Good news for us 🙂 Now you can remove Spyware Quake from your system using CounterSpy. If you have problems with SpywareQuake you can use manual removal instructions: How to remove SpywareQuake or try free trial version CounterSpy.
Myantispyware team No Comment Malware removal, Tips
Good news for us 🙂 Now you can remove Spyware Quake from your system using CounterSpy. If you have problems with SpywareQuake you can use manual removal instructions: How to remove SpywareQuake or try free trial version CounterSpy.
Myantispyware team No Comment Tips, Virus
Today is the third day of the month, and “this destructive virus will delete files from a number of popular programs on February 3rd, and on the 3rd day of the month thereafter”. More info about Nyxem/Kama Sutra/Blackworm How to remove Nyxem/Kama Sutra/Blackworm How to recovery lost files (due to W32.Blackmal.E@mm – BlackWorm virus or
Myantispyware team No Comment Tips
Heise Online is reporting about yet another example of the ever-warming relationship of copy protection and rootkit technologies. The affair started with the digital rights management system Sony BMG was using to protect audio CD’s. Now, F-Secure can also confirm that at least the German DVD release of the movie “Mr. & Mrs. Smith” contains
Myantispyware team No Comment Tips
We has set up special forum for victims to post their stories. Registration is not required. Click here for the forum.
Myantispyware team No Comment Tips, Tutorials - HowTo
First if at all possible TURN off the computer and put the infected drive on another system that is not infected. If for one reason or another you can not you should cosider one of the cdrom or floppy based recovery systems and an extra drive. You should preform recovery to a different filesystem then
Myantispyware team No Comment Tips, Virus
On systems that are infected by Win32/Mywife@E.mm, BlackWorm, W32.Blackmal.E@mm, WORM_GREW.A, W32/Nyxem-D, Email-Worm.Win32.VB.bi, the malware is intended to permanently corrupt a number of common document format files on the third day of every month. February 3, 2006 is the first time this malware is expected to permanently corrupt the content of specific document format files. The
Myantispyware team No Comment Tips
Much of the computer security industry acts like spyware is immaculately conceived. Somehow it just appears on computers, we are led to believe, and supposedly all we can do is clean up the mess after it happens, rather than prevent it in the first place. I disagree. Now, we all love Google. I use Google’s
Myantispyware team No Comment Tips
Key loggers are a particularly nasty type of malware, because they are created to monitor and record keyboard activities. They are often designed to capture the victim’s interactions with a login form of some kind, frequently targeting logon credentials for banking websites. NetSpy, identified by this spyware scan, is known to be able to log
Myantispyware team No Comment Tips
A specially crafted HTML document can cause Internet Explorer to skip the kill bit check. This means that any ActiveX control that has been disabled solely through use of the kill bit may still be used by Internet Explorer. A kill bit is a registry setting that prevents Internet Explorer from running the corresponding ActiveX
Myantispyware team No Comment Critical patch, Tips
Apple released a security update to Quicktime. http://docs.info.apple.com/article.html?artnum=303101 There are multiple vulnerabilities patched. To summarize the advisory: A maliciously-crafted GIF/TIFF/TGA/QTIF image or multimedia file may result in arbitrary code execution. Well that pretty much covers the whole web browsing thing. Update your Quicktime now.