Category Archives: Spyware
Monokle
Researchers who discovered Monokle claim it has abilities that they have never seen in the wild before. The malware falls under the classification of spyware, but it also has the functionality of a RAT (Remote Access Trojan). What we should mention from the start is that regular home users are unlikely to receive it as it appears the malicious application is highly targeted, which means its developers select their victims instead of attacking random users. If you continue reading this report, you can learn how this threat could be spread, what kinds of devices are targeted, and what could happen if the malicious application gets in. ...
FinFisher
FinFisher is a clandestine program primarily used by national governmental agencies to spy on targeted computers using the so-called Remote Monitoring and Deployment Solutions. Even though the malign program is usually used for surveillance purposes by authoritative agencies, there is a chance that your computer could be infected with this malicious program as well. ...
Spyware.IEToolbar
Spyware.IEToolbar is classified as a browser helper object. It is one of the potentially unwanted toolbars that are complementary components of such browser hijackers as SearchIt toolbar. It is very common for a user to download Spyware.IEToolbar himself, especially when a user downloads random freeware. ...
Relevant Knowledge
It can be difficult to distinguish between genuine online applications and forums, such as the Relevant Knowledge online market research service. This service is used to conduct online surveys on topics which are potentially of interest to the Internet community. The responses to Relevant Knowledge surveys are used to help determine the needs and content Internet users have and want. The problem with Relevant Knowledge comes in where it records a history of PC users’ Internet use. ...
Windows Registration Checker
The fake Windows Registration Checker is one of the numerous scams, created by cyber criminals in an attempt to gain profit by unsuspecting users. The scheme is craftily designed, since its bogus screen looks legitimate, but the plot of the con is extremely shallow. ...
iSnake Pro
There are different ways used by cyber criminals to gain access to personal and financial information of PC users. Through scam applications, which trick people into submitting credit card details to hackers, and key logger programs, which keep track of key strokes on targeted PCs - hackers use all their deceitful methods to gather financial details. ISnake Pro is another proof for the malevolent plans of cyber criminals. ...