Monday, May 14, 2012

Remove "Recommended for You" Pop-ups and Malware (Uninstall Guide)

Don't Copy From This Blog...

Protected by Copyscape Plagiarism Detection
Over the last few weeks, some of our readers have alerted us to the fact that they got some kind of malicious software that redirected web browsers to different 3rd party websites and displayed intrusive advertisements in the lower right hand corner of their computer screens. No joke. However, it's...

Wednesday, May 9, 2012

Remove W32.Xpaj Virus (Uninstall Guide)

Don't Copy From This Blog...

Protected by Copyscape Plagiarism Detection
W32.Xpaj is a particularly sneaky polymorphic virus that infects .exe, .dll, and other legitimate Windows files on the compromised computer. This virus is not completely new. First samples of infected files were detected about four years ago. Back then W32.Xpaj was probably the most sophisticated file...

Saturday, May 5, 2012

Total Anti Malware Protection - How To Remove

Don't Copy From This Blog...

Protected by Copyscape Plagiarism Detection
Today we came across another bugger from the Rogue.VirusDoctor family that comes up on the infected computer as Total Anti Malware Protection. It may look like a real thing but basically it's a fake security product that pretends to scan your computer for malicious software. It also displays a bunch...

Wednesday, May 2, 2012

Top 6 Best Practices for Network Vulnerability Management

Don't Copy From This Blog...

Protected by Copyscape Plagiarism Detection
We all know the importance of having a secure network and we also know that most of the time this is easier said than done. The difficulty in achieving this target stems from the wide variety of issues we need to monitor and fix. This is where a good vulnerability scanner can help. The right tool for the job is only half the job, one also needs to use the tool effectively and this applies to a vulnerability scanner as well. Here are six best practices...

Tuesday, May 1, 2012

Remove Trojan.Tracur (Uninstall Guide)

Don't Copy From This Blog...

Protected by Copyscape Plagiarism Detection
One of our computers has been recently hit by a dreaded Trojan horse called Trojan.Tracur. That's not a huge surprise for us since most of the time we infect our computers intentionally just to find you what certain computer viruses do and how to effectively get rid of them. It's been almost a year since major security vendors discovered this Trojan horse. The distribution and risk levels were always low for this threat but Trojan.Tracur activity...

 
//PART 2