Trojan - Page 46

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
worm-removal

Remove Net-Worm.Win32.Kido.ih from Your PC

A variant of Net-Worm.Win32.Kido computer worm, Net-Worm.Win32.Kido.ih is being spread through removable storage devices or local networks. As soon as Net-Worm.Win32.Kido.ih is activated on a computer, it will copy itself to remote PCs and create a temporary file that has…

THREAT REMOVAL
Ad.Yieldmanager-removal

Ad.yieldmanager.com Removal Manual

Ad.yieldmanager.com (yieldmanager.com, adyieldmanager.com) is a tracking cookie created to collect information about the user’s browsing activities online, such as IP address, browser type, how many times a certain web page has been visited by the user or how long did…

THREAT REMOVAL
dnschanger-removal

Remove DNS Changer from Your Computer

DNS Changer is a Trojan trying to alter the DNS settings on the compromised machine in order to serve malicious purposes. Personal information theft and browser hijacks are often part of the DNS Changer attacks. Experts report that banker Trojans,…

THREAT REMOVAL
errorfix-removal-manual

ErrorFix Removal Manual

Security experts categorize ErrorFix as a rogue registry repair tool that misleads PC users with fake warnings and security notifications so they would purchase the full version of the program. ErrorFIx is promoted as a legit security application for Windows…

THREAT REMOVAL
Random Audio Ads Virus

Remove Random Audio Ads Virus from Your Computer

Random Audio Ads Virus is a general term used to describe different types of adware, Trojans and other computer threats, which initiate audio advertisements automatically. The Audio Ads Virus can be not only quite intrusive, but they can also be…

THREAT REMOVAL
trojan

Remove Trojan:Win32/Croject.E!dll from Your Computer

As the name of the threat suggests, Trojan:Win32/Croject.E!dll is a Trojan that is usually distributed to the victim’s computer through spam emails containing malicious attachments. The corrupted message is designed to lure the user into opening it, and thus trigger…

THREAT REMOVAL
Infostealer.Gampass trojan

Detect and Remove Infostealer.Gampass

What Is Infostealer.Gampass? Infostealer.Gampass is a Trojan that is capable of lowering the security settings of the affected machine, allowing numerous infections to enter the computer. Infostealer.Gampass is specially designed to open a backdoor on the PC, which allows the…

THREAT REMOVAL
digitalprotection

Digital Protection Malware Removal Guide

Digital Protection Does Not Protect – It Infects Digital Protection is a rogue anti-malware program designed to display fake security alert messages on your screen solely to trick you into purchasing its full version. What Does Digital Protection Do to…

THREAT REMOVAL
Background Host

Remove Background Host from Your Computer

Background Host is known to manipulate browser extensions. The malicious code is capable of crashing the ‘backgroundhost64.exe’ process and related security extensions, so it would redirect the search operations performed on the compromised machine. Background Host can also disrupt the…

THREAT REMOVAL
Malicious Messages Offering Free Steam Games

Malicious Messages Offering Free Steam Games

Short Description of Steam Messages Numerous users of the game distribution platform Steam have reportedly received messages like “Is this you in the photo?”, “WTF Dude?” and “You will exchange this thing?”. These users should know that they have probably…

THREAT REMOVAL
Trojan.Cryptlock.J!gm

Trojan.Cryptlock.J!gm

What Is Trojan.Cryptlock.J!gm? Security experts rate Trojan.Cryptlock.J!gm as a low-level risk infection. Once active on the compromised computer, Trojan.Cryptlock.J!gm will run in the background and consume a lot of the system’s resources. Trojan.Cryptlock.J!gm may cause a slowdown in the system’s…

CYBER NEWS
Poweliks Trojan Delivered Through Spam Emails

Poweliks Trojan Delivered Through Spam Emails

Experts report that the number of computers infected with Poweliks Trojan has been growing recently. The primary distribution technique at the moment is through spam, but the cyber criminals are using other methods as well. Details on the Poweliks Trojan…

THREAT REMOVAL
rouge-anti-virus-windowssafemode

‘Windows Safemode’ Is Not ‘Safe Mode’ by Windows

Windows Safemode is not the same as the Safe Mode by Windows. In fact, it is a rouge Windows program, being falsely advertised to protect your system when in fact it has no capability of detecting an error, or fixing…

THREAT REMOVAL
Ventir The New Backdoor Trojan for OS X

Ventir The New Backdoor Trojan for OS X

Researchers with the Russian multi-national security company Kaspersky have discovered a new OS X malware, dubbed Ventir. Reportedly it contains a keylogger, a Trojan, and a backdoor that allows the hackers to keep on accessing compromised machines. Reportedly, Ventir is…

THREAT REMOVAL
Zero-Access-Botnet

ZeroAccess Botnet – Is It Dead Yet?

What Is ZeroAccess? The ZeroAccess rootkit is a Trojan infecting Windows operating systems. The malware is also known as max++ or Sirefef and was first detected in the summer of 2011. The ZeroAccess botnet is to this day one of…

THREAT REMOVAL
The-Sandworm-Malware

The Sandworm Malware – How Dangerous Is It?

What Is the Sandworm Malware? The latest malware on the horizon, Sandworm, may have been named after the famous worm-like creature from the 60’s sci-fi classic Dune, but users should keep in mind that it is neither a worm, nor…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree