Archive | Malware

Manage Windows Processes, Services, Drivers, Connections & More with WhatsRunning

If you want to take an inside view of the Windows running on your computer, for instance, which processes are running, which IP-Connections are currently active, which drivers are installed and how many of them are not working correctly, which services and modules are currently open and even which applications are stuffed in your Startup List, then there is a handy utility for free download.

WhatsRunning tells you a freeware, which tells you all of it at one place. Following is a list of items monitored by WhatsRunning.

Read the full story

Posted in MalwareComments (3)

How To Block Malicious Website Access, Sites List for Hosts File

block malware sitesWith each passing day, the security concerns over Internet are growing and gaining bigger dimensions. You never know, which websites and links are harmful and a click on their URL and infect your computer.

The situation becomes very complicated when we note that the search results and sponsored listings served by the popular search engines like Google, Bing etc. It is disappointing to note that these search giants, which drop the SERP ratings of an innocent website, if found serving malware at the drop of a hat, continue to drive traffic to malware serving websites through their own sponsored listing sections.

If you can punish innocent websites, who have been hacked by some criminal and the poor webmaster or blogger doesn’t have required expertise or skill to discover the malware serving code, then you should also be brave enough to stop the ads atop your search results, which are blatantly serving the malware codes.

You cannot shouldn’t employ dual policy on the same topic, just because the ads are giving your the revenue.

But this is not the topic of this post.

Read the full story

Posted in MalwareComments (15)

Scan Windows Registry, Processes, Services to Remove Malware

Most of today’s Security Software Applications work on the principle of malware signature identification. They depend on the identification of a malware, developing its counter measure, inclusion of its definition in the database, subsequent download of these definitions by the end user and then only the security is provided to the ultimate user.

However, another approach to the malware detection in your computer is to look for the suscpicious processes, services and registry entries and remove them.

There are many tools available, which can detect suscpisious behavious and alert you. Now it is upto you to dig more about suspicious processes and take action.

FreeFixer – A Freeware Malware Catcher

Read the full story

Posted in MalwareComments (11)

Detect Virus and Spyware in Emails/Websites with Online Link Scan

detect-virus-spyware-in-emailsThis is a known fact that Emails cause the spreading of more than half of Virus and Spyware. The bad links, wrapped and disguised in seemingly un-harmful and innocent emails, create havoc with your internet security.

Savvy Internet users can detect the un-harmful links from those with malicious intents easily. But sometimes it becomes extremely difficult for them also to detect these bad links, which sometimes point you to rogue websites, which are meant for the distribution of malware.

I have just come across an online service, which is able to tell you, whether a particular link is safe for your visit or not. It uses several services like Google Safe Browsing, AVG database, SiteTruth database and PhishTank database to base its opinion about the character of a website or web link.

Read the full story

Posted in MalwareComments (71)

Vundo Trojan – Changing from ScareWare to RansomeWare

ransomewareVundo is a Trojan Horse, which is responsible for pushing an advertising lots of scareware and rogue antispyware software like Antivirus 360, WinPC Defender etc.

What are Scareware or Rogue Antispyware

If you are wondering, let us tell you that as soon as these scareware software gets entry into your system, they start yelling that your system is infected with all sorts of malware and spyware infections and you need to take urgent actions to remove them. They take the help of fake alarm messages, fake animation windows which look like as if the program is actually scanning your computer and browser hijacking to convince you that your system is infected. Read the full story

Posted in MalwareComments (1)

Antivirus 360 Using Google Homepage to Infect Your Computer

Browser Hijacking is a common practise among the rogue security software to infect user’s computers with malware.

Recently, one of my colleague sent me this screenshot.


Read the full story

Posted in MalwareComments (7)

Disable AutoRun.Infi and Secure Your PC from USB Infections


AutoRun.Infi is the configuration file used by the Microsoft Windows machines to decide the action to be taken when a removal media like a USB or Audio / Video CD is inserted into the machine.

It surely saves some time for the user when without clicking or serching the file structure, he is able to get the desired action performed by the media. But many times, AutoRun feature has been seriously exploited by Malware to execute malware codes and infect your system.

Read the full story

Posted in MalwareComments (56)

Advertise Here

Hot Deals - Ending Soon