|
MicroFake.ba sans doute. Il attaque en conjonction avec les applications antispyware Rogue et forces les utilisateurs d'acheter ces applications faux. Utilisez les techniques rootkit est très typique de ce cheval de Troie pour l'aider à cacher de les utilisateurs et le système, ce qui rend difficile à retracer.
|
|
Among one of the most active spywares currently is without a doubt Trojan.MicroFake.ba. It attacks in conjunction with Rogue antispyware applications and forces users to purchase these fake applications. Using rootkit techniques is very typical of this Trojan to help it hide from users and the system, making it hard to trace. We recommend regular updating of our database and an active real-time protection with antivirus.
|
|
Among one of the most active spywares currently is without a doubt Trojan.MicroFake.ba. It attacks in conjunction with Rogue antispyware applications and forces users to purchase these fake applications. Using rootkit techniques is very typical of this Trojan to help it hide from users and the system, making it hard to trace. We recommend regular updating of our database and an active real-time protection with antivirus.
|