Showing posts with label malware. Show all posts
Showing posts with label malware. Show all posts

Friday, December 17, 2010

Free Spyware- Malware Remover for Christmas

Give some free great gifts for the holidays. SuperAntiSpyware is a world-class virus and malware remover that is a must have on every computer worldwide. The new updates are available several times per day and the ability to rid computers of malware is increasingly efficient with Super Anti-Spyware.

PC Virus Doctors have used Super AntiSpyware for years and it is a very efficient tool for eliminating malware.

Friday, August 6, 2010

Care Should Be Taken On Search Results and Malicious Software

Care should be taken in regards to malicious software and search results. Tests, performed by Barracuda, confirm that search engines are serving up websites that have malicious software installed behind the scenes on web pages that are served up on results to be reviewed by searchers. These infected web pages will ultimately result in computer repair or support as the technical difficulty in removing these PC infections can be overwhelming for an amateur.
The most popular searches turning up malware were:
  1. Spy ware related searches
  2. Entertainment subjects/news
  3. P2P and proxy related searches
Cyber criminals are automatically syndicating the web's buzz to accelerate their attempts to successfully install malware/trojans/viruses. These techniques are called blackhat SEO where cyber criminals try to mix legitimate techniques with criminal behavior and often are successful resulting in damaged operating systems that often times cripple computers.
All PC users should ensure their antivirus and antispyware products are up-to-date at all times to avoid computer repairs.

Saturday, November 28, 2009

Anti-Virus/Malware Programs are Essential

PC Virus Doctors uses multiple anti-spyware/virus/trojan/malware removers to ensure that PCs stay as secure and clean as possible. Today's computing environment requires internet interaction to access emails and websites for information needed to run business and personal correspondance to keep our personal lives and businesses running as smoothly as possible.

There is always the threat of an infected email that finds its way into computers or embedded programs that are surreptitiously installed on legitimate websites. Many of these malwares, viruses, etc. are difficult to extremely difficult to uninstall and often times causes PCs to not be able to access the internet.

An anti-virus article on InformationWeek talks about the continuing necessity of malware removers regardless of increasing security in operating systems regardless if they are Windows, unix or linux. "Zero day attacks" exploits occur as malware authors seek out vulnerabilites in systems.

PC Users can Minimize Malware by:
  1. Don't use file-sharing
  2. Don't open attachments
  3. Be careful when installing software
  4. Be cautious when visiting websites
  5. Make sure you are using the most up-to-date browser
  6. Be sure the latest patches and updates are applied to the operating system
  7. Update Java
  8. Use the latest version of Adobe
Restore Points for Protection:

Users can assure restore points are available by peering into restore points via start>all programs>accessories>system tools>system restore and then clicking next to see if dates are listed in bold print and clicking on one or more to ascertain if a restoration is possible at certain dates clicked on and specific times and whether adding programs or removing programs is listed under the times in order to reverse undesirable computer behavior when those programs were installed or uninstalled.

Saturday, July 11, 2009

BotNet Worm Could Wipe Data on Infected Computers

A report on Cnet indicates that the botnet that attacked the United States and South Korea last weekend harnesses a worm that was scheduled to be activated this Friday, July 11th, to wipe data from infected computers that are estimated to number 50,000 worldwide with the w32.dozer malware infection. Currently, there appears to be no data deletion on infected PCs but experts say that it is too early and that the malware has the potential to be turned on/activated remotely by the malware authors, one botnet expert predicted, unless there is a bug in the program.

Symantec expertise reports that the malware can also be set to destroy the master boot record leaving a computer inoperable and unable to boot to the operating system. The botnets are spreading several different malware, including MyDoom, through emails, according to several experts. A dropper program called W32.Dozer with other malware compenents is sent by W32.Mytob!gen to e-mail addresses on effected PCs and if a user executes the attachment, W32.Dozer drops Trojan.Dozer and W32.Mydoom.A@mm on the operating system.

The installed malware has the ability to update itself and execute as it wishes according to commands that are controlled by the malware authors.

PC Virus Doctors' urge computer users to make sure all anti-viruses, spyware and adware programs are updated and scanned at minimum twice per week as these lethal software programs are lurking in the wild. If anyone needs assistant then please contact PC Virus Doctors for Dallas virus removal.

Sunday, April 5, 2009

Conficker Stalls But Not Over

OK, the Conficker scare has subsided but let's stay aware that anything is possible as this downloading trojan waits for executable instruction(s). The programmers controlling this malware or either intimidated or have other future plans it appears. The authors of the malware are so ingenious that they have yet to be dismantled after years of operations overseas. They continue to financially hurt companies instantly in many fashions to cripling finances, technical operations, etc. bringing an online or physical mortar store to a grinding halt where no longer transactions could be made due to online monetary transaction problems, lack of ability to order items due to online downtime and many other disastrous scenarios.

Tuesday, May 13, 2008

Dallas Computer Repair- Virus Removal Tip

PC Virus Doctors' Dallas Computer Repair consistently receives machines, whether desktops or laptops, that owners do not know how to effectively remove malware. Anti-virus software installed on owners machines often will not detect the most recently released viruses, trojans, adware and spyware. Other defects of anti-virus programs are that they become corrupt with malicious software installed surreptitiously by websites or downloaded programs.

A very effective alternative to installed anti-virus programs are online scanners from well-known anti-malware vendors such as Trend Micro that specialize in malware removal. These online scans eliminate the need to question whether the installed malware removal tools are corrupt and unable to remove unwanted issues. The online scans will scan portions of the computer or the whole system and will allow users to choose to delete the items from the drive.

The advantages also include the fact that the online scanners are the latest up-to-date virus signatures, uncorrupted scanners and the ability to accurately detect malicious items on the computer. If the online scanners cannot remove the unwanted items at least they will have identified the malware and possibly the location where the software resides on the drive.

An important note for virus removal is that each tool or scan that can eliminate just one piece of malware brings the machine one step closer to becoming a virus-free machine. Contact PC Virus Doctors' Dallas Computer Repair for a thorough hard drive cleaning.

Friday, March 2, 2007

HckPk- the Latest and Greatest

Like we at Dallas Computer Repair don't have enough malware to recognize and neutralize, now there is a new technique employed to hide the old mainstay malware with masks that make them appear as unique or new when they are simply disguising who they really are.

A few weeks ago while laboring over a laptop repair, PC Virus Doctors could not find any malware although all the malicious software symptoms were present. Many scanners were employed, including online scanners and nothing was showing up. A rootkit was then suspected, however, no rootkit scanners were picking anything up.

The authors of Dref and Dorf have used several masks to hide their viruses and they can morf the masks into thousands of variations, according to Information Week's latest article. HckPk, the masking piece of malware, accounted for over half of malware seen in February's infections with over 6,000 variations. When the worm Storm hit the internet it morphed over 1,500 times the first weekend according to the ant-virus vendor Sophos.

As HckPk is able to mask and hide itself within conventional malware and be tweaked and tuned by virus writers it will leave anti-virus vendors with a hefty workload trying to figure out how to put a stop to the problem Not only is the unlimited morphing an issue but each morphed version must first have its code unraveled.

The solution to this new problem will no doubtedly bring a new module of anti-virus scanning to the heuristic model. That being said, with the morphing appears to have no set limits on how it changes so it looks like the anti-virus engineers will have their work cut out for the for quite some time.

The big boy vendors like McAfee and Norton, reputedly sequester their anti-virus teams until they can identify the malware and provide a "fix", may be in for a long-haul.

Break out the coffee pots boys and girls. It's going to be a long picnic.

Wednesday, February 21, 2007

Chinese Hackers

Can we not keep these Chinese hackers out of the United States. Nuke 'em all. Those asses bring nothing but malware and spyware to our nation. Why can't we just pull the plug on them and stop them at the gate. All we do is allow these communists to access our technology and then turn around and use it on us like the freakin' alqueda. Nothing but a bunch of dirt trash ready to come into our house and steal our gold.

Be prepared with firewalls people and anti-viruses be prepared or be ready to accept the consequences as these overseas hackers are not just trying to get into our government installations but into our homes and businesses to see what they can get their hands on. And the latest reports say our military suspects the overseas hackers are acting in collusion with their government which means not only hacking and covert techniques but also most likely the latest computer equipment to supersede our technology in our homes and businesses.