Protect your privacy with new targets for May 2011

by Andy on May 24th, 2011 in .

ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Win32.Adware.ArcadeWeb
Win32.Adware.GamePlayLabs
Win32.Adware.PlaySushi

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Bsbot
Win32.Backdoor.Cynic
Win32.Backdoor.Gbod
Win32.Backdoor.Lancontrol
Win32.Backdoor.Pragma
Win32.Backdoor.Xtreme
Win32.Backdoor.Zaccess
Win64.Backdoor.Zaccess

DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Ayegent
Win32.TrojanDownloader.Dapato
Win32.TrojanDownloader.Goglup
Win32.TrojanDownloader.Tamar

PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Odclass
Win32.TrojanPWS.Tepfer

ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

Win32.FraudTool.WindowsActivityInspector
Win32.FraudTool.WindowsAttentionUtility
Win32.FraudTool.WindowsInspectionUtility
Win32.FraudTool.WindowsPrecautionCenter
Win32.FraudTool.WindowsProtectionServant
Win32.FraudTool.WindowsRepairingSystem
Win32.FraudTool.WindowsRestore
Win32.FraudTool.WindowsSafeguardUtility
Win32.FraudTool.WindowsSupervisionCenter
Win32.FraudTool.WindowsSystemTasks
Win32.FraudTool.WindowsTweakingUtility
Win32.FraudTool.WindowsWorkCatalyst

TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Bodrik
Win32.Trojan.Connectionservices
Win32.Trojan.Deliver
Win32.Trojan.Lname
Win32.Trojan.Phorpiex
Win32.Trojan.Spamha
Win32.Trojan.Wsearch

TROJAN.CLICKERS
Trojan.Clickers may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Dotcomtoolbar

TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Smurf

TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Archsms
Win32.TrojanDropper.Dapato
Win32.TrojanDropper.Platma
Win32.TrojanDropper.Spyeyes
   
TROJANPROXIES
Trojan.Proxies may open up the infected machine to be used as a proxy server.

Win32.TrojanProxy.Banker   

TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Ipsiut

WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Ffauto
Win32.P2PWorm.Halfint

MISCELLANEOUS
This grouping contains other programs.


CAJMedia
Win32.Hoax.Bdareader
Win32.Hoax.Expproc
Win32.Hoax.Flashapp
Win32.Hoax.Internetprotection
Win32.Hoax.Securityalert
Win32.Hoax.Smssubscribe
Win32.Hoax.Smupdate
Win32.Hoax.Smwnd
Win32.Toolbar.Zugo

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now