Keyword: glossary.asp
2325 Total Search   |   Showing Results : 1181 - 1200
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself in all removable and
This worm arrives via removable drives. It is injected into all running processes to remain memory resident. It drops copies of itself into all the removable drives connected to an affected system.
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This spyware is noteworthy due to its capability to hijack user session as a user is logged in target websites. It also sends the gathered information to the server in real-time. This allows the
This spyware creates folders where it drops its files. It may be injected into processes running in memory. It opens random ports. Infection Points This spyware arrives as a file downloaded from the
This spyware is injected into all running processes to remain memory resident. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It opens random ports. It modifies the Internet Explorer Zone Settings. It attempts to
This Trojan connects to certain websites to send and receive information. Other System Modifications This Trojan adds the following registry entries as part of its installation routine:
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
HOSTS File Modification This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites: {BLOCKED}.253.22 008.wzhe123.cn {BLOCKED}.253.22 010389.com {BLOCKED
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies registry entries to hide
This worm arrives by connecting affected removable drives to a system. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from