NOD32 - Save 25% - Download Now

Total Defense (former division of CA Technologies)

You are here: Home

Welcome to Virus or Hoax?

The World Wide Web pages of 'Virus or Hoax?' are created to provide you with basic information about viruses, hoaxes, Trojan horses, macro viruses and Internet related viruses, such as worms and email bombs.

You will find: Links to all major Anti-Virus companies and public services. Frequently updated (daily!) security alerts. Links to time-limited trial & free antivirus scanners, firewalls and Trojan horses cleaning software. Online antivirus scanners and virus removal tools.

You will not find: Links to virus sources in any form (binary, compiled or text) and virus creation tips or tools (DYOFDW).

Link to '': If you find the presented information useful in any way for your personal or business web site, please send an email to the webmaster and a review will take place ASAP. Always nice to know our work is appreciated :-)

Broken Links: In order to keep the information presented as accurate as possible, please email any broken links to the webmaster. Thanks for your cooperation.

BTW, be sure to check out the 'Tips & Tricks' at the Security page.


DHL for You
Use 'DHL for You' for easy package sending in the Netherlands!

Save 10% off top Norton Products with Coupon Code 10NAMNORTONSTORE

Save now - 25% off - 2 year license of ESET NOD32 Antivirus 4

Save 20% on Trend Micro™ Titanium™ Maximum Security! Coupon Code: titanium20

Norton 360 Version 5.0 3 Year Protection

ZoneAlarm Internet Security Suite 2012 - Save 50%

  Latest Threats



This crypto-ransomware first came to public notice on 24 October 2017 following reports that it had infected organizations in Ukraine and Russia.


Application.BitCoinMiner is a program that uses the computer's physical resources (memory, processing power, etc) to generate units of a virtual or digital cryptocurrency.


This detection identifies compromised installers for the CCleaner utility program, which have been altered to include a backdoor that silently runs in the background when the affected installer is launched.


Trojan.Ransom.WannaCryptor identifies the WannaCry ransomware, which encrypts the affected device and demands payment of a ransom to restore normal use. WannaCry is also known as Wanna Decryptor and WCryr.


This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.