Keyword: yahoo
300 Total Search   |   Showing Results : 261 - 280
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor monitors the browsing activities of the user and logs keystroke when the user is accessing sites with certain strings.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users whe...
This worm arrives via removable drives.It uses the default Windows folder icon to trick users into opening the file. Double-clicking the file executes this malware.It drops copies of itself in removable drives. These dropped copies use the names of ...
This malware is a component of another malware.It attaches itself to certain processes.It monitors the browsing activities of the user.It exectures certain commands from a remote malicious user.This backdoor may arrive bundled with malware packages ...
This backdoor arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It arrives as a component bundled with malware/grayware packages.It may be injected into processes running in memory.It require...
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites.It executes then deletes itself afterward.It modifies registry entries to hide files with System and Read-only attributes.It drops an AU...
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible.It ...
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It drops copies of itself in removable drives. These dropped copies use the names of the fo...
It sends messages that contain links to sites hosting remote copies of itself using the instant messaging (IM) applications Google Talk, Yahoo! Messenger, ICQ, Live Messenger, PalTalk, Skype and XFire.It also drops a copy of itself in the folder crea...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself in removable drives. These dropped copies use the names of the folders located on t...
Contrary to its name, one-click billing fraud takes more than just one click. Fraudsters trick users into downloading malware disguised as a program that will let them view adult videos onto their systems. Instead of le...
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to Internet Relay Chat (IRC)...
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses Windows Task Scheduler to create a sc...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.