- Aug 2011
- Jul 2011
- Dec 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- Apr 2003
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Dec 2001
- Oct 2001
- Sep 2001
- Jul 2001
- Jun 2001
- May 2001
- Apr 2001
- Mar 2001
- Nov 2000
- Oct 2000
- Jan 1995
- Jan 1994
W32/Runfer.OA is a worm that will infect Windows systems.
W32/Agent.GMO is a Trojan that will infect Windows systems.
Mal/Bifrose-A is a family of backdoor Trojans.
Linux/Rst-B is a virus that will attempt to infect all ELF executables in the current working directory and the directory /bin.
SWF_Dloader.ZTS is malicious Shockwave Flash (.SWF) object that arrives on a system as a downloaded file from remote sites by JS_AGENT.AINS.
W32/Autorun.worm.cw attempts to copy itself to the root of any accessible disk drive.
HTML_Dldr.BF is HyperText Markup Language (HTML) that may be hosted on a Web site and run when a user accesses the said Web site.
SWF_Dloader.YVM is a malicious Shockwave Flash (.SWF) object that arrives on a system as attachment to email messages spammed by another malware or a malicious user.
SWF_Dloader.YVN is a malicious Shockwave Flash (.SWF) object that may be downloaded by SWF_DLOADER.YVM.
SWF_Dloader.ZHU is a malicious Shockwave Flash (.SWF) object that arrives on a system as a downloaded file from remote sites by JS_AGENT.AINS.
Downloader.Swif.C is a Trojan horse that exploits the Adobe Flash Player SWF File Unspecified Remote Code Execution Vulnerability (BID 29386) in order to download more malware on to the compromised computer.
W32/SillyFDC-AP is a worm for the Windows platform.
W32/Autorun-EL is a worm that when run, copies itself to (System)/sys.vbs and also copies itself to all available drives to the file (Root)/sys.vbs.
Troj/SWFdldr-A is a Trojan that attempts to download and run further code from the internet via a malicious Flash file.
W32/Trafaret.A is a worm that will infect Windows systems.
W32.Emsenush.A is a worm that spreads through Windows instant messaging clients.
Troj/SWFexp-B is a Trojan that exploits a currently unknown vulnerability in Adobe Flash Player to download and run further malware from the internet.
Mal/Dorf-E Trojan is a malicious program.
Troj/Pushdo-K Trojan has been seen being spammed out in emails.
Troj/SWFExp-A is a Trojan that exploits a currently unknown vulnerability in Adobe Flash player to download and run further malware from the internet.
Troj/MancSyn-H is a Trojan for the Windows platform.
Troj/FakeAle-BO claims to detect numerous examples of spyware on the user's computer for which removal costs a one-time fee of $49.95.
Mal/ExpJS-H is a malicious web page intended to exploit client-side vulnerabilities in order to download and execute other malicious content.
W32/Sohanad.BH is a worm that will infect Windows systems and spreads through email.
Trojan.Spryct is a Trojan horse that may download files on to the compromised computer.
Troj/Dwnldr-HDP is a Trojan downloader for the Windows platform.
Troj/Dwnldr-HDO is a Trojan downloader for the Windows platform.
Troj/Bckdr-QNN is a backdoor Trojan for the Windows platform, which allows a remote intruder to gain access and control over the computer.
Troj/Agent-GZH is a Trojan for the Windows platform.
Troj/NtRootK-DM is a rootkit for the Windows platform.
W32/Zlob.NEB is a Windows systems Trojan that upon execution, drops scm.exe in the folder from which the original file is executed.
Troj/Nitfun-A is a Trojan that attempts to download and execute further files.
Troj/Mdrop-BSM is a Trojan for the Windows platform.
Troj/VB-DZS is a Trojan for the Windows platform.
Troj/NtRootK-DN is a rootkit Trojan for the Windows platform.
Troj/Privacy-A reduces the Internet Zone privacy level to low (accept all cookies).
Troj/FakeAle-BL claims to have found security threats.
Troj/NtRootK-DL is a kernel driver Trojan for the Windows platform which attempts to silently sniff network traffic.
Troj/NtRootK-DK is a rootkit Trojan for the Windows platform.
Troj/Mbroot-Gen is a family of Trojan rootkit files, usually seen dropped by members of the Troj/Mbroot or Mal/Sinowa family of malware.
Troj/IRCBot-ABT Trojan runs continuously in the background, providing a backdoor server that allows a remote intruder to gain access and control over the computer via IRC channels.
When first run Troj/Bckdr-QNP Trojan copies itself to System\ntsasvc.exe.
W32/Volume-A worm attempts to create the files on any available drive when run.
W32/VKon-A worm spreads using the social networking site Vkontakte.ru.
W32/Tiotua-Q is a Trojan for the Windows platform.
W32/Agent.LPY is a Windows systems Trojan.
Troj/PSWSys-Gen is a kernel driver that attempts to record keystrokes silently.
Troj/Bckdr-QNO is a Trojan for the Windows platform.
Mal/EncPk-DX is a program packed with a protection system typically used by malware authors.
Troj/FakeAle-BK is a Trojan for the Windows platform.
Troj/NtRootK-DJ is a rootkit Trojan for the Windows platform.
Pws-Gina is a password-stealing Trojan designed to steal the credentials of logged in windows user.
BackDoor-DPE Trojan is known to have been used in an attack involving Whitehouse.org.
Troj/Zbot-S is a Trojan for the Windows platform.
Troj/Bancos-BEB is a Trojan for the Windows platform.
Mal/ObfJS-AP is a script obfuscated in a manner typical of malware.
Mal/Badsrc-B is a malicious web page that has been compromised to load a script from a malicious website.
W32/AntiVirusPro.A.FraudTool is a Trojan that will infect Windows systems.
DisaCKT.B is a worm that carries out several modifications in the Windows Registry, which prevents the user from carrying out the following actions.
When first run Troj/Dorf-BK Trojan copies itself to Windows\herjek.exe.
When first run Troj/Adload-LN Trojan copies itself to Windows\livemessenger.com and creates the file Windows\admintxt.txt, which can be safely deleted.
W32/Baklajan is a parasitic virus that infects Win32 PE executable files.
W32/Small.Nn.Proxy is a Trojan that will infect Windows systems.
Troj/Agent-GZQ when run copies itself to (Profile)\Local Settings\Temp\tru7.tmp.
Mal/EncPk-DU is a file packed with a protection system typically used by malware authors.
W32/Tilebot-KV Trojan runs continuously in the background, providing a backdoor server that allows a remote intruder to gain access and control over the computer.
Troj/IRCBot-ABR is a backdoor Trojan that allows a remote intruder to gain access and control over the computer.
Troj/Banker-ELS Trojan modifies the Windows HOSTS file in order to redirect the user from a genuine online banking site to a phishing site.
Troj/NtRootK-DI is a rootkit Trojan for the Windows platform.
When run Troj/Agent-GYS Trojan drops three files in the Temp folder.
Troj/Agent-GZL is a Trojan for the Windows platform.
W32/Shark.BZP is a Trojan that upon execution drops zlib.dll and mswinsck.ocx in Windows System folder.
Troj/Zapchas-EA is a backdoor IRC Trojan.
Troj_Agent.AORZ Trojan may be installed manually by a user.
Troj_Alureon.AI Trojan is dropped by TROJ_ZLOB.CCW, another Trojan that drops files on the affected system.
Trojan.Cymdos is a Trojan horse that performs denial of service attacks.
W32/Moozye is a worm that attempts to spread to removable drives by creating an Autorun.inf file, which will run the worm automatically, if systems which use the removable drive are set to Autorun.
Troj/Dloadr-BLS Trojan downloads malware when run.
Troj/Agent-GZM when run copies itself to the (System) folder as kd???.exe.
Mal/ObfJS-AO is a script obfuscated in a manner typical of malware.
Mal/Dbot-A is a file with behavioral characteristics typical of backdoor Trojans.
W32/Sohana-AY is a worm for the Windows platform.
Troj/FakeAle-BI is a Trojan for the Windows platform.
Mal/ObfJS-Y is malware for malicious scripts that use obfuscation to load other malicious content.
W32/Sality.n is a parastic virus that infects W32 PE executable files.
Danmec Trojan upon execution will search Google for .asp pages and attempts to compromise websites by launching a SQL injection attack.
W32/Stubbot.worm is a network aware worm that attempts to replicate across existing networks.
W32/Tahun.worm is a network-aware worm that is capable of replicating across existing networks through open network shares and removable storage media.
Trojan.Installscash is a Trojan horse that exploits the Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability (BID 16644) in order to download files on to the compromised computer.
Troj/Agent-GZK attempts to edit websites to promote a target website.
Troj/Psyme-GZ is a Trojan for the Windows platform.
Troj/Zlobar-B detects installation archives containing Zlob Trojans.
Troj/MalDoc-H is a corrupt Excel document containing malicious executable code.
When first run Troj/Dorf-BI Trojan copies itself to Windows\kavir.exe.
Mal/Hupig-E detects behavior associated with known malware.
Generic FakeAlert.a is a Trojan that will silently install Antivirus2008 and run a virus scan on the system.
Mal/Iframe-D is a web page that has been compromised to load malicious content from a remote server.
Spy-Agent.bg Trojan is designed to capture information from the victim machine and send them to the remote site.
Troj/Dloadr-BBA is a Trojan that when run downloads malware.
Troj/Banspy-F is a .net application that steals personal information from Brazilian banking sites.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?