• Main Menu
  • Malware

    • lsass.exe

      lsass.exe

      LSASS, or local security authority subsystem service, is a process that functions as part of the Microsoft Windows operating system. Essentially, LSASS is part of the process for maintaining and enforcing the security protocols on the operating system. To this end, LSASS performs several important functions to ensure that the system remains free from unauthorized

    • The History of Computer Viruses

      The History of Computer Viruses

      Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed

    • How to Remove the “My Web Search” Toolbar

      How to Remove the “My Web Search” Toolbar

      My Web Search is a malware toolbar distributed by Mindspark Interactive Network via their extensive network of spam sites, most of which are targeted towards young people.  This rapidly expanding list of sites includes Zwinky, Zwinky Cuties, GirlSense, Webfetti, Kazula, iWon, SmileyCentral, MyFunCards, CursorMania, and CardBoiled. These sites trick people, mainly children, into installing the

    • Why Do I Keep Getting Redirected from Google?

      Why Do I Keep Getting Redirected from Google?

      Google or any other search engine may become abnormal when a researcher attempts to search or click on a query and redirect him/her from the page that he/she intended to visit. This is known as a redirect and a wide variety of malware can cause it. It is important to understand what may be causing

    • Malware

      Malware

      Malware is a generic term for bad software. The word malware comes from the words malicious and software. Malware (Malicious Software) is software conceived to gain access to a computer without the end user’s knowledge or permission. Malware in general, pertains to a wide range of malicious software that includes computer viruses, Trojan horses, fraudulent

    • SMSS.exe

      SMSS.exe

      There are many processes that run behind the scenes in Windows operating systems. One of these processes that may look suspicious is the SMSS.exe. This is an execution file with the full name Session Management Subsystem. The Session Manager Subsystem is responsible for starting a session. When this process begins, the system thread is responsible

    • How to Remove a Browser Hijacker

      How to Remove a Browser Hijacker

      Browser hijackers are malicious programs that redirect computer users to websites that the hacker wants and deploy the computer malware. The hijacker may change a computer’s default homepage or redirect computer users trying to visit legitimate websites such as their bank or Google to a maliciously crafted copy of the site to deploy computer malware

    • HijackThis

      HijackThis

      Are viruses and malware affecting your computer efficiency? Try HijackThis. HijackThis, popularly known in the computing world as HJT, is one of the most effective spyware and malware removal software tool available for detecting and removing harmful viruses, spyware, worms, Trojans and other pests affecting Microsoft Windows. This program was originally developed by Merijn Bellekom,

    • Computer Worms

      Computer Worms

      Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can

    • Spyware

      Spyware

      “Spyware” is a term in computer security that is used to refer to a type of malicious program that is capable of infiltrating a user’s computer and spying on his/her activities. Spyware is often used to obtain identity-related or financial information, such as usernames, passwords, social security numbers, and other confidential information.  Spyware programs are

    malware
    200 queries in 0.245 seconds.