Keyword: yahoo
300 Total Search   |   Showing Results : 281 - 300
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically...
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites.It drops copies of itself into all the removable drives connected to an affected system.It deletes it...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts the log files that contain the information it gathers.
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It uses the default Windows folder icon to trick users into opening the file. Double-clicki...
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
This Trojan arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This backdoor arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites.It is a component of other malware. It may be injected into processes running in memory.It requ...
This backdoor arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites.It is a component of other malware. It may be injected into processes running in memory.It exec...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself in all removable drives. It drops an AUTORUN.INF f...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the downloaded files. As a result, malicious routines of the dow...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself in removable drives. These dropped copies use the ...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks.This Trojan changes the DNS settings of the affected system. As a result, connectio...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It terminates itself if it detects it is being run in a virtual environment.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It terminates itself if it detects it is being run in a virtual environment.
This worm arrives via removable drives.It executes commands from a remote malicious user, effectively compromising the affected system.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts the log files that contain the information it gathers.
This worm arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the default Windows folder icon to trick users into...