers their personal information as they surf the web. This information may be retrieved by the parent company, without informed consent, leading to identity theft and privacy concerns.

Posted on March 25, 2005 in Cookies

We No Longer Provide Support or Updates for the SpyHunter v.1 Series

The producers of adware and spyware have increased their technology, making their software substantially more difficult to remove. Due to the complexity of new adware and spyware, the challenge of removing these parasites has also become more costly. Because of this, SpyHunter 1 has become obsolete. As of March 10th 2005, we no longer provide support or updates for the SpyHunter v.1 series. All customers of Enigma that have purchased any of the SpyHunter v.1 series will be given a free fully functioning version of SpyHunter v.2.0 with a license that will be valid until June 10th 2005. SpyHunter v.2 is an entirely new product which utilizes the latest technology to deal with today's threats. In addition to enhanced technology to remove these threats, SpyHunter v.2 contains an interactive support system where our technicians can easily...

Posted on February 15, 2005 in Announcements


A Trojan.Dropper is designed to deliver a payload onto the victim's computer system. However, a Trojan.Dropper will usually lead a large-scale attack, usually not the end infection itself. Typically, one of the main goals of computer criminals is to find ways to install malware onto their victim's computer without alerting the victim of the intrusion. A Trojan.Dropper is a typical method that is quite common. Typically, a Trojan.Dropper contains a malware infection within itself which is designed to deliver the infection by copying it onto the victim's computer's file system. A Trojan.Dropper will usually install and execute the malware installed and then will often delete itself or simply remain harmless on the victim's computer system. A Trojan.Dropper will usually be confusing to the victim, and designed to cause no symptoms. A...

Posted on February 3, 2005 in Trojans

SpyHunter Version 2.0 Released

We have released version 2.0 of the SpyHunter Remover to the public! SpyHunter v.2.0 is an entirely new product which utilizes the latest technology to deal with today's threats. In addition to enhanced technology to remove these threats, SpyHunter v.2.0 contains an interactive support system where our technicians can easily look directly at your machine and fix your specific adware and spyware problems. If you are an existing customer, you have received an email explaining how to download and install the upgrade. If you HAVE NOT received instructions from us, please login to our support section, and supply us with your email address to request instructions for the upgrade. The following changes have been made since the previous commercial release of SpyHunter (v.1.5.81): New Features on SpyHunter v.2.0: Added Program Update Alert...

Posted on January 18, 2005 in Product Releases

Are You Having Problems Downloading SpyHunter?

Several people have had difficulties downloading the full version. If you receive some sort of message from Windows stating that the full version installation file is NOT A VALID WIN32 RESOURCE, or something similar, or if ANOTHER PROGRAM attempts to open the file, please follow the instructions in this post carefully to download the full version! Spyhunter Alternate Download Instructions Try these instructions (while SpyHunter is CLOSED) and see if they work for you. Also, when you run the installer for the full version, make sure that ALL SPYHUNTER WINDOWS ARE CLOSED! Click on the following link (or paste it into your browser): http://www.enigmasoftwaregroup.com/Spyhunter_secure_download/spyhunterFULL.exe You will be prompted for a username and password. When prompted, enter your email address as the username, and whatever password...

Posted on January 6, 2005 in Product FAQ

Installing SpyHunter

After clicking either on the Download button (for Paid Users) or on the Scanner Link, follow the instructions below: Please NOTE that if you are downloading the Full Version of the Spy Hunter Program, the name of the file will be "SpyHunterFull.exe", instead of "SpyHunterS.exe". Save your Download: Save it on your Desktop: Find the "SpyhunterFull.exe" Installer file, if you are installing the Full Version or "SpyhunterS.exe" Installer file, if you are installing the Spyware Scanner (it is recommended to download the file onto your Desktop). If you cannot find the file, click the START button and click on Find or Search. Type in "spyhunter" and click on Search. When you find the file with an icon of a computer and a disc, double click on that file. The Install icon: Double click on the installation file and you will be prompted with a...

Posted on May 3, 2004 in Documentation