Trojans - Page 185 category archyve:

Cridex Trojan

Cridex Trojan, also known as Worm:Win32/Cridex.E, may be slipped into the background of any unprotected Windows system. Using spam email attachments, social engineering scams, surreptitious bundled downloads and other clandestine security vulnerabilities, cyber crooks could slip in tens of malicious components, which is what the vicious Trojan is built from. Read more »


Trojan.Ransomlock.R is a computer infection which you may know as FBI MoneyPak or Metropolitan Police Virus and others that are classified as ransomware infections. As the term ransomware implies, the Trojan is designed to obtain computer users’ money. First of all, Trojan locks the computer’s desktop and access to the Internet. Second, it displays a simulated warning supposedly sent by the police or any other regulatory body. Read more »


Trojan.Win32.Agent.azsy is a computer infection name that appears in security notifications sent by Personal Antivirus. Personal Antivirus is a rogue antispyware application that displays false notifications about virus infections. One of these infections that Personal Antivirus warns you about is Trojan.Win32.Agent.azsy. Read more »


IEToolbar, also known as Spyware.IEToolbar, is an Internet Explorer extension which has two ways of getting into the computer’s system. The user can install it him/herself, or it can be downloaded with software and installed automatically without the consent of the user. There are different types of IEToolbar, and all of them carry the same function which is to monitor how computer users browse the Internet and to send the information collected to a third party. Read more »


Imaginary or nonexistent computer threats are one of the main characteristic of bogus security tools and TrojanSPM/LX is one of them. This fake infection is used by such rogue anti-spyware programs as System Tool, Live Security Platinum, System Progressive Protection and other fraudulent tools. The Trojan is presented as extremely hazardous and that it is highly advisable to update or download a full version of a program that can supposedly remove the Trojan in question. Read more »


Virus.Ramnit.I is a destructive computer infection which should be removed without delay, because in the hands of cyber criminals, it can cause a great amount of damage to the PC. The virus can spread through removable devices; it can infect computer files and open doors for remote attackers to manipulate the infected computer and collect sensitive information. Not every anti-virus program Read more » redirect virus redirect virus is a cunning browser hijacker which should be removed immediately in order to restore all of the compromised settings and secure the PC against violent privacy breach. Browser hijackers are able sneak into the system unnoticed, and you may find this particular redirect virus on your PC after installing programs that are downloaded from suspicious websites. Therefore, if you do not want to come across this hijacker again, Read more »


180Solutions.Zango is an annoying piece of adware which is installed in a computer alongside different programs, and which is used to monitor how computer user browser the Internet. As the unwanted program employed by third parties violates one’s privacy, it is highly advisable to remove it from the computer as soon as the intruder is noticed. Read more »


Trojan.Necurs.A is a rootkit infection that may slither into your computer via infected USB drives, spam email attachments, illegal downloads, online advertisements and a number of other infiltration channels. According to the malware research team, these security backdoors are exposed if you do not implement antimalware software, miss critical updates or use illegally acquired tools that are incapable of guarding your PC properly. Read more »


It is really difficult to fight an infection you cannot see. Trojan.Nitol.A is good at hiding itself and inflicting damage on the target system. This Trojan does not differ much from other Trojan infections, making it a rather generic threat. However, that does not mean you should not take Trojan.Nitol.A seriously. In fact, you should perform system scan periodically to make sure you remove Trojan.Nitol.A in the early stages of the infection. Read more »