Trojan Horse Dropper.heliosb.i & Trojan.win.32.obfuscated.gx

By: Sherman Choo

Trojans find there way to your computer because your downloaded it from a site and it was executed. Trojans usually are small .exe programs. It can also enter your computer by a malicious email attachment.

Trojans vary from annoyance to more serious financial loss. Hackers can gain backdoor entry to your computer and access confidential information such as credit card, social security number, or sensitive data you just want to keep private.

Examples of common Trojan are:
1. Trojan.win.32.obfuscated.gx

You may get an error message telling you that your browser was infected by trojan.win.32.obfuscated.gx. and you need to clean your system immediately or it will crash.

2. Trojan Vundo B and variants

This little bugger will cause pop ups to appear on your Internet Explorer browser everytime you log on to the internet and try to open a new page. If you have IE 6.0 and above with tab browsing feature, you will have multiple advertisements appear as new tabs. The anti virus I had could locate the problem but was unable to solve this trojan. It would say that the trojan was detected but unable to clean this error.

3. Trojan Horse dropper.heliosb.I
This one can be detected and quarantined. It will still lurk in your computer after you move the file to the recycle bin.

Because Trojan variants can be found around the web, you can keep your computer safe by installing the best trojan shield. This detects incoming and suspicious files in your email, and can also warn you just before you plan to download a file.

Security
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 

» More on Security
 



Share this article :
Click to see more related articles