Trojan

agnitum-outpost-internet-security-free

Agnitum outpost internet security is a multiple award winning internet security and free anti virus for PC that features free virus curing, free anti-virus updates, free personal firewall, free spam protection, lightweight internet security suite, free cloud-based services (ImproveNet), automated OS defence and more. Agnitum is the first security vendor to deliver a fully functional free version of an Internet security suite for Windows users. Outpost Security Suite FREE builds on the acclaimed antivirus, firewall and proactive protection technologies. The free solution employs modern techniques to prevent infections, data corruption and PC intrusions. Download your free internet security today.

{ read more }

We like to give free anti virus software at TechMynd to our valuable readers. This is not a giveaway from TechMynd. Its Giveaway from Comodo and its for everyone. So whoever left behind in receiving giveaways from TechMynd can grab this opportunity and download and use Full Comodo Internet Security Pro 2011 version for one whole year. Comodo Internet Security Pro 2011 guarantees protection against viruses and malware by focusing on prevention and not only detection. Comodo patent pending prevention based technology creates an impenetrable shield that identifies safe, unsafe and questionable files. Comodo Internet Security Pro 2011 offers real-time protection against Viruses, Trojans, Adware, Spyware and other Malware threats. Other Antivirus products depend on signature updates alone but Auto Sandbox Technology means you’re protected from even unknown threats.

{ read more }

by on March 26th, 2010

Fake Antivirus Remover is a little tool used to remove fake antivirus and programs which are viruses or trojans. Fake Antivirus Remover is used to remove Cyber Security, Braviax, Alpha Antivirus, Green AV, Windows Protection Suite, Total Security 2009, Windows System Suite, Personal Antivirus, Anti-Virus-1, Spyware Guard 2008, System Guard 2009, Antivirus 2009, System Security, Antivirus 2010 and more. It can also remove Antivirus Pro 2009, Antivirus 360, MS Antispyware 2009, Malware Doctor, AntivirusBEST, System Security 2009, Antivirus System Pro, WinPC Defender (all of them are fake antivirus which are viruses or trojans) from your computer. Download Fake AntiVirus Remover.

{ read more }

Have you received any suspicious file, attachment you are unable to recognize via email? Best online security practices describe that do not open and run any attachment from unreliable source and make sure you know the sender is trusted. Normally popular services will mark that file as suspicious and put that email in junk folder. You might still want to know about that file before running it on your PC. Here is an online service which will analyze and detect any threat in files and give you details about any file from multiple antivirus engines.

{ read more }

Click at the image above and see it in details. This is the email I received and my FaceBook account was recently hacked. I recovered it in few attempts (Genius). But here is a caution for everybody. FaceBook won’t email you attached files from [email protected] email address. So do not open attachments containing files with Facebook name in that or something like ‘Facebook_Password_3eb0e.zip‘ or ‘Facebook_Password.zip‘.

{ read more }

by on January 11th, 2010

File Flashy.exe is located in the folder C:\Windows\System32. Known file sizes on Windows XP are 21,185 bytes (66% of all occurrence), 60,545 bytes.
File Flashy.exe is not a Windows core file. The program has no visible window. File Flashy.exe is an unknown file in the Windows folder. Program starts upon Windows startup (see Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run). Therefore the technical security rating is 84% dangerous. Flash is a backdoor trojan that tries to take control of the infected system. It runs a telnet server on the infected computer. It also changes the administrator password to “hacked”. When first run it copies itself to:

systemID.pif
Flashy.exe

The following registry entry is created to run Flashy.exe on startup:

HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun
Flashy Bot Flashy.exe

It changes the following registry:

HKLMSYSTEMCurrentControlSetServicesSharedAccess
Start
4

It disables folder options, sets hidden files to true and hides the file extensions.

{ read more }

What you are about to witness is a display of the most infamous and malicious programs on the Web. Spyware, Adware, Trojans, Worms, Keyloggers, Toolbar Hijackers, and other harmful programs are all tracking programs that secretly install onto your computer. Once you’re infected with these malicious programs, your privacy and personal information are at risk! Spyware, as well as other malicious programs, can go from dangerous, stealing your passwords and credit card information, to simply annoying you with their excessive popups. These malicious programs can track your surfing habits, abuse your Internet connection by sending this data to a third party, profile your shopping preferences, hijack your browser, and alter important system files – all without your knowledge or permission. The security and privacy implications of these exploits should not be taken lightly.

{ read more }

McAfee detection center calls it pws-yahmali trojen and Symantec calls it infostealer.yahmali. It’s risk level is very low. And it’s only a password stealer. It attempts to steal the password of the yahoo messenger (whenever user logs in) and may send to ilam-mind-makers [dot] com.

{ read more }