Author Archives: Lisa Blanc - Page 366

backdoor.matsnu.b

backdoor.matsnu.b is a backdoor Trojan that was first discovered in April 2013. It is also known as Trojan.Ransomlock.P and it allows one to conclude that backdoor.matsnu.b is one of the components that are responsible for infecting your computer with ransomware programs. This backdoor can affect systems that run on almost all versions of Windows operating system, except for Windows 8. Although the backdoor is not directly related to ransomware infection, it may open a backdoor on the target computer that allows other malicious programs to enter it. Hence, backdoor.matsnu.b could be used by a number of computer threats to enter the PC. Read more »

Say Hello To Little Virus Brings a Lot of Problems Virus

If you have been introduced to the Say Hello To Little Virus Brings a Lot of Problems Virus alert, there is no doubt that your operating Windows system is infected with the malicious Trojan:Win32/Harasom.A. Unfortunately, the clandestine threat could have entered your personal system weeks ago without any of your consent through freeware, spam email attachments and other similar security backdoors. It is likely that during this time cyber criminals behind the Trojan will infiltrate as many malicious programs as possible. Read more »

Macromedia.exe

It may seem that Macromedia.exe is an executable file related to Macromedia flash application. However, the truth is that this file is a CPU miner that generates Bitcoins. Therefore, the file is classified as potentially dangerous application, and it is in your best interest to remove Macromedia.exe from your computer as soon as possible. Although the Bitcoin miner itself does not pose great threat to your system, it can connect to the internet behind your back and download more malware onto your computer. It is possible for Macromedia.exe to download spyware and Trojan infections onto your system, which only adds up to a list of reasons why you should terminate the file. Read more »

Trojan.Dusok.A

Trojan.Dusok.A is a dangerous computer infection which can get to the computer through phishing websites, spam emails, drive-by downloads, and other ways of social engineering. As the threat can be installed disguised as a driver or some other important system component, it is categorized as a Trojan horse. The term Trojan.Dusok.A can stand for an unlimited number of computer infections which can be called generic detections. If you have been informed by your anti-virus program that this threat is on your PC, do not wait and remove it. Read more »

Bing Redirect Virus

Bing Redirect Virus is a malicious computer infection which may slither onto your operating Windows system without any of your knowledge. Cyber criminals behind the threat may utilize spam email attachments, bundled downloads, fake video codecs, deceitful advertising, active Trojans and other security cracks to drop the malignant program onto the PC without alarming you. According to Anti-Spyware-101.com researchers, this is highly dangerous. Schemers could hide the infection within your personal computer for days or even weeks before an attack is initiated. Unfortunately, during this time it is likely that your operating system would get even more infected. Is this what you want? Of course, it is not, which is why it is absolutely necessary that you remove Bing Redirect Virus as soon as you detect it running on the system. Do you know how to delete it from the PC? Continue reading to find out. Read more »

King Translate

King Translate

King Translate is a computer application which sometimes is considered as a browser hijacker. This preconceived notion is not correct, and it is unfair to call the program malicious. Anti-Spyware-101.com spyware experts have discovered that when installing this translation tool onto the computer you are given an option to change your home page and the default search engine. Read more »

Value Apps

Have you discovered Value Apps pop-ups whenever you surf the web using your Internet Explorer, Mozilla Firefox and Google Chrome browsers? Well, have you recently installed such Conduit Ltd browser plugins as Iminent Comunity Toolbar, WiseConvert Toolbar, Z-game Toolbar, Internet Turbo Toolbar, Swagbucks Toolbar or Coupon Buddy? Anti-Spyware-101.com spyware researchers have discovered that this potentially unwanted program exposing you to irritating pop-ups may be bundled with various extensions. Of course, in most cases, if you download software from official, trusted sources, you are introduced to the additional program and you are given the chance to deny its installation. Therefore, it is not necessary to treat this browser add-on as malicious. Nevertheless, if you do not know where the application came from, or you simply want to remove Value Apps from the browsers – follow the information provided in this article. Read more »

Trojan Horse PSW.OnlineGames4.ALGT

If the malicious Trojan Horse PSW.OnlineGames4.ALGT has taken over your personal computer, you and your virtual security are in big trouble. The malicious Trojan may corrupt Windows utilities and employ your own computer to attack other systems with spyware. If you do not want to be involved with cyber crime, you definitely need to remove the clandestine threat as soon as possible. Have you already discovered it running on the operating Windows system? In reality, the malicious Trojan could be active on the PC even if you think that the computer is running normally. Anti-Spyware-101.com researchers have discovered that the Trojan does not have an interface and its malignant processes are hidden from detection and removal. So, how should you delete Trojan Horse PSW.OnlineGames4.ALGT? Please continue reading to learn everything about the removal of this threat. Read more »

Genieo

Genieo

The Genieo browser hijacker is a malicious computer threat which should be deleted from the computer without any delay. Even though the clandestine threat is represented through a seemingly authentic search engine, you should not leave it running on the personal computer for another moment. And how can you discover a clandestine hijacker? According to Anti-Spyware-101.com experts, most web browser hijackers enter the targeted computer without prior warnings or authorization. In most cases, schemers utilize attractive freeware to slip in the devious threat; however, it is also possible that the program has been dropped by a malicious Trojan which is actively running on your PC right this moment. Of course, we recommend that you delete Genieo from the operating Windows system. Read more »

Trojan Horse Generic32.CCGO

Trojan Horse Generic32.CCGO is a dangerous computer infection which refers to a variety of malicious files and processes that are aimed at corrupting your privacy. Not all anti-virus programs are capable of removing this threat, so if your computer security program has only detected Trojan Horse Generic32.CCGO but cannot remove it, use a reliable spyware removal tool to delete the threat and protect the computer. Read more »