Keyword: yahoo
830 Total Search   |   Showing Results : 341 - 360
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It executes then deletes itself afterward. It modifies registry entries to hide files
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
This spyware may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This spyware may be dropped by other malware. It arrives as a component
This backdoor drops copies of itself onto the affected system. It executes certain commands from a remote malicious user, and connects to certain websites in order to download more malicious files or
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This backdoor appends certain strings to certain URLs and performs HTTP GET requests. It also accesses non-malicious URLs. This backdoor also acts as a proxy server that intercepts requests from
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This malware acts as a proxy server to intercept requests of Internet browsers and point them to the proxy server on port 64323. It monitors Internet browser's activity to check for certain strings
This backdoor may be downloaded by other malware/grayware from remote sites. It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy. Arrival Details This backdoor
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This backdoor may be dropped by other malware. It may be
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive