Skip to main content
Skip to main content
1504 entries found. Displaying page 13 of 76.
Updated on Aug 20, 2010

Backdoor:ASP/Aspy.A is a backdoor trojan, written in ASP.Net, that allows unauthorized remote access and control of an affected computer or server.

Alert level: severe
Updated on Oct 01, 2010
Trojan:Win32/Gitwen.A is a trojan that connects to a remote server to send information about the infected computer. It can also receive certain commands from the same server.
Alert level: severe
Updated on Oct 13, 2010
Worm:Win32/Slenping.AE is a worm that can spread via instant messenger programs and removable drives. It also allows a remote attacker backdoor access and control of the infected computer.
Alert level: severe
Updated on Oct 15, 2010
Backdoor:Win32/Bifrose.HM is a trojan that connects to a remote server to allow an attacker to perform backdoor commands.
Alert level: severe
Updated on Nov 14, 2010
Trojan:Win32/Wisp.gen!A is a generic detection for a trojan family that steals system information from the compromised computer, allowing an attacker to gain unauthorized access to the system in order to perform various malicious actions, including downloading and uploading files.
Alert level: severe
Updated on May 27, 2011

Trojan:Win32/Bamital.N is the detection for malware that intercepts web browser traffic and redirects search engine results. It also redirects access to certain websites to the local host.

Alert level: severe
Updated on Jul 08, 2011

Trojan:WinNT/Bancos.G is the detection for a malware driver dropped by members of the Win32/Bancos family. This malware acts as a malicious component that attempts to delete several files related to security from the affected computer.

Alert level: severe
Updated on Sep 28, 2011

TrojanDownloader:MacOS_X/Revir.A is a trojan that downloads other malware onto your computer, such as Backdoor:MacOS_X/Imuler.A (a backdoor trojan that allows a remote attacker to access and control your computer). 

It affects computers using the Mac OS X operating system.

The trojan may appear as a legitimate PDF attachment or link in an email. When you open the attachment or click the link, the trojan will run.

Alert level: severe
Updated on Jan 24, 2012

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Mar 29, 2012

Exploit:MacOS_X/MS09-027.A is a malicious Microsoft Word document that attempts to exploit a known vulnerability in Microsoft Office for Mac. The vulnerability was resolved with the release of Microsoft Security Bulletin MS09-027.

Exploit:MacOS_X/MS09-027.A drops other malware into your computer.

Alert level: severe
Updated on Apr 02, 2012

Backdoor:Win32/Zegost.X is the DLL component of the Zegost malware family. It is usually installed in your computer by other variants of Zegost, such as Backdoor:Win32/Zegost.AD.

Alert level: severe
Updated on Apr 27, 2012

TrojanDownloader:Win32/Beebone.AY is is a trojan that poses as a fake Adobe Flash update. It is reported to spread through links in Skype. It downloads files from a certain server.

Alert level: severe
Updated on Jun 13, 2012

Trojan:BAT/Bancos.B is a trojan that changes your computer's security settings. It is a component used by malware from the Win32/Bancos trojan family.

Alert level: severe
Updated on Nov 20, 2013

Windows Defender detects and removes this threat.

This family of trojans aims to steal financial information, SAP information, BitCoin wallets, and other sensitive information from an infected PC.It can also let a hacker to do other malicious actions on your PC and network.

Alert level: severe
Updated on Aug 06, 2014

Windows Defender detects and removes this threat.

This threat can perform a number of actions of a malicious hacker's choice on your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Oct 09, 2014

Windows Defender detects and removes this threat.

This threat can perform a number of actions of a malicious hacker's choice on your PC.

See the Win32/Chroject family description for more information.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Oct 09, 2014

Windows Defender detects and removes this threat.

This threat uses your PC to perform click fraud. It runs in the background and uses a significant amount of your PC's power and network bandwidth. This can severely impact the performance of your PC, the speed of your Internet connection, and may lead to excess data usage charges from your Internet service provider.

Find out ways that malware can get on your PC

Alert level: severe
Updated on Jan 18, 2016

Microsoft security software detects and removes this threat.

This ransomware can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.

This ransomware might also be downloaded by other malware such as TrojanDownloader:O97M/Donoff as payload.
 
Our ransomware page has more information on this type of threat.
Alert level: severe
Updated on Feb 11, 2016

Windows Defender detects and removes this threat.

This ransomware can be downloaded by other malware such as TrojanDownloader:Win32/Brucryp, or can be installed by a remote user after a successful brute force attack with an RDP Brute tool.

It can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.

Our ransomware page has more information on this type of threat.

Alert level: severe
Updated on Jun 29, 2016

This application was stopped from running on your network because it has a poor reputation. This application can affect the quality of your computing experience. We have seen this leading to the following potentially unwanted behaviors on PCs:

  • Adds files that run at startup

These applications are most commonly software bundlers or installers for applications such as toolbars, adware, or system optimizers.

If you were trying to install an application, you might have downloaded it from a source other than the official product's website.

We usually see this application installed on PCs in the following countries. This list is sorted according to prevalence:

  • Korea
  • United States
  • Japan
  • Canada
  • Australia

This detection is part of our extended Potentially Unwanted Application protection feature.

Alert level: severe