Archive | Malware

How to Block Rogue Websites and Browser Hijackers


Almost 100% of the Malware take the help of your browsers to spread and infect your PC and other’s PC. And attempting to take control of your browser is an integral part of almost all malware attacks.

There are many shapes and forms of these attempts.

What is Browser Hijacking

One of the technique used by these malware is browser hijacking. Browser hijacking is the modification of a web browser’s settings by malware. The term “hijacking” is used as the changes are performed without the user’s permission. Some browser hijacking can be easily reversed, while other instances may be difficult to reverse. Various software packages exist to prevent such modification. But the easiest and most commonly used trick is to look for any undesirable changes made to your hosts file. We will deliberate on it a bit later.

Read the full story

Posted in MalwareComments (3)

BitDefender Discovers Malware Stealing Passwords in Firefox


BitDefender, the well-known vendor of security software, has recently discovered a new malware, which filters and steals secret data like passwords sent by the victim to a large number of designated banking websites which are used everyday in the UK for online shopping and financial transactions.

And the interesting thing is that this time the target has been Firefox Browser, instead of Internet Explorer, which has long been the favorite among the info-stealers. Read the full story

Posted in MalwareComments (0)

BitTera.C | Create Your Own Malware with this DIY Virus Constructor


Thousands of new malware and written and distributed every day. Most of them could not make significant impact, but some of them really go viral and create havoc to the Internet Security.

But have you ever come across a tool, which can create a custome made malware / virus for you just with some clicks.

Panda Security has just found a DIY virus creator, which can prepare a malware for your custom preferences. It has been named as BitTera.C. Read the full story

Posted in MalwareComments (12)

5 Tips on How to Combat Spyware


The most sure-fire way to be certain that spyware and other unwanted programs don’t infiltrate your system is to prevent them from finding their way in your system. Being aware of threats that are out there and practicing safe surfing are the best ways you can keep your computer safe. In order to keep your system safe you need to basically be aware of the threats that are out there. With that being said we’ve compiled a list of tips that you can consult to make sure you’re doing everything you can to keep yourself free from unwanted spyware:

  1. Stay up to date with your security: Don’t disregard the security updates that pop up on your computer from time to time. Make sure that the software that you rely on daily is updated at least on a weekly basis. If your system allows it you should set this up on an automated schedule.
  2. Download from trustworthy websites: If you’re hesitant about downloading a program from a site that you’ve never used before then you’re wise to not download the program. Try searching Google to see if the site that you’re unsure about has any related items indicating that the site is rife with spyware or ask a friend that you trust to take a look at the site.
  3. Read the fine print: As annoying and time consuming as it can be, it’s important that you read all disclosures before downloading or installing a program to your computer. Be sure that all your concerns are addressed in the fine print. It’s imperative that you understand exactly what you’re getting yourself into before going ahead and downloading a suspicious program to your system.
  4. When in doubt “x” out of a web site: It’s right to be suspicious of websites that pop up a dialogue box asking you if you’re sure you want to close out of a site. Many times these boxes will have, in small print, a message indicating that you’re going to be downloading a program before getting out of the site. Just go ahead and click the “x” in the top right hand of the page you’re unsure about.
  5. Install firewall: Unauthorized users are a major threat to your security online. In order to combat hackers that can cause serious problems for you it’s important that you have a trusted firewall properly installed on your machine. Also, be sure to keep up with any updates for your firewall as well.

This post was contributed by Heather Johnson, who writes on the subject of Comcast specials. She invites your feedback at heatherjohnson2323 at gmail dot com.

Posted in MalwareComments (3)

Get Warning Alerts to Protect Your Website from Malware Attacks


malware attack Malware Attacks on websites and blogs are increasing day by day. There are many forms and shapes in which these malware programs attack your websites. Some are easily seen, while some are hidden and not easily discovered. For instance, if a website is hacked, most of the time it is defaced and the entire world knows within minutes about the attack. These types of attacks are generally launched by hackers, who want to prove a point or two.

But there are some other types of attacks, which are more sophisticated and they insert a malicious script in your website code. On the face of it, you don’t see any change, but silently, your website is now one of the many similar platforms for that hacker to launch a bigger attack somewhere else. Your website is being used only as a pawn in the bigger game plan.

This situation is very risky. Soon your website will be tracked as a malicious site by various security agencies, including Google. And once this happens, and Google detects malware or phishing attacks are coming from your website they will place a warning next to your results listing, an interstitial warning page when the user clicks the result and a pop-up warning if the Google Toolbar is installed. As soon as this happens, your site is virtually killed.

How to Get Warning Alerts to Protect Your Website from Malware Attacks

Thankfully, Google comes to your rescue here. Google has recently started Safe Browsing API, which is a simple method for developers to download Google’s list of suspected phishing and malware URLs for which malware warning alerts are issued to the users of Firefox and Google Desktop. There are many applications under development at present which will make use of this API.

One such useful service is SERPGuard. It is a FREE malware alert service that regularly checks the Google Safe Browsing Blacklists. And whenever any mention of your website URLs appears there, it immediately shoots you warning signals, through emails, twitter and RSS. You just have to sign up with a FREE account with them and verify your site by uploading a small code to your webpages, and it starts monitoring your site for any malware and fishing attacks.

A really useful service in the long term.

If you want to know more, follow these links to get the answers about SERPGuard.

What is the Google Safe Browsing Blacklist?

How do I get my website removed from Google Safe Browsing Blacklist?

How do I remove malware from my website(s)?

How do I report sites for the Google Safe Browsing Blacklist?

Posted in MalwareComments (17)

DOM-x Media Player – Don’t Download this Malware


What is DOM-x Player ?

Yesterday, when I was going through my Yahoo Answers session, (I am a regular at Yahoo Answers), I came across a question, which asked for how to open a media file, which requires a special Media Player, named as DOM-x Player. This quickly reminded of my nephew getting into trouble after downloading DOM-x Player, and it made me to write this post.

If you are not aware, DOM-x Player is a one of the many Rogue Malware programs, which are infecting more and more PCs nowadays. The mechanism of DOM-x Player installation is easy. It is generally spread through the various online file sharing sites like Rapidshare and various Torrent sites like BitTorrent. People who want to make a quick buck disguise a rogue file as a movie file. When you download it and try to run it, this gives you a link and asks you to download DOM-x Media Player. If you get into this trap to download and install DOM-x Media Player, then you may be in trouble.

dom player malware Although DOM Player Malware is not the latest entrant, but it surely is causing damage today also. If you take a look at the various keywords being searched for DOM Player, you will notice that how many people are still searching for DOM Player.

For more information on this, you can visit TorrentFreak.

Related Search Term: Daily Estimated Searches (By SEO BOOK KEYWORD TOOL)

  • dom player license: 430
  • playon dom media player: 382
  • dom player torrent: 253
  • dom player: 208
  • dom player licence: 206
  • decoder for dom player: 119
  • dom player malware: 109
  • dom x player: 72
  • playon dom player: 72
  • quicktime dom player: 44
  • dom player license crack: 37
  • dom media player: 28
  • dom player free download: 24
  • dom x player download: 24
  • dom player free: 21
  • dom x media player: 21
  • dom player playon download: 19
  • dom professional media player: 17
  • free dom player: 17
  • decode dom player: 15
  • dom media player malware: 15
  • dom player decoder: 15
  • dom player download: 15
  • free dom x player: 15
  • dom – x media player: 14
  • dom player crack: 14
  • download dom x player: 14
  • free dom player download: 14
  • avi file asks for dom x media player: 12
  • dom player download free: 12
  • dom x player torrents: 12
  • dom player cracked: 10
  • dom player free license: 10
  • dom player free license key: 10
  • dom player full: 10
  • dom player license key: 10
  • convert dom player: 8
  • dom player avi files: 8
  • dom player keygen: 8
  • dom player serial: 8
  • dom player wiki: 8
  • dom professional media player free: 8
  • download dom player: 8
  • free download dom player: 8
  • go dom player: 8
  • how to play dom player media freeware: 8
  • licence dom player: 8
  • playon dom player free download: 8
  • 3w player dom player: 7
  • absolutely free dowload dom player: 7
  • crack dom player: 7
  • dom player codec: 7
  • dom player download license: 7
  • dom player licence number: 7
  • dom player trial: 7
  • dom x player free download: 7
  • dom x player torrent: 7
  • dom xvodeo player: 7
  • download dom player free: 7
  • download dom player torrent: 7
  • download free licences for dom player: 7
  • license dom player: 7
  • license key for dom player: 7
  • dom media player free: 5
  • dom media player serial: 5
  • dom media player torrent: 5
  • dom media player wikipedia: 5
  • dom player decoder download: 5
  • dom player licence key: 5
  • dom player license free: 5
  • dom player torrents: 5
  • dom professional media player download: 5
  • dom x media player download: 5
  • dom x player wikipedia: 5
  • free rapidshare files of dom player: 5
  • licence key for dom player: 5
  • 3wdecode dom player: 3
  • axxo dom player: 3
  • convert dom player file: 3
  • convert dom player files: 3
  • crack key for dom player: 3
  • cracked dom player: 3
  • dom player 3wplayer .torrent download: 3
  • dom player download full megaupload: 3
  • dom player enter license: 3
  • dom player for quicktime: 3
  • dom player full torrents: 3
  • dom player key: 3
  • dom player la solution: 3
  • dom player licence number is: 3
  • dom player license number: 3
  • dom player malware remove tools: 3
  • dom player playon: 3
  • dom player screenshots: 3
  • dom player website: 3
  • dom player wikipedia: 3
  • dom professional player .avi unlocking: 3
  • dom video player download: 3
  • dom x player reviews: 3
  • dom x video player: 3

Should I Download DOM-x PLayer ?

Do I really need to answer that question ?

Posted in MalwareComments (19)

Beginners Guide on How to Remove Malware Scripts and Files


malware removal1 .

IMPORTANT WARNING: Make changes in your Windows Registry only if you know exactly what you are doing. We recommend using Award Winning Registry Mechanic Software from PC Tools, for repairing all Registry Defects and problems.

The purpose of this guide is to let the users easily remove malware scripts and programs from their systems. It is useful for those users, which have not yet invested in a good quality Anti Virus Program / Firewall / Spyware on their system and have got infected with some spurious malware. This guide helps you to know the method to delete the files and kill the processes associated with a particular malware. For using this guide you should know, which malware has infected your system and what process and files are associated with that malware.

Don’t worry, we will be regularly be making you aware about these processes and files, as soon as we come across a major threat.

But be cautious: This method of removing malware is not fool proof. The best defense against any malware attack is to invest in a good quality AntiMalware like Norton, McAfee or Kasperesky.

How to Remove Malware Manually?

The process of manual removal of malware is very complex and it involves upto four steps depending upon the complexity and type of a particular malware. It is not necessary that all these steps are required to be executed for every type of malware. The steps are…

  • Kill the Malware Process
  • Delete the Registry Entries
  • Unregister harmful DLLs
  • Delete the Malware files

malware removalHow to kill the malware processes:

For it you have to know the processes associated with the malware. Search for them on the Internet, if you do not already know them. Then proceed as follows.

Press Ctrl+Shift+Esc.

This will open Your Windows Task Manager > Process Tab. See the screenshot for reference.

Here you can find all the processes currently running on your system. Select the malicious Processes and press End Process.

Save your settings.

How to delete malware Registry Entries:

IMPORTANT WARNING: Make changes in your Windows Registry only if you know exactly what you are doing. We recommend using Award Winning Registry Mechanic Software from PC Tools, for repairing all Registry Defects and problems.

Many of the malware programs try to modify the Windows registry. These malware programs cannot be removed from your system unless you delete these registry keys. Modification of the Windows Registry is a bit dangerous process, but if you are careful and know what exactly is to be done, then it is very useful.

registry editor To delete the malware registry entries, you have to know beforehand, what are the registry entries associated with the malware. Search for them on the Internet, if you do not already know them. Then proceed as follows.

Click on Start menu > Run.

Type regedit, press ok.

Now navigate through the menu on the left pane to the desired registry entry, and delete or modify it as required.

How to Unregister harmful malware DLLs

DLL, which is an acronym for Dynamic Link Library, refers to a file type, which basically is a collection of commands and/or data which can be shared by different programs on the same platform.  They contain commands and/or data that are common to a certain task.

Many of the complex malware programs use DLL files to execute certain harmful functions and required by threats to work as intended. You have to know which are the DLL files associated with the malware, unregister them and then simply delete them like ordinary files.

For this purpose, you can use the default tool regsvr32, which is part of the Windows program and can be accessed through Command Prompt.

Click on Start > Run.

Type cmd and press ok, to open the Command Prompt.

Here you type regsvr32 /u [dll_name] and press enter to unregister the DLL.

If you accidentally do something wrong, you can register it again by using regsvr32 [dll_name].

How to delete Malware Files:

Malware programs are designed to hide themselves. You have to find them to remove them. Basically there may as many as three steps to remove these files.

  • Remove the visible malware files through Windows Explorer
  • Make the hidden malware files visible and then delete them through Windows Explorer
  • Delete any remaining file through the Command Prompt.

Using Safe Mode to remove Malware

If you are not able to delete the malware files with the above given procedures, then try to restart your system in safe mode. Again try to repeat above steps.

Using KillBox:

Killbox is a third party software, which tries to remove the files effectively. If any processes are running with that file then it tries to close that process first before deleting the file. It sometimes is a very effective tool against malware processes and files. You can download it for Free and it is not required to be installed on your system.

Disclaimer: Remember, there is no fool proof method of removing these malware. The best defense against them is to install a good quality Anti Malware program like Norton, McAfee or Kasperesky. Make sure what you are doing before attempting any steps in this guide. Use this guide at your own risk.

Posted in MalwareComments (190)

Advertise Here

Hot Deals - Ending Soon

Archives