Malware Complaints

Virus and Malware Database

Remove Trojan.Win32.SEPEH.gen Virus
About Trojan.Win32.SEPEH.gen If you are on this page, the chances are that you have had a close encounter with one very nasty and extremely harmful piece of software called Trojan.Win32.SEPEH.gen. This infection is a new addition to the infamous Trojan Horse family, and in case that it has nested... Read more
Remove OSX/Linker Malware (Mac Guide)
About OSX/Linker Have you ever heard the term “Trojan Horse”? You undoubtedly have if you are a frequent web user because this term describes some of the most malicious computer threats available on the Internet. Like the mythical wooden horse used by the Greeks to enter the city of... Read more
Remove Plurox Backdoor Malware
Plurox Malware – Details A Trojan Horse is a malicious type of computer program that can enter the system disguised as a file or a program that looks legitimate. The goal of most such malware pieces is to provide their creators with unauthorized access to the targeted machine. However,... Read more
Remove “You got infected with my malware” Email Bitcoin Scam
About “You got infected with my malware” Email Bitcoin Scam If you use a computer frequently, either to work, to read the news or to watch videos on the Internet, and you have noticed that your computer has started to behave abnormally, then, perhaps, your system has been infected... Read more
Remove BlackSquid Malware Exploit
About BlackSquid Malware Exploit BlackSquid Malware is a very stealthy computer infection, created by hackers with malicious intentions. The purpose of this malware is to secretly sneak inside your computer without showing any symptoms and to start launching different harmful activities in the background. If not detected and removed on... Read more
Remove “Hosting And Domain Will Be Blocked” Bitcoin Email Virus
About “Hosting And Domain Will Be Blocked” Bitcoin Email There are all kinds of malicious and highly dangerous programs on the Internet that are used in various types of cyber crimes. You have certainly heard about Ransomware, Rootkits, Spyware, Worms and other similar kinds of dangerous malware. Probably the most... Read more
Remove Win.Exploit.CVE_2019_0903-6966169-0 Virus
Win.Exploit.CVE_2019_0903-6966169-0 – Details If a Trojan Horse named Win.Exploit.CVE_2019_0903-6966169-0 has recently attacked your computer, there’s no time to wast – you ought to take immediate measures against this malware piece and find a way to remove it from your system before it has fulfilled its nefarious tasks. Speaking of... Read more
Remove Cve-2019-0708 BlueKeep Vulnerability Exploit
About BlueKeep Vulnerability If you have a Trojan Horse infection named BlueKeep inside your computer, then you should know that your system and all your data are in great danger. The representatives of the Trojans Horse family are very malicious and stealthy threats which typically have the ability to... Read more
Remove David Ghost Email Blackmail Scam
About David Ghost Email Blackmail Scam Some of our users reported a David Ghost Email Blackmail scam that they have received, with the following message: Hey!  I know your pass is: ********* I infected you with my private malware, (RAT) / (Remote Administration Tool), a few months back when... Read more
Remove Trojan.Win32.Password-unencrypted.a Malware
Trojan.Win32.Password-unencrypted.a in depth There hardly is a web user who isn’t aware of the danger that Trojan Horse viruses represent. And there is a good reason to fear them – those computer infections are an extremely versatile and multi-functional type of malware that is widely used by hackers for... Read more