Virus And Anti-Malware

It is vital that you take control of your web security to avoid users accidentally straying onto malicious websites.


Virus And Malware Removal

If no don’t have quality Anti-Virus and Malware protection you your friends and business colleges will be vulnerable data and personal info risks.

Having A Good Management Plan

Having a good Anti-Virus and Malware management plan in place for all your computers and devices will protect you from unwanted breaches

If you think your PC might be infected with a virus, spyware, or other malware

even if you have an antivirus program installed. This problem can be fixed by the right support tech that is educated in this issue.

It is vital that you take control of your client’s web security to avoid users accidentally straying onto malicious websites.


Ransom-ware is one of the newest forms of viruses and it’s also the nastiest. Ransom-ware is a software program that automatically searches your hard drive for specific file extensions such as .PPT, .DOC, or .XLS. Some ransomware software also searches for images on the hard drive such as JPG or PNG files. These files are usually important to the end user and that’s what the ransomware creator banks on. The malware encrypts these files and displays a message that you must pay a ransom to get the decryption key. The ransom doubles if you don’t pay within a certain amount of time. Because the files are encrypted with strong security, you can’t get them back without the key. Fortunately, the key is usually stored with the malware software, so some users are able to get back files without losing data.

Even if you pay the ransom, there is no guarantee that the malware writer will release your files. Some people pay the ransom hoping they get the key in return. Experts suggest that you shouldn’t pay the ransom, but some people pay the ransom anyway.

These files usually hide in executable files that are advertised as software updates. The objective is to get you to pay a ransom, so you know you have ransomware if you receive the blackmail message. Even if you don’t pay the ransom, it’s imperative that you clean the virus off of your computer. If you don’t clean it off your computer, the virus can encrypt more files at a later date.

Spam Viruses

In some cases, the malware writer wants to spread emails that contain a phishing site. Spam viruses have two parts. The first part infects your computer, and the second part grabs a list of contacts and emails them a link to the hacker’s phishing page. Because the email comes from a trusted source, your recipients are more likely to open the email and enter information. The hacker relies on the trust factor you have with your email contact list.

These viruses work in the background, so there aren’t many signs that your computer is infected. The biggest red flag is in your email. The virus chooses contact addresses randomly, so old contacts might not be valid anymore. When the virus attempts to contact old email addresses, you receive an error message in your inbox that says the message delivery failed. Usually, these error messages display the email message sent by the hacker. If you don’t recognize the message, you know that your computer is infected. These error messages are also useful when your email account is hacked. Hackers randomly target recipient emails that no longer function, so you receive bounce-backs that alert you to a hacker or malware running on your computer.

Browser Hijackers

Browser hijackers are hard to identify if you don’t pick up on the behavior patterns. These viruses send you to a different home page such as a gambling site or an ad site. Users generally think the browser software developer or a search engine company is responsible for the changes. Some browser hijackers also create popups or unwanted adware. These popups could happen randomly regardless if the browser is open, or the malware creators try to hide the adware by only opening it when the browser is active. These programs are more annoying than malicious. You can perform a search online to find ways to disable the software or use antivirus software to clear the program from your hard drive.

Keyloggers and Identity Theft

Keyloggers are small programs that run on your computer and capture each keystroke. Good keyloggers even keep track of the software used to enter the input from the keyboard. They can even be configured to take screenshots of your computer screen at specified intervals. These programs then silently send the information to a central server where the hacker can identify the programs and information. Clearly Keyloggers are a very dangerous type of computer virus. Keyloggers are generally used to capture account and password information. The hacker uses this information to then log in to your accounts and steal data. Hackers can steal minor account details or critical information such as credit card numbers and banking credentials. Keyloggers are also used for identity theft to gain access to your social security data.

Mobile App Viruses and Spyware

Most people don’t consider the relationship between mobile devices and viruses. Mobile viruses are slowly popping up in the industry, and these viruses are meant to steal mobile data. Users add banking and personal information to mobile phone storage every day. If you don’t protect that data, you give virus makers the ability to steal it and silently send the data to a hacker. Most mobile phones don’t have firewall applications that alert users to Internet connections, so mobile users are completely unaware that data is being sent from a mobile device. BYOD (bring your own device) security is also a new concern for most IT managers who must allow access to Wi-Fi hotspots for the company but protect rogue viruses from penetrating the corporate network.

Mobile device operating systems have better security in place to sandbox each app from the others, but you should still take precautions. There are some mobile device apps specifically for tablets and smartphones to protect against these new viruses.

DoS Bots or Botnets

Today’s bandwidth and web servers are too powerful for a simple denial of service (DoS) attack. Today, hackers need several computers to perform a distributed denial of service (DDoS) attack. DDoS attacks use several computers to send requests to web servers all at once. In a standard DoS attack, a program is used to send multiple requests to a web server. Today’s servers are able to mitigate these requests with little slowdown issues. A DDoS uses thousands of computers to flood a web server. The result is that small web servers aren’t able to handle the flood of requests and shuts down.

For a hacker to use several machines at once, he must infect computers with software used to control them. When the hacker has enough infected computers, he sends them a message silently and the computers flood the target with requests without the owners’ knowledge. These computers are said to be a part of a botnet. These viruses give hackers the ability to control your computer without your knowledge, so they can also steal information and read your emails. The biggest red flag is when the botnet attacks a web server. Your computer slows down and your bandwidth is saturated with requests, which means web pages load slowly for you.

This is the basic level of customer support. The customer representative is a generalist with a broad understanding of the product and may not understand the inner workings. In this case, they would identify a customer’s needs and provide tips on how to manage a problem Typically, these solutions are in a FAQ or a knowledge base. Employees at this tier use a knowledge base in a majority of customer calls. Tier-1 support usually provides a 24-hour service and is outsourced to a 3rd party. When a tier-1 support employee is not able to resolve the issue, they classify the problem and pass it on to the appropriate tier-2 employee. At this point, an issue tracking ticket is issued to the customer.

Tier-II support involves technical knowledge and is staffed by technicians who have troubleshooting capabilities beyond the tier-1 employees. The tier-II help desk employees are staffed by either the company involved or outsourced to a 3rd party. The technicians tend to have a specialization and will determine which specialization best matches the customer’s needs before helping him. If their technical specialization is one that can help the customer, the tech then determines whether this problem is a new issue or an existing one. Advanced diagnostic tools and data analysis may be done at this point.

If the issue is an existing one, the tier-II specialist then finds out if there is a solution or a workaround in the database. The customer is then told how to fix their problem. However, in some cases there might be no solution as it’s an open bug. In that case, the tier-II desk adds an entry to the bug list. Then, depending on the number of instances where customers are experiencing the same problem, the help desk could ask the developers to fix the bug.

If a customer experiences a new issue, further analysis has to be done to see if it can be dealt with. The help desk employee would then explain to the customer how to fix their issue. However, if the tech cannot fix the problem at this tier, the problem goes to tier-III. At this tier the problem is assigned to a developer at the company responsible for the product.

Tier-III requires a person who has specialized skills over and above the work the techs do in tier II. This support is usually provided by the specialists involved in product development. They deal with complex issues. To solve the problem, they will collect as much data as possible from the employees at tiers 1 and 2.

In my previous job as a developer at Microsoft in the Windows OS team, I used to get the harder bugs in the operating system passed on from support personnel around the world and from the crash dumps you report when an application stops working. Sometimes fixing the problem involves a deeper analysis of the operating system. Fixing the problem may require a Windows update.

This tier only exists in a multiple vendor case. For instance, if you’re an app developer and the issue involves fixing the problem on an OS mobile level provided by another company, you simply request support from the other company.


For More Information

Family Plans

Family Setup

8 + 14 =

For More Information

Business Plans

Business Setup

6 + 15 =

World Wide Web

MSP and IT

support services since 2010

Nu-Age MSP

P.O. Box 2653

Oragevale, Ca. 95662


Monday thru Friday

Office: 10:00 to 4:00

Closed Sat. and Sun.

Client Hours: 24/7

Pin It on Pinterest

Share This