Reviews
-
Recent Threats
Check Out These Sites
Tag Cloud
2009 2010 2011 2012 Advanced Antimalware Antispyware AntiVirus Center Data Defender Fake Firewall Google Guard Home Internet Malware Master Microsoft Personal Protection Protector Recovery redirect Repair Restore Safety Search Security Shield Smart Software Solution Suite System Tool Toolbar Tools Total Trojan Utility Virus Vista Windows
Latest Spyware Removal News
-
APPL/Paleo.A
Virus: APPL/Paleo.A Date discovered: 02/06/2013 Type: Application In the wild: No Reported Infections: Medium to high Distribution Potential: Low Damage Potential: Low Static file: No VDF version: 7.11.82.82 – Sunday, June 2, 2013 IVDF version: 7.11.82.82 – Sunday, June 2, 2013 General Method of propagation: • No own spreading routine Aliases: • Eset: Win32/DomaIQ.I […] -
JS/EXP.Redir.EL.7
Virus: JS/EXP.Redir.EL.7 Date discovered: 16/05/2013 Type: JavaScript In the wild: No Reported Infections: Low Distribution Potential: Low Damage Potential: Low to medium Static file: No VDF version: 7.11.78.218 – Thursday, May 16, 2013 IVDF version: 7.11.78.218 – Thursday, May 16, 2013 General Method of propagation: • No own spreading routine Alias: • Eset: JS/Kryptik.AKT […] -
JS/BlacoleRef.CZ.20
Virus: JS/BlacoleRef.CZ.20 Date discovered: 24/05/2013 Type: JavaScript In the wild: No Reported Infections: Low Distribution Potential: Low Damage Potential: Low to medium Static file: No VDF version: 7.11.79.254 – Friday, May 24, 2013 IVDF version: 7.11.79.254 – Friday, May 24, 2013 General Method of propagation: • No own spreading routine Alias: • Sophos: Troj/Iframe-JH […] -
Trojan.Lapka
summary technical details removal Discovered: May 23, 2013 Updated: May 24, 2013 5:27:30 AM Type: Trojan Infection Length: Varies Systems Affected: Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP Trojan.Lapka is a Trojan horse that opens […] -
Trojan.Zeroaccess!g45
Discovered: May 23, 2013 Updated: May 23, 2013 10:33:17 AM Type: Trojan Systems Affected: Windows 2000, Windows 7, Windows NT, Windows Vista, Windows XP Trojan.Zeroaccess!g45 is a heuristic detection used to detect threats associated with Trojan.Zeroaccess. For more information, please see the following resource: Trojan.Zeroaccess Antivirus Protection Dates Initial Rapid […] -
Trojan.Zeroaccess!g46
Discovered: May 24, 2013 Updated: May 24, 2013 9:57:52 PM Type: Trojan Systems Affected: Windows 2000, Windows 7, Windows NT, Windows Vista, Windows XP Trojan.Zeroaccess!g46 is a heuristic detection used to detect threats associated with Trojan.Zeroaccess. For more information, please see the following resource: Trojan.Zeroaccess Antivirus Protection Dates Initial Rapid […] -
VBS/Autorun.AH
Virus: VBS/Autorun.AH Date discovered: 22/07/2008 Type: Trojan In the wild: No Reported Infections: Low Distribution Potential: Low Damage Potential: Low to medium File size: 6796 Bytes VDF version: 7.00.05.141 IVDF version: 7.00.05.151 – Tuesday, July 22, 2008 General Method of propagation: • No own spreading routine Alias: • Eset: VBS/TrojanDownloader.Agent.NHP Platforms / OS: […] -
Trojan.Shylock.B!gen5
Discovered: May 21, 2013 Updated: May 22, 2013 12:41:57 AM Type: Trojan Systems Affected: Windows 2000, Windows 7, Windows 95, Windows 98, Windows Vista, Windows XP Trojan.Shylock.B!gen5 is a heuristic detection used to detect threats associated with the Trojan.Shylock.B family of threats. For more information, please see the following resource: […] -
Trojan.Zeroaccess!g44
Discovered: May 22, 2013 Updated: May 23, 2013 2:34:17 AM Type: Trojan Systems Affected: Windows 7, Windows NT, Windows Vista, Windows XP Trojan.Zeroaccess!g44 is a heuristic detection used to detect threats associated with Trojan.Zeroaccess. For more information, please see the following resource: Trojan.Zeroaccess Antivirus Protection Dates Initial Rapid Release version […] -
Suspicious.Cloud.9
Suspicious.Cloud.9 is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers.