This article contains possible solutions for you: http://www.avertlabs.com/research/blog/index.php/2009/05/28/who-digs-the-elephant-trap/
Most often such alert is triggered upon visiting some hacked website.
Thanks for reporting the fraud site. Indeed unpleasant experience. Are you able to provide more details which could help to improve detection...
It's true, a portion of rogues comes via exploits using Adobe products or Java. Sometimes it is enough to visit a hacked legitimate site to...
Category of the potentially unwanted applications include detection of various techniques and technologies frequently abused by malware. That's...
7z format is accepted as well. http://www.7-zip.org/
Java Archives (JAR) files are valid ZIP files.
On demand scan should be run on the infected computers on the network. The potentially unwanted apps and self-extracting archives should be...
Notify me when you will have a version with the 1&2 ready. Another appreciable thing is the pre-release antimalware checking of all released...
The should improve at least the following: 1. Identify the executable as a legitimate application by adding a properly filled VERSION INFO to...
Please submit the cfp.exe http://kb.eset.com/esetkb/index?page=content&id=SOLN141
Versiunea in imagine este ultima actualizare care a fost facuta tarziu aseara. The version in the picture is the latest update which was made...
Meanwhile when I was waiting for the answers and the requested informations I decided to find a reliable way and circumstances how to make the...
I think it is just coincidence and I think the enabling/disabling the PUA does not make a difference at all in this case. Are are able to...
This looks like a false accusation. Joes831 wrote he excluded crossloopconnect.exe and crossloopservice.exe from the protocol filtering and it...
Here: [ATTACH]
To troubleshoot the issue I recommend this: 1. Ensure the proper firewall rules are creates in ESS or start with the NOD32 2. Exclude the...
What kind of exceptions did you add? Exclusion from the real-time scanning or from protocol filtering? By blocking of the the WinVNC_Viewer did...
Why would NOD32 kill a process which is not even detected? It sounds very strange for me. I think it is worthy to try disabling the web-access...
Hidden IFRAMEs are inserted after the end HTML tag. This is a technique used by hackers and malware writers and it is not expected to be seen in...
Using of the run-time packers has more disadvantages than benefits. Packed files takes longer time to start because they must be unpacked 2...
http://www.siteadvisor.com/sites/serviscentr.rv.ua There is an obfuscated JavaScript on the page: [ATTACH]
"9.1 Advertisements. AnchorFree may deliver third-party advertisements (“Advertisements”) within the content of any web page accessed....
I am curious, what is the name of the detection?
Important informations for developers of the legitimate applications who intend to use Themida or similar protectors:...
Separate names with a comma.