Antivirus Software Sitemap - Page 6 2014-06-14

Check your Trusted Sites List
Some spyware and adware will add miscreant links to your Internet Explorer Trusted Sites Zone. This may allow the sites to run with fewer security restrictions. Make sure you periodically check the Trusted Sites Zone list to ensure only sites you have specifically added are included. Here's how.

How to Really Disable Autorun in Vista
A bug in Microsoft Vista executes programs in the Autorun.inf file when the Autorun feature has been disabled via the NoDriveTypeAutoRun registry value. If you've set the value NoDriveTypeAutoRun in the Windows Vista registry, delete the value and follow these steps to really disable autorun in Vista.

How to Enable Windows Automatic Updates
Microsoft provides an automatic update feature for Windows - but unfortunately malware often disables it. Make sure Windows automatic updates are configured properly by following these steps.

How to Disable Automatic Wireless Connections
Here's how to beef up your wireless safety by disabling automatic wireless connections.

Pump and Dump Stock Scams
Referred to as 'pump and dump' scams, the intent of the email is to get lots of people to take advantage of this unexpected windfall of information and buy the stock. This inflates the price, at which time the scammers sell their shares for a hefty profit and leave you holding the losses.

Boot Sector Virus: Antivirus Glossary
A boot sector virus infects the boot sector of a drive and is spread via infected floppy disks.

Buffer Overrun: Antivirus Glossary
A buffer overrun attack occurs when a malicious user exploits an unchecked buffer in a program.

False Positive: Antivirus Glossary
False positives occur when a pattern of code in the file matches the same pattern contained in a virus signature.

Integrity Checker: Antivirus Glossary
Integrity checkers scan and maintain a database of sorts regarding pertinent information on all or critical system files.

In-the-Wild (ItW) - Antivirus Glossary
In-the-Wild (ItW) refers to viruses or other malware that are actively circulating or actively infecting users' computers.

Macro Virus: Antivirus Glossary
Unlike typical file infecting viruses, macro viruses infect data files - chiefly files created in Word, Excel, PowerPoint, or even Access.

What is Malvertising?
Malvertising is malicious advertising that contains active scripts designed to download malware or force unwanted content onto your computer. Here's how to block it.

Portable Executable: Antivirus Glossary
A Portable Executable (PE_EXE) file is a program capable of running independently on any Windows 32-bit operating system

Host Intrusion Protection Software (HIPS): Antivirus Glossary
Host Intrusion Protection Software, or HIPS, provides rule and behavior-based system monitoring to guard against unwanted changes.

AutoComplete Feature: How to Disable AutoComplete in Firefox, Netscape, and Internet Explorer
AutoComplete not only makes it easier for you to automatically fill in forms and logon to secure sites - it also makes it easier for Trojans and hackers to gain access to your personal data and logon credentials. Here's how to clear the sensitive data stored by AutoComplete and how to disable the feature to protect yourself from compromise.

NoScript Addon for Firefox
Just using Firefox doesn't offer any security benefits, but using the NoScript addon with Firefox does offer an important safety upgrade.

Setting Up Password Recovery Via Email
Many online accounts let you enter an email address that will be used if your password is ever forgotten or is changed. But improperly managed, the email recovery option can leave you at greater risk.

Secret Questions for Online Accounts: Choosing the Right Secret Answer
Most online accounts include a 'secret' question to assist in password recovery, the correct answer to which is supposed to validate that you really are the legitimate owner of that account. The problem is, the 'secret' question is generally none too secret.

Protecting the HOSTS file
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Make Adobe Reader and Acrobat Safer to Use
ulnerabilities in Adobe Reader and Adobe Acrobat are the number one most common infection vector, bar none. Making sure you stay up-to-date with the latest version of Adobe products is imperative, but not foolproof. To use Adobe Reader (and Acrobat) safely, you need to make a few tweaks to its settings. Following are the must-make security changes you need to make in Adobe Reader and/or Adobe Acrobat.

How to Exclude Files and Folders from Norton Antivirus
False positives can be an annoying problem and unfortunately false positives in antivirus scanners are being increasingly more common. Here's how to exclude a file or folder from scanning by Norton AntiVirus and Norton Internet Security.

DEP: Data Execution Prevention
Data Execution Prevention, more commonly known as DEP, was first introduced in Windows XP Service Pack 2. As its name suggests, DEP prevents applications from executing code in non-executable regions of memory, a common method employed in buffer overflow attacks.

Prevent SWF (Flash) in Adobe PDF files
Adobe Flash Player 10.0.45.2 and earlier contains a vulnerability that is exploitable via Adobe Reader and Acrobat. Windows, Macintosh, Linux and Solaris operating systems are all vulnerable to the exploit if Adobe Reader or Acrobat is used.

Prevent SWF (Flash) Exploits in Mac and Unix versions of Adobe Reader and Acrobat
Adobe Flash Player 10.0.45.2 and earlier contains a vulnerability that is exploitable via Adobe Reader and Acrobat. Windows, Macintosh, Linux and Solaris operating systems are all vulnerable to the exploit if Adobe Reader or Acrobat is used.

How to Delete a Service in Windows 7, Vista, or XP
Malware often installs itself as a Windows service in order to load when Windows is started. This allows the malware to run and control designated functions without requiring user interaction. Sometimes, antivirus software removes the malware but leaves the service settings behind. Whether cleaning up after an antivirus removal, or attempting to remove the malware manually, knowing how to delete a service in Windows 7, Vista, or XP will help.

How to Remove sshnas.dll and sshnas21.dll Trojans
The files sshnas.dll and sshnas21.dll are part of a trojan that redirects search engine results in Google, Yahoo, and Bing searches. Both Firefox and Internet Explorer are affected. Here's how to manually remove the files associated with a sshnas.dll and sshnas21.dll trojan infection.

Delete Authplay.dll
Adobe Flash exploits can be easily rendered in Adobe Reader and Adobe Acrobat. Fortunately, you can safely delete authplay.dll (or rename it if you prefer). Here's how to delete authplay.dll in Windows, Mac OS X, and Unix.

How to Remember Passwords
Think you shouldn't write down your password? You may need to think again. Here are some common myths - and valid tricks - about storing and remembering passwords.

Spamdexing: Antivirus Glossary
Spamdexing is a method used to inflate the search engine rankings of a particular page, generally for malicious or unethical purposes.

Stealth Virus: Antivirus Glossary
Stealth viruses attempt to hide their presence to avoid detection.

Antivirus Software Review: F-Secure Internet Security 2009
F-Secure Internet Security 2009 includes all the features you would expect in an Internet security suite: antivirus, antispyware, spam and phishing filter, a firewall and parental controls. F-Secure Internet Security 2009 then goes one better. Find out more in this F-Secure Internet Security 2009 antivirus software review.

Mac Antivirus Software Reviews: MacScan Antispyware for Macs
MacScan from SecureMac is designed to guard against spyware-related threats targeting Mac users. While its scope is limited, such focused protection isn't necessarily a bad thing.

Mac Antivirus Software Reviews: McAfee VirusScan for Mac
McAfee VirusScan for Mac (formerly known as Virex) can be used as a standalone virus scanner for Mac or integrated with McAfee ePolicy Orchestrator (ePO) for enterprise management.

Norton AntiVirus 2002
Norton AntiVirus 2002 is effective protection, sports an attractive interface but has extensive system requirements.

Norton Internet Security 2005 AntiSpyware Edition
At $80, Norton Internet Security 2005 AntiSpyware Edition doesn't offer the ease-of-use or the protection of some competing products.

Antivirus Software Reviews: Norton Internet Security 2009 Review
Symantec's antivirus products have historically always provided excellent detection and removal of malware. On the downside, that protection came at the price of often crippling system performance. Norton Internet Security 2009 changes all that.

Norton AntiVirus Dual Protection for Mac
Norton AntiVirus Dual Protection for Mac is designed for Mac users who routinely dual boot into Windows or run Windows in a virtual environmenton their Intel-based Mac.

Mac Antivirus Software Reviews: Norton Antivirus 11.0 for Mac
Norton Antivirus 11.0 for Mac supports Mac OS X version 10.4.10 or higher. At approximately $50USD for a single user license, Norton Antivirus 11.0 for Mac is neither the cheapest nor the most expensive antivirus software for Mac users.

Antivirus software review: PC-cillin Internet Security 2005
Trend Micro's PC-cillin Internet Security 2005 continues to keep a leg up on the competition.

Mac Antivirus Software Reviews: Intego VirusBarrier X5
VirusBarrier provides realtime signature-based and behavior-based scanning and guards against both Mac-specific and Windows-based malware.

SmitFraudFix: Free Antivirus Download to Remove Zlob and Other Pests
SmitFraudFix is a free antivirus tool that removes the Zlob downloader trojan and the rogue scanner software that Zlob typically installs.

SmitFraudFix: How to Use SmitFraudFix to Remove Zlob and Other Pests
SmitFraudFix is a free antivirus download that removes the Zlob trojan downloader and the malware that Zlob installs. These instructions describe how to use SmitFraudFix properly.

ASLR: Address Space Layout Randomization
ASLR Address Space Layout RandomizationASLR, or Address Space Layout Randomization, is method in which key data areas in the address space are randomized, making it more difficult for attackers to guess the location of libraries needed to carry out heap and stack based attacks.

Adobe Flash Cookies
Adobe Flash cookies work through the ubiquitous Adobe Flash and enables any of Adobe's partners to set global cookies that are maintained on Adobe's servers instead of your own computer. The offsite storage means you really aren't deleting cookies when you clear your local cache.

Antivirus Software Reviews: Norton Internet Security 2011 Review
Symantec's Norton Internet Security 2011 is a feature-packed umbrella of protection for your PC. In addition to antivirus, antispyware, antiphishing, and a firewall, Norton Internet Security Suite 2011 also provides file reputation analysis (including the Web address of any downloaded files), spam filtering, identity theft protection, and parental controls.

Avira AntiVir Premium Review
Avira AntiVir Premium provides a full complement of features, including specialized Web and email protection, anti-rootkit technology, and anti-phishing. Avira AntiVir Premium also provides a feature to easily make a bootable rescue CD, which can come in very handy during times of system trouble.

NOD32 Antivirus Review
At $40 (USD) for a single one-year's license, ESET's NOD32 Antivirus is one of the priciest antivirus scanners on the market.

Avast Free Antivirus Review
Avast Free Antivirus offers a robust feature-set in a revamped interface that makes using the product a breeze. New features include wake-on-scan, heuristic engine and code emulator, integrity checking, behavior analysis, and a gaming mode for uninterrupted play.

AVG Anti-Virus plus Firewall Edition
AVG Anti-Virus plus Firewall Edition is light on resources, heavy on protection. The firewall provides permission-based access control reminiscent of the popular ZoneAlarm firewall. The high level of control and customization will appeal to the most advanced users, while less savvy users will find the Basic interface simple to understand and use.

Antivirus Software Review: AntiVir PersonalEdition Classic
AntiVir PersonalEdition Classic provides free antivirus protection for Windows XP/2000/NT/ME/98

Antivirus Software Review: AVAST 4 Home Edition
AVAST 4 Home Edition provides free antivirus protection for Windows XP/2000/NT/ME/98

Antivirus Software Review: AVG Free Edition
AVG Free Edition provides free antivirus protection for Windows XP/2000/NT/ME/98

AVG Rescue CD: Antivirus Review
The free AVG Rescue CD combines a bootable rescue platform with antivirus and system utilities to help ferret out even the most stubborn infections. Utilities include a file manager (Midnight Commander), Windows Registry Editor, a text editor, and various drive recovery and network diagnostic tools.

F-Secure Internet Security Suite 2010/2011 Review
Review of F-Secure Internet Security Suite 2010/2010. Families that need to control Internet access for younger children and teens will find much to like about F-Secure Internet Security 2010. Parental controls can be set to accommodate various user types, including time limits imposed on Web surfing.

G Data InternetSecurity 2010
If all you're concerned about in security suite is signature detection, then G Data SecuritySuite 2010 is a safe bet. Combining two engines (AVAST and BitDefender), G Data SecuritySuite 2010 has achieved some of the highest detection rates on independent tests performed by AV-Test.org.

Antivirus Software Review: McAfee VirusScan 2006
McAfee VirusScan 2006 now offers daily virus signature updates and robust adware/spyware detection and removal.

Norton AntiVirus 2002
Norton AntiVirus 2002 is effective protection, sports an attractive interface but has extensive system requirements.

System Safety Monitor
System Safety Monitor from System Safety adds a much needed extra layer of defense against today's malware attacks. The behavior and rules based controls provide critical insight into the otherwise invisible workings that - left undetected - can too often allow infection to occur.

Secunia Software Inspector Review
Secunia Software Inspector is free, fast, and so intuitive to use there's simply no excuse for not keeping patches up to date.

Review: McAfee SiteAdvisor
McAfee SiteAdvisor is the virtual equivalent of the school crossing guard, helping to ensure safe navigation of the web.

Microsoft AntiSpyware screenshots
Microsoft AntiSpyware screenshots

PC-cillin antivirus screenshots
Trend Micro's PC-cillin Internet Security 2005 builds on an already solid foundation. Here are screenshots of features we like best.

Returnil Review
Returnil clones your installed operating system and runs that clone in virtual memory. When you shutdown the virtual machine, there's no trace left of your Web surfing and any malware that got onto the system will disappear when you reboot the PC.

Sandboxie Review
The Sandboxie tagline

PC Tools ThreatFire Review
Behavior-based PC Tools ThreatFire provides guards against new and unknown threats which signature-based scanners might otherwise miss. ThreatFire runs in the background, monitoring each programs actions, quarantining programs it knows to be bad and alerting on those it considers suspicious. ThreatFire can easily run alongside installed antivirus or other security software, making it an ideal adjunct to existing protection. Even better, the program is completely free for home use.

Trend Micro Internet Security Suite Pro 2010 Review
Trend Micro Internet Security Suite Pro 2010 offers all the latest buzzwords, but how well it delivers may be a mixed bag.

ZoneAlarm Extreme Security 2010 Review
ZoneAlarm Extreme Security 2010 takes a holistic approach to security - combining malware and intrusion prevention with online backup and full drive encryption to protect data in the event of a lost or stolen computer.

Autorun Worms: How to Remove Autorun Malware
Autorun worms spread from USB/thumb drives as well as fixed and mapped drives. Autorun worms typically drop or download additional malware, usually backdoors and password stealers. Here's how to remove an autorun worm.

How to Easily Remove the MonaRonaDona 'Virus'
The MonaRonaDona 'virus' is a self-advertised 'virus' that isn't even a virus at all. It's a non-replicating program (i.e., a Trojan) that loads when Windows is started, changing the Internet Explorer title bar to read MonaRonaDona and displaying a message which blocks access to your legitimate running programs.

How to Remove SecurityTool Scareware
securitytool scareware rogue scanner process explorer safe mode registry editor securitytool rogue scareware regedit blocked task manager security tool

Blue Ridge Secure AppGuard Review
Blue Ridge Secure AppGuard prevents drive-by downloads by preventing anything downloaded from the Web from being run. But there's a problem with this all or nothing approach.

Antivirus Software Review: BitDefender Antivirus for Mac
BitDefender Antivirus for Mac detects both Mac and Windows malware. Features include realtime on-access virus protection with the ability to perform full system virus scans, quick scans of critical system areas, as well as scheduled scanning. The quarantine feature in BitDefender Antivirus for Mac safely isolates suspect infected files for forwarding to the BitDefender Antivirus Lab for analysis.

Antivirus Software Review: BitDefender Total Security 2010
BitDefender Total Security 2010 features bayesian style behavior-based protection to monitor, assess, and prevent potentially harmful actions on your PC. BitDefender Total Security 2010 offers customizable profiles to tweak settings based on usage type, including gamer and parental controls.

Agnitum - Antivirus Software Vendor
Agnitum Antivirus Software Vendor - Company Brief

AhnLab, Inc. - Antivirus Software Vendor
AhnLab, Inc. Antivirus Software Vendor - company brief

Aladdin Knowledge Systems - Antivirus Software Vendor
Aladdin Knowledge Systems Antivirus Software Vendor - Company Brief

AVAST Software (formerly ALWIL) - Antivirus Software Vendor
AVAST Software (formerly ALWIL) - Antivirus Software Vendor

AVG Technologies (formerly Grisoft) - Antivirus Software Vendor
AVG Technologies (formerly Grisoft) - Antivirus Software Vendor - company brief

Avira GmbH (formerly H+BEDV) - Antivirus Software Vendor
Avira GmbH (formerly H+BEDV) - Antivirus Software Vendor

BitDefender - Antivirus Software Vendor
bitdefender antivirus software vendor

Bullguard - Antivirus Software Vendor
bullguard antivirus software vendor - company brief

CA Technologies - Antivirus Software Vendor
CA Technologies antivirus software

Central Command - Antivirus Software Vendor
Central Command - Antivirus Software Vendor

Coranti, Inc. - Antivirus Software Vendor
Coranti, Inc. - Antivirus Software Vendor

Quick Heal Technologies - Antivirus Software Vendor
Quick Heal Technologies - Antivirus Software Vendor

StarLogger Keylogger
StarLogger is commercial monitoring software that records keystrokes and captures screenshots. Captured data is sent via email to designated recipients. On March 30, 2011, it was reported that Samsung installed the StarLogger keylogger on laptops sold through retail stores.

Microsoft Malicious Software Removal Tool (MSRT)
The Microsoft Malicious Software Removal Tool (MSRT) is a very accessible (and free) adjunct to existing antivirus protection, but it is not a replacement for antivirus and its detection data is not indicative of overall malware infection rates or of overall malware prevalance.

Blackhole Exploit Kit
The Blackhole exploit kit is a framework for delivering exploits via compromised or third-party websites. Most notable for its sophisticated Traffic Direction Script (TDS), the Blackhole exploit kit enables attackers to configure rules that enforce custom responses.

BlackHole: A RAT for Mac or Windows
BlackHole is a remote administration tool (RAT) that, used maliciously, can also serve as a remote access trojan. The BlackHole RAT can be used on either Mac OS X or Windows computers, and enables a remote attacker to perform potentially malicious actions on the victim's computer.

MACDefender aka Mac Protector
MACDefender is a scareware program designed to trick Mac users. Usually, MACDefender is delivered via the Web, often via tainted search engine results. While scareware has long plagued Windows users, it's a relatively new threat for Mac users.

TDSS aka TDL: A Botnet Framework
New renditions of the TDSS / TDL bot have some saying it's virtually indestructible. Certainly TDSS / TDL does present some unique challenges, as seen in this overview.

Nokia Is Giving Away Phones For "FREE"
Nokia Is Giving Away Phones For

Invitation virus hoax, aka Olympic Torch virus hoax
The Invitation virus hoax is a knock-off on the old

Hard drive killer virus hoax, aka buddy list virus hoax
Hard drive killer virus hoax, aka buddy list virus hoax

Life Owner / Mail Server Report Hoax
The Life Owner / Mail Server Report hoax is yet another bogus email warning that gets fueled by confusingly worded references.

Penny Brown
penny brown missing children hoax

Postcard from Hallmark Virus Hoax
The Postcard from Hallmark virus hoax is a knock-off on the old

Amazon Phishing Scam
Phishing scams are disguised as correspondence from valid financial or eCommerce providers. The email typically uses fear tactics in an effort to entice the intended victim into visiting a fraudulent website. Here's an example of a phishing scam targeting Amazon.com customers.

Hitman Email Threatens to Kill Recipients
A scam/hoax first reported in December 2006. The 'hitman' email attempts to frighten victims into paying large sums of money to the email sender, who poses as an assassin.

HijackThis
HijackThis is a free tool that produces a snapshot of active items loading on the computer. HijackThis covers the most common auto start entry points so it can be useful in helping to identify malware and targeting it for removal.

Mac Antivirus Software Reviews: PC Tools iAntiVirus for Mac
PC Tools iAntiVirus offers solid Mac antivirus free for home use. iAntiVirus guards against Mac only malware - a focus that helps keep performance costs and system impact low but may not be the best choice in a mixed Mac/Windows environment.

Leap.A aka Oompa-Loompa virus
The Leap.A (aka Oompa-Loompa) infects applications in Mac OS X 10.4 (Tiger) running on PowerPC processors.

Advanced Antivirus: Description and Removal for Advanced Antivirus
Advanced Antivirus is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntiSpyware Expert: Description and Removal for AntiSpyware Expert
AntiSpyware Expert is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Antivirus 2009: Description and Removal for Antivirus 2009
Antivirus 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Configure Password Security Settings in Mac OS X 10.5 and 10.6
So you've setup your login password and disabled the guest account. There's just one more set of password tweaks you need to make to secure your new Mac. Here's how to configure the general security settings to take full advantage of your system password.

Disable Guest Account in Mac OS X 10.5 and 10.6
Unless you plan on sharing your MacBook or iMac with random people, there's really no good reason to have an active guest account. Follow these steps to disable the guest login account on Mac OS X 10.5 and 10.6.

How to Configure the Mac OS X Firewall
Firewalls are must-have protection, regardless of the operating system or hardware you choose. All versions of Mac OS X include a built-in firewall, but you will need to enable it or make a few tweaks for optimum security.

Setting a Login Password for Mac OS X 10.5 and 10.6
Passwords prevent unauthorized access to your computer. Setting login passwords is easy on Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard). Just follow the step-by-step instructions below.

Bagle.AI Trojan
Bagle.AI is a downloader Trojan that also attempts to shutdown antivirus and security software found running on infected systems.

CDC / H1N1 Vaccination Scam Infects Victims
Attackers are sending email disguised as correspondence from the Centers for Disease Control (CDC). The email claims an H1N1 vaccination registration is required. Those who comply with the request won't be registering with the CDC - instead they will be infecting their computer with a version of the Banker trojan

W95/CTX Virus
The W95/CTX is a polymorphic file infecting virus that is sometimes dropped by the Cholera worm. On March 10th, 2006, McAfee VirusScan DATs 4715 erroneously detected the W95/CTX virus in non-infected files. The false positive was corrected in DATs 4716 issued later that same date.

ExploreZip worm
The ExploreZip email is sent as a reply to a normal email, thus the subject line will be that of the orginal and valid email. ExploreZip seaches all local drives for .c, .cpp, .h, .asm, .doc, .xls, and .ppt file types, which are overwritten continuously in 30 minute increments. The worm also infects both mapped and non-mapped network drives which can be seen from Network Neighborhood.

Lovgate.W worm
A mass-mailing email and filesharing worm, Lovgate.W also contains backdoor capabilities

Nugache Worm
Nugache is a worm that may spread via email, IM, or P2P networks.

Sober.I worm
Sober.I is a mass-mailing email worm that sends itself in both German and English, depending on the infected users' operating system language. Sober.I uses is own SMTP engine to send itself to email address found on infected systems, spoofing the From address.

Sober.T Worm
Sober.T arrives in an email message that may be in either German or English language, depending on the recipient's domain.

Sober.T Worm
Sober.T arrives in an email message that may be in either German or English language, depending on the recipient's domain.

Sober.U Worm
Sober.U arrives in an email message that may be in either German or English language, depending on the recipient's domain.

Sony Stinx Trojan
The Sony Stinx Trojan exploits the Sony DRM cloaking technology (aka rootkit) installed by music CDs published by Sony after March 2005. This allows the malware to be hidden from view - effectively masking its presence even from most antivirus scanners. The Sony Stinx Trojan installs an IRC Backdoor Trojan that allows remote access to compromised PCs, downloads other malware, and disables the Windows XP firewall.

Storm Worm
The Storm worm spreads via email, using a variety of subject lines and message text that may masquerade as news articles or other current events.

Stration Worm
Stration is a mass-mailing email worm that may attempt to download files from a remote server.

Sober.R Worm
Sober.R arrives in an email message that may be in either German or English language, depending on the recipient's domain.

Waledec Spam Botnet
Waledec, also spelled Waledac, is the name of a botnet used to relay malicious spam. The Waledec distributed spam often consists of fraudulent greeting cards and breaking news events.

Asprox Botnet
The Asprox botnet was originally used primarily for phishing scams. In 2008, the Asprox botnet began employing the bots to discover vulnerable Active Server pages (asp) on weakly configured websites. Once discovered, the bots automatically attempt SQL injection attacks in order to embed malicious iframes and external javascript reference.

Gumblar
Gumblar, known in Japan as Geno, is a unique botnet - it not only creates a botnet of compromised PCs, it also backdoors compromised websites enabling continued remote access and manipulation.

Koobface Botnet
Koobface spreads through social networking sites, most prevalently through Facebook. Generally, Koobface relies on social engineering in order to spread. The Koobface message is designed to trick recipients into clicking through to a fraudulent website and either (a) enter their Facebook (or other social networking) credentials or to accept the installation of malware disguised as a video codec or Flash update.

Mariposa Botnet
Mariposa is Spanish for butterly. In computer lingo, Mariposa is a botnet created by the Butterfly bot kit. Mariposa is typically spread via instant messaging, peer-to-peer file sharing networks and as an autorun worm.

Storm Botnet
The Storm bot is a backdoor component that allows remote surreptitious access to infected systems. The Storm-infected computers (collectively, the Storm botnet) are outfitted with a spam relay component (to send spam through infected computers) and a peer networking component (to enable the remote attackers to communicate with the bot infected computers).

Zeus Botnet
Zeus, often spelled ZeuS, is a crimeware botnet typically engaged in data theft. Zeus is also often referred to as Zbot. Zeus is not a single botnet nor a single trojan, but rather refers to an entire family of trojans and their respective botnets.

Crosby & Higgins / Lumberton Trading Company Malware Scam
In early March 2010, an email claiming to be notification of a lawsuit began making the rounds. The email carried a malicious attachment harboring a trojan. The email claimed to be from the legitimate (and innocent) Crosby & Higgins law firm.

SpySheriff: Description and Removal for SpySheriff
SpySheriff is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Antivirus Lab 2009: Description and Removal for Antivirus Lab 2009
Antivirus Lab 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Antivirus XP 2008: Description and Removal for Antivirus XP 2008
Antivirus XP 2008 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

IE Defender: Description and Removal for IE Defender
IE Defender is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Internet Antivirus: Description and Removal for Internet Antivirus
Internet Antivirus is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Micro Antivirus 2009: Description and Removal for Micro Antivirus 2009
Micro Antivirus 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MS Antivirus: Description and Removal for MS Antivirus
MS Antivirus is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Power Antivirus: Description and Removal for Power Antivirus
Power Antivirus is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Power Antivirus 2009: Description and Removal for Power Antivirus 2009
Power Antivirus 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Smart Antivirus 2009: Description and Removal for Smart Antivirus 2009
Smart Antivirus 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Spyware Soft Stop: Description and Removal for Spyware Soft Stop
Spyware Soft Stop is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Antispyware Soldier: Description and Removal for Antispyware Soldier
Antispyware Soldier is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Spyware Vanisher: Description and Removal for Spyware Vanisher
Spyware Vanisher is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

System Antivirus 2008: Description and Removal for System Antivirus 2008
System Antivirus 2008 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Antivirus Action: Description and Removal for Antivirus Action
Antivirus Action is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

TitanShield Antispyware: Description and Removal for TitanShield Antispyware
TitanShield Antispyware is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Total Secure 2009: Description and Removal for Total Secure 2009
Total Secure 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Trust Cleaner: Description and Removal for Trust Cleaner
Trust Cleaner is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Virtual Maid: Description and Removal for Virtual Maid
Virtual Maid is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Virus Heat: Description and Removal for Virus Heat
Virus Heat is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Virus Protect: Description and Removal for Virus Protect
Virus Protect is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Virus Protect Pro: Description and Removal for Virus Protect Pro
Virus Protect Pro is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Vista Antivirus 2008: Description and Removal for Vista Antivirus 2008
Vista Antivirus 2008 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

XP Antivirus 2008: Description and Removal for XP Antivirus 2008
XP Antivirus 2008 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

XP Antivirus 2009: Description and Removal for XP Antivirus 2009
XP Antivirus 2009 is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

XPert Antivirus: Description and Removal for XPert Antivirus
XPert Antivirus is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Buy Antivirus Software - Basics for Before You Buy Antivirus Software
Antivirus software is one of the most important software programs on your PC. Make sure you know how to select and use it properly. Find out which products fared best and made the Top Picks list.

: Best and Worst Antivirus Software>
Which antivirus software do you like the most? Least? Here's your chance to weigh in with your antivirus software experiences and let your opinion be known.

Best and Worst Antivirus Software
Which antivirus software do you like the most? Least? Here's your chance to weigh in with your antivirus software experiences and let your opinion be known.

Is it Anti Virus or Antivirus Software? And does it really matter?
Though nearly all reputable scanning vendors spell it antivirus, there's no real consensus on the proper name. Some users (and vendors) may spell it anti virus, or anti-virus, or AntiVirus with the V in virus capitalized.

Before You Use an Online Scanner
Free virus scans via online scanners are great in a pinch. But how well do they work?

Enterprise Security Books
Those charged with or interested in enterprise computer security will want to stock their office bookshelf with these enterprise security books.

Security Books for Home Users
The Internet turns all of us into one big global neighborhood. In the interests of being a good neighbor - and keeping safe - these books should serve as required reading for anyone contemplating an online experience.

Six Most Memorable Antivirus Mistakes
We all make mistakes and software engineers are only human. In antivirus programs, those mistakes can sometimes result in the loss of email and/or the deletion of important system files. Here are the six most memorable antivirus mistakes (all of which have since been fixed).

Malware Removers - How Malware Removers Detect Malicious Code
Malicious software comes in many different forms: viruses, worms, trojans, and advertising-related spyware and adware are the most common categories. There are equally as many different methods of combating malware; most of today's anti-malware scanners combine several of these techniques. Following are four of the more commonly encountered approaches used in consumer-focused malware protection.

Malware - Understand and Avoid Viruses, Trojans, and Other Malicious Software
Malware is short for

Phishing Filters and Anti-Phishing Toolbars
Phishing filters and toolbars are designed to protect the web surfer from socially engineered phishing scams which try to trick the intended victim into visiting a fraudulent website disguised to look like a valid eCommerce or banking site. Use one of these phishing filters when browsing to help prevent being fooled by a phishing scam.

Online Virus Sandbox
Years ago, if your antivirus detected a virus, chances are you'd find a pretty complete description of that threat in any number of virus encyclopedias. Today, however, with a few tens of thousands of malware being dissected each day, it's very rare to find a meaningful virus description. Fortunately, if you need specific details on what a particular bit of malware does, there are several online virus sandboxes that can give you a quick answer.

Auto Start Entry Points for Windows
Following is a list of the autostart entry points in Windows, including startup folders, registry keys, and ini files.

Downadup.AL aka Conficker.B Worm
Downadup.AL aka Conficker.B is a network worm that spreads via autorun, dictionary attacks on weakly protected network shares, and by exploiting the vulnerabilities described in MS08-067.

Stuxnet: How does the Stuxnet worm spread?
Stuxnet is a computer worm that targets the types of industrial control systems (ICS) that are commonly used in infrastructure supporting facilities (i.e. power plants, water treatment facilities, gas lines, etc). Often, these devices are not network or Internet connected. So how does Stuxnet get to these devices?

Stuxnet: The Unglamorous Truths About the Stuxnet Worm
The Stuxnet worm targets industrial control systems - the types of systems that control nuclear power plants, water treatment facilities, and other critical infrastructure. The serious nature of the Stuxnet worm had led to no end of speculation, finger-pointing, and ultimately to confusion about what exactly the Stuxnet worm is all about.

World of Warcraft Scams
WoW players are frequent targets of scammers intent on stealing World of Warcraft login credentials. And because Blizzard (developers of WoW and several other popular online games) has merged WoW logins with Battlenet credentials, a compromise of your WoW account now means a compromise of all your Battlenet games. Here are common tricks the scammers use.

Is Firefox really safer than Internet Explorer?
It seems everyone is recommending Firefox for better online security. But are those hearty recommendations warranted?

Virus Alerts: Six Easy Ways to Tell if a Virus Really is a Virus
We've all been there - you get an alert from your virus scanner warning that a particular file is infected. Sometimes the alert reappears even after you've told the antivirus scanner to remove the infection. Or maybe you just have reason to believe the virus alert may be a false positive. Here are the six things you'll want to consider to determine how to handle a virus alert.

Prevent Viruses - Tools, Tips, and Tricks for Preventing Computer Viruses
Antivirus software is must-have protection. Keep it installed, enabled, and up-to-date at all times. But though antivirus software is critical, alone it's not enough to keep you protected. Follow sound security practices, install a firewall, and use other adjunct protection in combination with your own common sense.

Remove Viruses - Tips, Tricks, and Tools for Removing Computer Viruses
Viruses, worms, trojans, spyware, and adware -- today's malware comes in many different flavors, and it can sometimes take more than a simple antivirus scan to remove. These resources provide the information, tools, and techniques to help you ferret out and remove the infection from your computer.

Most Damaging Malware - Examples of the Worst Malware
All malware is bad, but some types of malware do more damage than others. That damage can range from loss of files to total loss of security. For details, see this list of the most damaging types of malware, including viruses, Trojans and more.

Social Engineering Attacks
What is social engineering and how can you minimize your own risk of being socially engineered? Plus, common techniques used by social engineers and social networking scammers.

The Web as an Attack Tool
Unlike the defaced websites of a decade ago, when attackers compromise a website today, they don't leave any outwardly visible signs of the intrusion. Instead, they plant malicious external references to silently foist malware onto visitors' computers. Features within the Web browser can also be used against you. Here's a look at some of the more common methods used and how to properly secure against them.

Scam Types - Types of Online Scams
Online scam artists use social engineering techniques to trick victims into performing illegal money laundering, or paying large sums of their hard-earned money for the promise of a big payout that never materializes. Here's how to recognized types of scams.

Cybercrime: Malware Attacks and Scams
Cyberwar is being waged, malware and social engineering scams are the attack tools, and Internet users are on the frontlines of the battlefield. Here's how to prepare your defenses to avoid becoming frontline fodder.

Spyware Software
What is Spyware Software? Do you need Spyware Software for your computer?

WoW Real ID: Common Myths About WoW Real ID
Blizzard's Real ID program could have solved those issues and provided a safe, in-game way to communicate cross realm. Instead, safety was abandoned and WoW Real ID is a security nightmare.

VTzilla: VirusTotal Firefox Addon
VTzilla is a free Firefox addon from VirusTotal that lets you easily check the safety of links and downloads - before you click or save the download.

Antivirus for Gamers
Most everyone realizes that antivirus and firewalls are must-have protection. But when protection interferes with online gaming, it can be sorely tempting to disable that protection in favor of uninterrupted play. These antivirus scanners tackle the unique problems of gamers so you can play without sacrificing performance or protection.

Free Firewall Protection for Windows
A firewall offers important security protection, but only if its configured properly and used appropriately. Windows XP and Windows Vista both include built-in firewalls, but the protection they offer is limited - you'll want to upgrade to a standalone firewall to get full protection. Following is a list of the best free firewall apps for Windows.

Gifts for Geeks and Gamers
Gifts for geeks, gamers, techies, and even moms and dads.

Top Spyware Scanners
Spyware surreptitiously monitors your computer and Internet use, while adware can bombard your PC with unwanted advertising. Both pose a drain on your bandwidth and can lead to loss of security.

Best Antivirus to Protect Against Web and Email Threats
The most important antivirus protection needed today centers around the ability to detect and prevent new malware attacks via the Web or email. AV-Test is the definitive resource for antivirus testing that most closely approximates what a real life user will encounter. Here's our picks for the best consumer-focused Web and email defense, based on AV-Test's 2Q10 Windows 7 test results.

Best Internet Security Suites for 2011
An Internet Security Suite is a sound investment for your Windows PC, but it can be pricey. Finding the best Internet Security Suite that offers the most protection for your hard earned money is important. To save you time, money, and heartache, we've poured over the results of AV-Test.org's extensive testing of Internet Security Suites and provided our top picks for the best Internet Security Suites for 2011.

Past issues of weekly features
Previous issues of virus weekly features and columns.

Introduction to computer viruses
What is a computer virus? This free introductory course teaches you about malicious code and how to defend against it.

Windows Basics
Learning to use Windows to better protect against malicious code

Should President Obama Twitter?
Should President Barack Obama use Twitter? Or do the risks outweigh the rewards?

Fear-Based Reporting: Have You Been a Victim?
Fear sells. Whether intentional or otherwise, this can sometimes work to the advantage of the media and the disadvantage of consumers. Have you ever been influenced by fear-based reporting, only to find out later that the reports were wrong?

Have You Ever Been Scammed?
You probably wouldn't knowingly launder money or steal from small businesses. But if you fall victim to a payment processing scam, you may be doing just that. And it will be your own money that gets seized by authorities. Scams come in many flavors - and all are geared to trick you into giving up your hard earned cash. Have you ever been a victim?

Have You Ever Been Side-Swiped by a Drive-By Download?
Though the victim is often blamed for the infection, most malware infestations through no fault of the user. You're cruising along surfing the Web and get sideswiped by a malicious ad or compromised website. Have you ever been the victim of a malicious Web attack?

SOFTWIN - BitDefender
Developed by SOFTWIN, BitDefender offers integrated firewall features, P2P protection, and registry modification monitoring.

Eset - NOD32
Developed by Eset, NOD32 has received more VB100% awards than any other product in history. With a small footprint and fast scanning speed, NOD32 is a favorite choice with gamers and anyone for whom system performance is an issue.

Worm: Antivirus Glossary
A worm copies itself over and over, or mass emails itself. In either event, worms are a drain on Internet, system, and network resources.

Bymer
The Bymer worm is a PE executable (Win32 application) that infects Win9x machines with open file shares.

AntiCMOS virus
AntiCMOS is a memory resident boot sector virus. The AntiCMOS virus infects DOS boot sectors.

BleBla
BleBla is an email worm that mass-mails itself to addresses listed in the infected users address book and also to the alt.comp.virus newsgroup.

Boot.437
Boot.437 a.k.a. boot virus is a memory-resident DOS boot sector infector

Bubbleboy
The Bubbleboy virus has the distinction of being the first true email virus that infected without the use of an attachment.

Burglar
Burglar infects executables on the sytem when they are accessed either directly, or via DOS commands such as DIR and ATTRIB.

ActiveX: Antivirus Glossary
ActiveX description. ActiveX controls are Microsoft's answer to Java.

Antivirus: Antivirus Glossary
What is antivirus? Consult the glossary to learn what antivirus is along with other virus terms and definitions.

AdwarePunisher: Description and Removal for AdwarePunisher
AdwarePunisher is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AdwareSheriff: Description and Removal for AdwareSheriff
AdwareSheriff is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AlphaCleaner: Description and Removal for AlphaCleaner
AlphaCleaner is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntiSpyCheck: Description and Removal for AntiSpyCheck
AntiSpyCheck is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntiVermeans: Description and Removal for AntiVermeans
AntiVermeans is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntiVermins: Description and Removal for AntiVermins
AntiVermins is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntiVerminser: Description and Removal for AntiVerminser
AntiVerminser is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntiVirGear: Description and Removal for AntiVirGear
AntiVirGear is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AntivirusGolden: Description and Removal for AntivirusGolden
AntivirusGolden is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

AVGold: Description and Removal for AVGold
AVGold is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

BraveSentry: Description and Removal for BraveSentry
BraveSentry is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MalwareCrush: Description and Removal for MalwareCrush
MalwareCrush is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MalwareWipe: Description and Removal for MalwareWipe
MalwareWipe is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MalwareWiped: Description and Removal for MalwareWiped
MalwareWiped is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MalwareWipeds: Description and Removal for MalwareWipeds
MalwareWipeds is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MalwareWipePro: Description and Removal for MalwareWipePro
MalwareWipePro is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

MalwareWiper: Description and Removal for MalwareWiper
MalwareWiper is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

PestCapture: Description and Removal for PestCapture
PestCapture is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

PestTrap: Description and Removal for PestTrap
PestTrap is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

PSGuard: Description and Removal for PSGuard
PSGuard is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyAxe: Description and Removal for SpyAxe
SpyAxe is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyCrush: Description and Removal for SpyCrush
SpyCrush is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyDown: Description and Removal for SpyDown
SpyDown is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyFalcon: Description and Removal for SpyFalcon
SpyFalcon is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyGuard: Description and Removal for SpyGuard
SpyGuard is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyHeal: Description and Removal for SpyHeal
SpyHeal is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyHeals: Description and Removal for SpyHeals
SpyHeals is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyLocked: Description and Removal for SpyLocked
SpyLocked is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpyMarshal: Description and Removal for SpyMarshal
SpyMarshal is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpySoldier: Description and Removal for SpySoldier
SpySoldier is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpywareKnight: Description and Removal for SpywareKnight
SpywareKnight is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpywareLocked: Description and Removal for SpywareLocked
SpywareLocked is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpywareQuake: Description and Removal for SpywareQuake
SpywareQuake is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpywareRemover: Description and Removal for SpywareRemover
SpywareRemover is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpywareSheriff: Description and Removal for SpywareSheriff
SpywareSheriff is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

SpywareStrike: Description and Removal for SpywareStrike
SpywareStrike is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

VirusBlast: Description and Removal for VirusBlast
VirusBlast is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

VirusBurst: Description and Removal for VirusBurst
VirusBurst is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

VirusRay: Description and Removal for VirusRay
VirusRay is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

WinAntiSpyPro: Description and Removal for WinAntiSpyPro
WinAntiSpyPro is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

WinHound: Description and Removal for WinHound
WinHound is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Disinfection: Antivirus Glossary
Cleaning or otherwise removing a virus infection is referred to as disinfection.

Heuristics: Antivirus Glossary
Heuristic detection is generic detection designed to detect new or previously unseen malware.

Hoax: Antivirus Glossary
Virus hoaxes are messages that claim to be warnings of real virus threats.

Malware: Antivirus Glossary
Malware is an abbreviation for malicious software and refers collectively to viruses, worms, trojans, adware, and spyware.

Payload: Antivirus Glossary
Traditionally, a virus payload referred to action a virus might take beyond simply infecting files.

Polymorphic: Antivirus Glossary
Polymorphic viruses change their code in an attempt to avoid detection by antivirus scanners.

Scanner: Antivirus Glossary
A scanner refers to the products and technology used by antivirus software vendors to detect and remove malicious code.

WildList: Antivirus Glossary
The WildList is a list of malware that have been reported by at least two separate reporting agencies.

Bredolab
Bredolab is a downloader trojan that is used by attackers to distribute a wide range of malware, often scareware but also including variants of Zeus/Zbot backdoor trojans.

ZoneAlarm
With today's increasingly sophisticated viral threats, many packing backdoor access Trojans designed to compromise your computer's security, a product such as ZoneAlarm does more than protect. It's a must-have in your

Trojan - What Is a Trojan
A Trojan is a self-contained malicious program that is different from a virus but can have the same kind of effect on your computer.

Virus: Antivirus Glossary
A virus infects other files, by injecting the malicious code into the code of the legitimate file.

Attachment: Antivirus Glossary
Email attachments are a common form on infection. Find out what threat these Internet worms pose, disguised as innocent attachments.

Wireless Security
From Mary Landesman, your guide to Antivirus Software, resources to help protect your PDA and other wireless devices.

Antivirus software and resources for DOS.
Don't let your older DOS system succumb to a computer virus. Antivirus software and security resources for DOS.

Free firewall software
While antivirus software is a must, a personal firewall is no less of a necessity. Fortunately, free firewall software is available.

Free virus removal tools
Free virus removal tools offered by various antivirus vendors

Computer and Online Security Books
The Internet groups all of us into one big global neighborhood. In the interests of being a good neighbor - and keeping safe - these books should serve as required reading for anyone contemplating an online experience.

Reader's Choice Awards 2011 -- Nominate Your Favorites
best antivirus software, best web design, favorite software, web name, free antivirus, bragging rights, readers choice, e mail, choice award, choice awards, nomination, web browser, mac antivirus, mac software, vote, mac windows, windows software, check software

Content Filtering
From Mary Landesman, your guide to Antivirus Software, a comprehensive listing of content filtering applications for the gateway, desktop, and Internet.

Malware
Malware is short for "malicious software" and is an umbrella term used to refer to viruses, worms, trojans, spyware, adware, and other forms of malicious code. Malware can be spread by any means a normal file might be shared - including between drives, over the network, and via the Internet. Much of today's malware is spread via websites (typically compromised legitimate sites), email, social networking sites such as Facebook or MySpace, and instant messaging.

Blaming Microsoft
California film-maker Marcy Levitas Hamilton has initiated a class action suit against Microsoft, blaming them for her security problems. The lawsuit just happens to coincide with, and borrow language from, last week's CyberInsecurity report that heavily criticized Microsoft and blamed...

Virus Encyclopedia - N
Descriptions of viruses, the damage they do, and how to prevent them.

!0000 Tip
The !0000 tip is a misguided attempt to be helpful. Adding !0000 to the address book is not an effective defense against email worms.

Combination Viruses
As if one payload weren't enough, viruses now often contain worms and Trojans. Melissa and LoveLetter are just two of this type.

Port numbers used by Trojans, worms, services, and common applications.
Port numbers used by Trojans, worms, services, and common applications.

Viruses recently discovered in-the-wild.
Discover which viruses are currently infecting computers and learn about new virus discoveries.

Viruses recently discovered in-the-wild. - page 2 of 2
Discover which viruses are currently infecting computers and learn about new virus discoveries.

Antivirus scanning technology
Not all viruses are created equal, and neither are the virus scanners. Learn more about the technology of virus detection and prevention.

Securing Internet Explorer
Securing Internet Explorer

SecureWorld
SecureWorld

Passports for Packets
Passports for Packets

Julie Amero Case About Law, Not Adware
Julie Amero Case About Law, Not Adware

Social Manipulation
Social Manipulation

Get Lost Lessons for Windows Basics
Learning to use Windows to better protect against malicious code

Get Lost Lessons for Introduction to computer viruses
What is a computer virus? This free introductory course teaches you about malicious code and how to defend against it.

How To Create a Windows 3.x Startup Disk
A simple How to on creating a Windows 3.X startup disk, from your About.com Guide

How To Create a Windows 95/98 Startup Disk
A simple How to on creating a Windows 95/98 startup disk, from your About.com GuideA simple How to on creating a Windows 95/98 startup disk, from your About.com Guide

How To Detect Back Orifice
Trojan Horses & Droppers, not really viruses but still a very REAL threat to your computer.

How To Stop Email Viruses
A simple How to on stop email viruses, from your About.com Guide

How To Fit F-Prot on a Disk
How to fit F-Prot on a floppy disk to protect against viruses during an emergency removal situation.