NOD32 - Save 25% - Download Now

Total Defense (former division of CA Technologies)

You are here: Home

Welcome to Virus or Hoax?

The World Wide Web pages of 'Virus or Hoax?' are created to provide you with basic information about viruses, hoaxes, Trojan horses, macro viruses and Internet related viruses, such as worms and email bombs.

You will find: Links to all major Anti-Virus companies and public services. Frequently updated (daily!) security alerts. Links to time-limited trial & free antivirus scanners, firewalls and Trojan horses cleaning software. Online antivirus scanners and virus removal tools.

You will not find: Links to virus sources in any form (binary, compiled or text) and virus creation tips or tools (DYOFDW).

Link to 'virusall.com': If you find the presented information useful in any way for your personal or business web site, please send an email to the webmaster and a review will take place ASAP. Always nice to know our work is appreciated :-)

Broken Links: In order to keep the information presented as accurate as possible, please email any broken links to the webmaster. Thanks for your cooperation.

BTW, be sure to check out the 'Tips & Tricks' at the Security page.

  Advertising

DHL for You
Use 'DHL for You' for easy package sending in the Netherlands!


Save 10% off top Norton Products with Coupon Code 10NAMNORTONSTORE


Save now - 25% off - 2 year license of ESET NOD32 Antivirus 4


Save 20% on Trend Micro™ Titanium™ Maximum Security! Coupon Code: titanium20


Norton 360 Version 5.0 3 Year Protection


ZoneAlarm Internet Security Suite 2012 - Save 50%


  Latest Threats


F-Secure

Trojan.Ransom.WannaCryptor

Trojan.Ransom.WannaCryptor identifies the WannaCry ransomware, which encrypts the affected device and demands payment of a ransom to restore normal use. WannaCry is also known as Wanna Decryptor and WCryr.

Backdoor!Online

This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.

Trojan!Online

This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known trojans.

Gen:Variant.Application.Bundler

Gen:Variant.Application.Bundler identifies software that is distributed bundled together with other components or programs.

Trojan.Phishing

Phishing trojans are files that are designed to look legitimate, but are really delivery vehicles for malware. The trojans are usually distributed as file attachments to email messages which are crafted to look legitimate. If the file is opened, embedded code will either drop and install malware onto the user's device, or will download malware from a remote site to install on the device.

Symantec

Trojan.Agentemis!gen1

Risk Level: Very Low. Type: Trojan.

Ransom.Jaff

Risk Level: Very Low. Type: Trojan.

W32.Styes

Risk Level: Very Low. Type: Worm.

Packed.Vmpbad!gen40

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen93

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Ransom.Cerber!g25

Risk Level: Very Low. Type: Trojan.

Trojan.Bravonc!gm

Risk Level: Very Low. Type: Trojan.

Trojan.Alphanc

Risk Level: Very Low. Type: Trojan.