Welcome Guest (Log In | Create Account)
New Member? Join for free.
There are 1018 Virus Removal Guides.
Sort By:

AVLab Internet Security Image
Read 2,483 times | Last updated on December 17, 2014

AVLab Internet Security is a rogue anti-spyware programs from the Rogue.FakeRean-Braviax family of computer infections. This infection is considered a rogue anti-spyware program because it purposely displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. This scareware is promoted through web sites that have been hacked with scripts that try to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs that are required to view an online video, but instead install the infection.

Read Entire Removal Guide


AVC Plus Image
Read 2,517 times | Last updated on December 16, 2014

AVC Plus is a rogue anti-spyware programs from the Rogue.FakeRean-Braviax family of computer infections. This infection is considered a rogue anti-spyware program because it purposely displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. This scareware is promoted through web sites that have been hacked with scripts that try to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs that are required to view an online video, but instead install the infection.

Read Entire Removal Guide


GuardBytes Plus Image
Read 3,125 times | Last updated on December 12, 2014

GuardBytes Plus is a rogue anti-spyware programs from the Rogue.FakeRean-Braviax family of computer infections. This infection is considered a rogue anti-spyware program because it purposely displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. This scareware is promoted through web sites that have been hacked with scripts that try to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs that are required to view an online video, but instead install the infection.

Read Entire Removal Guide


Poweliks Image
Read 8,852 times | Last updated on December 7, 2014

The Poweliks infection is a Trojan downloader for the Windows operating system that downloads and executes other malware on your computer. This infection is typically installed via exploit kits found on hacked web sites that exploit vulnerabilities on your computer when you visit them. Once the initial installer is executed, the actual Poweliks infection is stored in the Windows registry rather than as a file on your hard drive. The installer then deletes itself. This method of storing the malware files in the Registry rather than the hard drive makes it more difficult for antivirus programs to properly detect it.

Read Entire Removal Guide


AVbytes Win 7 Antivirus 2015 Image
Read 4,638 times | Last updated on December 4, 2014

AVbytes Win 7 Antivirus 2015 are rogue anti-spyware programs from the family of computer infections. AVbytes Win 7 Antivirus 2015 is considered a rogue anti-spyware program because it purposely displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. This scareware is promoted through web sites that have been hacked with scripts that try to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs that are required to view an online video, but instead install the infection.

Read Entire Removal Guide


TorrentLocker Image
Read 10,432 times | Last updated on December 16, 2014

TorrentLocker is a file-encrypting ransomware program that was released around the end of August 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. When you are first infected with TorrentLocker it will scan your computer for data files and encrypt them using AES encryption so they are no longer able to be opened. Once the infection has encrypted the data files on all of your computer drive letters it will display a window that contains the ransom note and instructions on how to get your files back. These instructions include a link to the CryptoLocker Buy Decryption, which will inform you of the current ransom amount, the amount of files encrypted, and instructions on how to make your payment. The ransom cost starts at around $550 USD and goes up after about 3 days. The ransom must be paid in Bitcoins and sent to a bitcoin address that is unique for each infected user.

Read Entire Removal Guide


Zorton Win 7 Protect 2014 Image
Read 4,526 times | Last updated on December 1, 2014

Zorton Win 7 Antivirus 2014 and Zorton Win 7 Protection 2014 are rogue anti-spyware programs from the family of computer infections. Zorton Win 7 Antivirus 2014 is considered a rogue anti-spyware program because it purposely displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. This scareware is promoted through web sites that have been hacked with scripts that try to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs that are required to view an online video, but instead install the infection.

Read Entire Removal Guide


A-Secure 2015 Image
Read 6,341 times | Last updated on November 27, 2014

A-Secure 2015 is a rogue anti-spyware programs from the family of computer infections. This infection is considered a rogue anti-spyware program because it purposely displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. This scareware is promoted through web sites that have been hacked with scripts that try to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs that are required to view an online video, but instead install the infection.

Read Entire Removal Guide


Windows AntiBreach Module Image
Read 8,225 times | Last updated on November 21, 2014

Windows AntiBreach Module is a rogue anti-spyware program from the family of computer infections. This program is considered scareware because it displays false scan results, fake security warnings, and does not allow you to access your legitimate Windows applications. Windows AntiBreach Module is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.

Read Entire Removal Guide


CoinVault Image
Read 8,335 times | Last updated on November 20, 2014

CoinVault is a file-encrypting ransomware program that was released in the beginning of November 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. This ransomware is part of the CryptoGraphic Locker family with the addition of offering one free file decryption to prove that they are able to do so. Unlike other recently released crypto-ransomware, this infection does not utilize a decryption site to make payments and download the decrypter, but rather the decryption functionality and payment system are built directly into the malware executable.

Read Entire Removal Guide


Advertise   |   About Us   |   User Agreement   |   Privacy Policy   |   Contact Us   |   Sitemap   |   Chat   |   Tutorials   |   Uninstall List
Tech Support Forums   |   The Computer Glossary   |   RSS Feeds   |   Startups   |   The File Database   |   Virus Removal Guides   |   Downloads


© 2003-2014 All Rights Reserved Bleeping Computer LLC.
Site Changelog