Keyword: yahoo
830 Total Search   |   Showing Results : 281 - 300
This malware family takes its name from the SIMDA botnet operations, which was taken down in April 2015. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/177201225511.jpeg What do the sites LinkedIn , eHarmony , last.fm , League of Legends , and Yahoo! have in common? All of these websites suffered
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm attempts to steal user credentials, such as user names and passwords, that are related to online games. It does this by monitoring processes/services in the memory that contains certain
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
It monitors specific URLs. If users access these monitored sites, they are redirected by this malware to specific malicious sites. This Trojan may be dropped by other malware. Arrival Details This
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following files: %Program Files%\pdfforge Toolbar
This backdoor makes the affected machine use fake DNS servers. This causes users to be redirected to malicious sites without their consent. It uses certain DNS server addresses. Once the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the affected system's HOSTS files. This
This Trojan connects to a website to send and receive information. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks
This Trojan may be downloaded from remote sites by other malware. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This File infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and