NOD32 - Save 25% - Download Now

Total Defense (former division of CA Technologies)

You are here: Home

Welcome to Virus or Hoax?

The World Wide Web pages of 'Virus or Hoax?' are created to provide you with basic information about viruses, hoaxes, Trojan horses, macro viruses and Internet related viruses, such as worms and email bombs.

You will find: Links to all major Anti-Virus companies and public services. Frequently updated (daily!) security alerts. Links to time-limited trial & free antivirus scanners, firewalls and Trojan horses cleaning software. Online antivirus scanners and virus removal tools.

You will not find: Links to virus sources in any form (binary, compiled or text) and virus creation tips or tools (DYOFDW).

Link to 'virusall.com': If you find the presented information useful in any way for your personal or business web site, please send an email to the webmaster and a review will take place ASAP. Always nice to know our work is appreciated :-)

Broken Links: In order to keep the information presented as accurate as possible, please email any broken links to the webmaster. Thanks for your cooperation.

BTW, be sure to check out the 'Tips & Tricks' at the Security page.

  Advertising

DHL for You
Use 'DHL for You' for easy package sending in the Netherlands!


Save 10% off top Norton Products with Coupon Code 10NAMNORTONSTORE


Save now - 25% off - 2 year license of ESET NOD32 Antivirus 4


Save 20% on Trend Micro™ Titanium™ Maximum Security! Coupon Code: titanium20


Norton 360 Version 5.0 3 Year Protection


ZoneAlarm Internet Security Suite 2012 - Save 50%


  Latest Threats


F-Secure

Backdoor!Online

This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.

Trojan!Online

This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known trojans.

Gen:Variant.Application.Bundler

Gen:Variant.Application.Bundler identifies software that is distributed bundled together with other components or programs.

Trojan.Phishing

Phishing trojans are files that are designed to look legitimate, but are really delivery vehicles for malware. The trojans are usually distributed as file attachments to email messages which are crafted to look legitimate. If the file is opened, embedded code will either drop and install malware onto the user's device, or will download malware from a remote site to install on the device.

Trojan.Poweliks

The Poweliks trojan installs its malicious code in a registry key in the Windows registry. Depending on the variant, the trojan may download additional malware onto the affected machine, perform clickfraud or carry out additional instructions from a remote attacker.

Symantec

Trojan.Lodarat

Risk Level: Very Low. Type: Trojan.

Backdoor.Doublepulsar

Risk Level: Very Low. Type: Trojan.

Trojan.Darkpulsar

Risk Level: Very Low. Type: Trojan.

SMG.Ransom!gen

Risk Level: Very Low. Type: Trojan.

JS.Downloader.H

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlck!g143

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlck!g148

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen90

Risk Level: Very Low. Type: Trojan, Virus, Worm.