Search
Keyword: browser hijacker
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware may be dropped by other malware.
This spyware may arrive bundled with malware packages as a malware component.It modifies the user's Internet Explorer home page into a certain website. This action allows the malware to point to a website which may contain malware, putting the affec...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
(MS12-016) Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2651026)

This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework...
This security update addresses a vulnerability in Microsoft .NET Framework. Once a user views a specially crafted Web page via a Web browser that can run XAML Bro...
This Trojan may be hosted on a website and run when a user accesses the said website.
For Trend Micro CustomersScanning your system with your registered Trend Micro security solution removes this malware.Trend Micro products are powered by the Trend Micro™ Smart Protection Network™, a technology designed to protect you from all kinds...
This adware may be manually installed by a user.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This description is based is a compiled analysis of several variants of TROJ_VUNDO. Note that specific data such as file names and registry values may vary for each variant.This Trojan arrives as a file that exports the functions of other malware/gr...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.