2011 Personal Internet Security Virus
Trojan Horse
There has been a new malware being spread around lately. The virus does seem like a legitimate program and the warnings do look like they come from windows security. This fools many people into downloading it not realizing that it is malware. Once the malware is downloaded there are warning messages that come up saying that your computer is infected with many viruses and it to click to remove all viruses. Once you click on remove all viruses a website opens up and it where you can buy software to get rid of the viruses. DO NOT BUY this software it is a scam and it will not solve the problem. If you do buy person internet security you will lose your money and open yourself up to credit card fraud. There are tutorials and instructions online to get remove the virus; in the online instructions on many websites tell you to delete the virus by going into your program files. This process is difficult and you can possibly delete important files that your computer needs to operate. If your antivirus does not detect the virus when you do a full computer scan you will have to download a malware removal tool to at least try to rid your computer of the malware. You may have trouble going to antivirus websites depending on how much the virus has infected your computer so you may have to download the program on another computer and then save the program to an USB flash drive. To get rid of the virus you might have to put your computer in safe mode so the virus will stop executing so you can delete all the infected files. If you cannot remove the virus you will have to get windows reinstalled. To avoid this virus don't run any programs unless you trust the website.
Trojan Horse
Beast a Trojan horse program
Many people mistake Trojans as but they often don't spread from computer to computer. Trojans are spread by the user downloading a piece of software that looks legitimate before that install and looks like a legitimate piece of software but instead lets another user access to your computer. Some Trojans may change the user's desktop to display advertisements and some Trojans just install a toolbar in the web browser of the user. Other Trojan Horse infections the computer so person controlling the Trojan software can steal personal information, view the computer screen, download or upload files or log your keystrokes. Hackers don't have to be the person who distributes the virus they can scan a network to see if any computers have the Trojan installed so they can gain access to the computer. Some Trojans can be computer virus by asking a user on an instant messaging network to install the virus. There are Trojans that infect the computer and send messages to instant messenger contacts saying "here is a funny photo of you click on the link to see it" or something similar. Trojan type malware use is becoming more and popular and 83% of all viruses detected are Trojan-type malware. Luckily most times the Trojan infection is detected by anti-virus software before the software is installed so it can't cause any damage. If you suspect you accidently downloaded a Trojan and your anti-virus didn't detect it you should not open the file and have you have your anti-virus do a complete scan of your computer.Computer Worms