IE Antivirus 3.2
It would seem as though the developers of hotly detested File Secure and Malware Bell have been hard at work developing and distributing their latest malicious rogueware, IE Antivirus 3.2. This rogue antispyware application is distributed via fake online malware scanners, and by bundling its Trojans and malware together with other third party downloads. It is also majorly distributed through a Trojan installed on the PC as an Internet Explorer browser helper object (BHO). ...
VirusHeat
It has become increasingly more difficult to distinguish between genuine security tools and rubbish rogue applications like VirusHeat. This seditious rogue antispyware tool is hosted in the Ukrain, and its developers claim that they have been working on this rogue since 2000. They also claim that their rubbish application will protect users’ PCs against threats and infections, and that it will remove any malware and spyware from the system. This is simply untrue. VirusHeat is simply a clone of VirusHeat 4.4, which also emanates from the same family of rogues as SpyDawn. ...
Video ActiveX Codec
Video ActiveX Codec is a fake video codec, which brings along different malware pieces upon its installation.
In most cases, Video ActiveX Codec advert is displayed when you cannot open a video. The ad states that you should download the codec in order to be able to view the video. Such suspicious downloads are one of the well-known ways for promoting fake anti-virus programs. The case with Video ActiveX Codec is very similar – in fact, it is not a codec, but a very malicious Trojan. ...
MalWarrior
MalWarrior or Mal Warrior 2007 is a rogue anti-spyware tool designed to deceive computer users into purchasing the licensed version of this bogus program. Security researches found MalWarrior to be completely useless in regarding computer protection. Once you find this evil piece of software on your machine, you should take all actions to remove it immediately. ...
Antispyware Shield
As computer threats which are transferred online are becoming more and more dangerous for the safety of PC users` personal and financial information, people need to know that sometimes programs that seem to be absolutely reliable are, in fact, deceitful creations of cyber criminals. This is the case with the fake AV application Antispyware Shield. ...
SearchAndDestroy
The only thing that SearchandDestroy searches for is your money. Moreover, this malware does not destroy anything that is supposedly found. How is this possible? SeachandDestroy is design for credulous Internet users’ deception. It gets into the system and pretends to scan and detect fake infections which, according to the simulated application, can be deleted with registered software. ...
SwiftCleaner
SwiftCleaner is not the kind of program you would like to be operating on your computer. Despite hackers' attempts to make it look a legitimate anti-virus software, it is nothing more but a scam.
The fraudulent program exploits vulnerabilities found in the targeted computers in order to enter them. Most vulnerabilities exist because of the fact that users do not keep their software updated. ...
iSnake Pro
There are different ways used by cyber criminals to gain access to personal and financial information of PC users. Through scam applications, which trick people into submitting credit card details to hackers, and key logger programs, which keep track of key strokes on targeted PCs - hackers use all their deceitful methods to gather financial details. ISnake Pro is another proof for the malevolent plans of cyber criminals. ...
Contravirus
ContraVirus is a fake antivirus program that is being distributed all over the Internet via Trojan infections. There are a lot of rogue antispyware raging around these days, so it is extremely important to protect your computer and yourself from something like ContraVirus. Rogues bring double damage, because they slow down your system and aims to steal your money, by tricking you into paying for a security program that does not work. ...
Registry Defender
Computer fraud is very popular nowadays and hackers become more and more aggressive in their ways to trick unsuspecting users. To make people believe that they are about to buy a legitimate and effective program, cyber criminals often use the reliable layout of security software. This is the case with one of their latest creations - Registry Defender. Do not be deceived by its reliable name – it will neither defend your system, not detect any present infections. On the contrary, in will put your system in real danger and will do everything possible to make you pay for a bogus program. ...