Search
Keyword: browser hijacker
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor queries the default web browser by accessing a registry entry. It then launches a hidden Web browser process (e.g. iexplore.exe) where this malware injects its code for its backdoor routines.This backdoor arrives as an attachment to em...
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user.
It opens the non-malicious URL http://www.irs.gov/pub/irs-pdf/f941.pdf to hide its malicious routines from the user.It registers the downloaded .DLL file as a Browser Helper Object (BHO) by executing a specific command-line.It starts the service Appl...
This malware makes use of <i>Facebook</i> links and blackhat search engine optimization (BHSEO) to lure users into malicious sites hosting this FAKEAV variant.
This malware is one of the FAKEAV variants that target Mac OS...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware may arrive bundled with malware packages as a malware component. It may be manually installed by a user.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
A remote code execution vulnerability exists in the following versions of Java:
Java Development Kit 7 Update 10 and earlier
Java Runtime Environment 7 Update 10 and earlier
The...
This adware may arrive bundled with malware packages as a malware component. It may be manually installed by a user.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.It requires its main component to successful...
There exists a memory corruption vulnerability in Mozilla Foundation?s family of browser products. The flaw is caused by a heap-based buffer overflow when parsing crafted regular expressions. A remo...
Buffer overflow in the IEToolbar.IEContextMenu.1 ActiveX control in LinkedInIEToolbar.dll in the LinkedIn Toolbar 3.0.2.1098 allows remote attackers to execute arbitrary cod...
This joke program may be hosted on a website and run when a user accesses the said website.
Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted H...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.