Downloader.Chepvil

Downloader.Chepvil

Downloader.Chepvil is a dangerous Trojan that when executed will connect to a remote server and download more threats.  It was found that Downloader.Chepvil is closely related to the other threats like Trojan.Milicenso, Trojan.Sasfis and Trojan.FakeAV. The Trojan is capable of modifying system files and registry entries that it needed to completely overrun the affected computer. More

Security Defense

Security Defense

Security Defense is a security application that, in all aspect is not capable of protecting the computer against viruses. Therefore, it is rogue software. Security Defense is so aggressive that it can break into someone’s PC in a variety of ways. To fulfill its very own objective of ruling the system, it pushes infection into Windows registry and adds some changes. Technically, this process makes things uncomplicated for the rogue program to control the operation of your machine as system runs. It will be impossible to track virus’ moves specifically if antivirus is disabled.  Many other malicious files are set to be fetch from different servers that will help expand the damages Security Defense can cause. More

PC Security Pro

PC Security Pro

PC Security Pro is a rogue program that may give users a range of computer problems. It is a mimic of Personal Security Pro. Not only that these viruses will come uninvited but also it will sneak in various ways. There are instances that it pretends to be an online virus scanner which detects PC viruses and let you download PC Security Pro as a tool for fixing. On the other hand, instead of working to clean viruses, it installs itself on system and prolonged its stay. It will not provide uninstall information. More

My Shield Security

My Shield Security

My Shield Security is a malicious application that puts computer in trouble. It is fake security software that clearly shows the same quality as its previous version called My Security Shield. Typically, this type of program does not require physical installation. It will not even ask for user’s approval before loading itself on to the system. My Shield Security was designed to download and install on itself with the help of malicious web sites. It employs a drive-by-download process to infect computers who visited web sites put up for the sole purpose of spreading My Shield Security. Not only that rogue authors are creating specific web sites, other legitimate and known web site are also serving the same purpose if the same Trojan invaded it. My Shield Security aims at these web sites simply because they want Internet users to catch the virus in unexpected way. More

Boot.Mebromi

Boot.Mebromi is a detection for Master Boot Record (MBR) that is compromised by Trojan.Mebroni. Since MBR is section of hard drive used primarily to execute start up operation of the system, virus developers constantly target it. This way, they can easily launch an instance of Trojan operation without making serious changes on the operating system. More

Trojan.Mebromi

Trojan.Mebromi is a boot-up Trojan that may infect Basic Input and Output Settings (BIOS) and Master Boot Record of the affected computer. Trojan.Mebromi also downloads and executes other malicious files on to the infected system. The Trojan also infects Windows login subsystem to serve own malicious purpose. Upon infection, it causes system instability and reduces overall performance after making changes to Master Boot Record. More

OpenCloud Security

OpenCloud Security

OpenCloud Security belongs to a group of fake computer security product. Obviously, this bogus program is a mimic of OpenCloud Antivirus. These programs will deceive computer user with the issuance of fake alerts and messages once it gains access on the system. These alerts may serve as a ploy to persuade victims into obtaining what it calls full working version of OpenCloud Security. Nevertheless, believing what it projects will lead to needless acquisition of the fake program. More

System Recovery

System Recovery

System Recovery is a virus in disguise. More often than not, System Recovery is mistakenly accepted as useful utility software. Without any knowledge that it was solely developed to be sold in fraudulent method, most users who bump onto this rogue software may end up searching for registration code. Some even consume the useless product for a certain amount of money believing that System Recovery will resolve issues detected by the same malware on their machine. More

W32.Morto

W32.Morto

W32.Morto spreads by utilizing a Remote Desktop Protocol. Worm W32.Morto embeds several encrypted codes into system registry as part of its a payload. It also replaces various DLL with its own code. It was discovered that this worm may download malicious executable files from a remote location to function as backdoor that allows it to gain unauthorized remote access. More

Master Utilities

Master Utilities

Fake hard drive optimization group of rogue programs have released its opening variant for the month of September 2011. The malware is called Master Utilities virus. This unwanted software shows same graphical user interface copied from its previous versions. It also offers same functions that aim to mislead computer users. Some of the ineffective features are the following: More