top of page

In PCs, an infection is a project or programming code that repeats by being duplicated or starting its replicating to another system, PC boot area or report. Infections can be transmitted as connections to an email note or in a downloaded document, or be available on a diskette or CD. The quick wellspring of the email note, downloaded record, or diskette you've gotten is normally ignorant that it contains an infection. Some infections wreak their impact when their code is executed; different infections lie torpid until circumstances cause their code to be executed by the PC. Some infections are benevolent or lively in aim and impact ("Happy Birthday, Ludwig!") and some can be entirely unsafe, deleting information or creating your hard circle to require reformatting. An infection that repeats itself by resending itself as an email connection or as a component of a system message is known as a worm.

A specialized bolster trick (frequently truncated technical support trick) alludes to class of phone extortion exercises, in which a trickster cases to offer a real specialized bolster administration, regularly by means of chilly calls to clueless clients. 

Remote desktop programming is utilized to interface with the casualty's PC, and the trickster then uses an assortment of certainty traps that utilize different Windows segments and utilities, (for example, the Event Viewer), outsider utilities, (for example, rebel security programming), and different undertakings to make the casualty trust that the PC has issues that should be settled, before continuing for the casualty to pay for "support". 

In English-talking nations, for example, the United States, United Kingdom and Australia, such icy call tricks have happened as right on time as 2008 and essentially begin from call focuses in India.

Virus hoax

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know.

Recognizable proof 

Most deceptions are breathtaking in nature and effortlessly distinguished by the way that they show that the infection will do about unthinkable things, similar to explode the beneficiary's PC and set it ablaze, or less hair-raisingly, erase everything on the client's PC. They frequently incorporate fake declarations asserted to begin from legitimate PC associations together with standard news media. These false sources are cited keeping in mind the end goal to give the fabrication more believability. Normally, the notices use emotive dialect, stretch the pressing way of the risk and urge perusers to forward the message to other individuals as quickly as time permits. 

Infection lies are normally innocuous and perform simply irritating individuals who recognize it as a lie and waste the season of individuals who forward the message. By the by, various deceptions have cautioned clients that imperative framework documents are infections and urge the client to erase the record, perhaps harming the framework. Case of this write incorporate the jdbgmgr.exe infection deception and the SULFNBK.EXE lie. 

Some consider infection lies and other chain messages to be a PC worm all by themselves. They imitate by social designing—misusing clients' worry, lack of awareness, and hesitance to research before acting. 

Lies are particular from PC tricks, which are safe projects that perform undesirable and irritating activities on a PC, for example, haphazardly moving the mouse, flipping around the screen show, and so on.

Actions

Anti-virus specialists agree that recipients should delete virus hoaxes when they receive them, instead of forwarding them.

McAfee says:

We are advising users who receive the email to delete it and DO NOT pass it on as this is how an email HOAX propagates.

Recommends:

Do not forward hoax messages.

Hoax warnings are typically scare alerts started by malicious people – and passed on by innocent individuals that think they are helping the community by spreading the warning.

Corporate users can get rid of the hoax problem by simply setting a strict company guideline: End users must not forward virus alarms. Ever. It's not the job of an end user anyway. If such message is received, end users could forward it to the IT department but not to anyone else

 

How tech support scams work

Cold calls from fake Microsoft (etc) agents

Usually from India and operating out of boiler rooms, these scammers call people in the U.S, Canada, the UK, and Australia whom they find in the phone directory.

The scam is straightforward: pretend to be calling from Microsoft, gain remote control of the machine, trick the victim with fake error reports and collect the money.

If you ever get a call from a Microsoft or Windows tech support agent out of the blue, the best thing to do is simply hang up. Scammers like to use VoIP technology so their actual number and location are hidden. Their calls are almost free which is why they can do this 24/7.

As per Microsoft:

​

Getting help if you have been scammed

Getting defrauded is one of the most exceedingly awful emotions to encounter. From various perspectives you sense that you have been disregarded and are truly irate to have disappointed your watchman. Maybe you are even stunned and terrified and don't generally comprehend what to do now. The accompanying tips will ideally give you some direction. 

In the event that you as of now let them in 

Disavow remote access (if uncertain, restart your PC). That ought to cut the remote session and show them out of your PC. 

Filter your PC for malware. The lowlifes may have introduced secret key stealers or different Trojans to catch your keystrokes. Utilize a project, for example, Malwarebytes Anti-Malware to rapidly recognize and evacuate dangers. 

Transform every one of your passwords (Windows watchword, email, saving money, and so on). 

Now and again (you didn't pay or called them names), con artists will look for retribution on your machine. Here are a few things they may attempt and what to do to recuperate from them: 

Expert secret key lock out 

There are different "hacks" to reset that secret key. One technique is to utilize a Linux boot CD to mount Windows and after that utilization the chntpw utilty. It is portrayed here. 

Missing programming drivers 

To start with, attempt to do a System Restore. On the off chance that it comes up short, you ought to have the capacity to reinstall them by setting off to the maker's site and download the proper driver. 

Missing documents 

To begin with, attempt to do a System Restore. On the off chance that it is not accessible, check for reinforcements you may have made and put away elsewhere. If all else fails, there are projects that can rub your hard drive and endeavor to recuperate the missing documents. 

On the off chance that you officially paid 

Contact your money related establishment/Visa organization to turn around the charges and keep an eye for future undesirable charges. 

In the event that you gave them individual data, for example, date of birth, Social Security Number, full address, name and original surname you might need to counsel the FTC's site and report wholesale fraud.

​

Reporting the scam

Shut down their remote software account

  • Write down the TeamViewer ID (9-digit code) and send it to TeamViewer’s support (they can later on block people/companies with that information)

  • LogMeIn: Report abuse

Spread the word

You can raise awareness by letting your friends, family, and other acquaintances know what happened to you. Although this may be an embarrassing experience if you fell victim to these scams, educating the public will help someone caught in a similar situation and deter further scam attempts.

Investigate

While hanging up is the safest thing to do when you get a cold call, some people have gone on a mission to expose those scammers. While we don’t endorse this behaviour, if you do have information to share, please let us know and we will update this page with any new relevant details.

Thank you so much, it really helps, all the information is true.

​

amanda, Newark

This information heled me a lot , now i will provide my computer access to geniue company

​

John Smith, Brooklyn, NY

what is virus

What is Anti-Virus Software?

Against infection programming is a project or set of projects that are intended to counteract, hunt down, recognize, and evacuate programming infections, and different vindictive programming like worms, trojans, adware, and the sky is the limit from there. 

These instruments are basic for clients to have introduced and a la mode in light of the fact that a PC without hostile to infection programming introduced will be contaminated inside minutes of associating with the web. The siege is consistent, with hostile to infection organizations upgrade their discovery devices continually to manage the more than 60,000 new bits of malware made every day. 

There are a few distinct organizations that fabricate and offer hostile to infection programming and what every offers can differ however all play out some fundamental capacities: 

Check particular documents or catalogs for any malware or known pernicious examples 

Permit you to timetable sweeps to consequently keep running for you 

Permit you to start a sweep of a particular record or of your PC, or of a CD or glimmer drive whenever. 

Evacuate any vindictive code distinguished –sometimes you will be advised of a contamination and inquired as to whether you need to clean the document, different projects will naturally do this in the background. 

Demonstrate to you the "wellbeing" of your PC 

Continuously make sure you have the best, exceptional security programming introduced to ensure your PCs, portable PCs, tablets and cell phones.

​

Types of Computer Security Threats and Risks

The types of computer security threats

1. Trojan. Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. It has the ability to hide itself from antivirus detection and steal important banking data to compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damage starting from your own computer to your online account.

2. Virus. Looking at the technology 10 years back, Virus is something really popular. It is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. It is not so popular today because Malware today is designed to earn money over destruction. As a result, Virus is only available for people who want to use it for some sort of revenge purpose.

3. Worms. One of the most harmless threats where it is program designed only to spread. It does not alter your system to cause you to have a nightmare with your computer, but it can spread from one computer to another computer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread.

4. Spyware. Is a Malware which is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. Such as if you browse on sex toys for a week every day, the attacker will try to come out with a sex toy scam to cheat on your money.

5. Scareware. Scareware is something that plant into your system and immediately inform you that you have hundreds of infections which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. It is all about cheating your money but the approach is a little different here because it scares you so that you will buy.

6. Keylogger. Something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password. It is also usually a sub-function of a powerful Trojan.

7. Adware. Is a form of threat where your computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying.

8. Backdoor. Backdoor is not really a Malware, but it is a form of method where once a system is vulnerable to this method, attacker will be able to bypass all the regular authentication service. It is usually installed before any virus or Trojan infection because having a backdoor installed will ease the transfer effort of those threats.

9. Wabbits. Is another a self-replicating threat but it does not work like a Virus or Worms. It does not harm your system like a Virus and it does not replicate via your LAN network like a Worms. An example of Wabbit’s attack is the fork bomb form of DDoS attack.

10. Exploit. Exploit is a form of software which is programmed specifically to attack certain vulnerability. For instance if your web browser is vulnerable to some out-dated vulnerable flash plugin, an exploit will work only on your web browser and plugin. The way to avoid hitting into exploit is to always patch your stuff because software patches are there to fix vulnerabilities.

11. Botnet. Botnet is something which is installed by a BotMaster to take control of all the computer bots via the Botnet infection. It mostly infects through drive-by downloads or even Trojan infection. The result of this threat is the victim’s computer, which is the bot will be used for a large scale attack like DDoS.

12. Dialer. This threat is no longer popular today but looking at the technology 10 years back or more where we still access the internet using a dial-up modem, it is quite a popular threat. What it does is it will make use of your internet modem to dial international numbers which are pretty costly. Today, this type of threat is more popular on Android because it can make use of the phone call to send SMS to premium numbers.

13. Dropper. Looking at the name, a Dropper is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor. There are two types of Dropper where one is to immediately drop and install to avoid Antivirus detection. Another type of Dropper is it will only drop a small file where this small file will auto trigger a download process to download the Malware.

14. Fake AV. Fake Antivirus threat is a very popular threat among Mac user about 10 months ago. Due to the reason that Mac user seldom faces a virus infection, scaring them with message which tells them that their computer is infected with virus is pretty useful where it results them into purchasing a bogus antivirus which does nothing.

15. Phishing. A fake website which is designed to look almost like the actual website is a form of phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim. Every form sent out from the phishing site will not go to the actual server, but the attacker controlled server.

16. Cookies.Cookies is not really a Malware. It is just something used by most websites to store something into your computer. It is here because it has the ability to store things into your computer and track your activities within the site. If you really don’t like the existence of cookies, you can choose to reject using cookies for some of the sites which you do not know.

17. Bluesnarfing. Bluesnarfing  is all about having an unauthorized access to a specific mobile phones, laptop, or PDA via Bluetooth connection. By having such unauthorized access, personal stuff such as photos, calender, contacts and SMS will all be revealed and probably even stolen.

18. Bluejacking. Bluejacking is also uses the Bluetooth technology but it is not as serious as Bluesnarfing. What it does is it will connect to your Bluetooth device and send some message to another Bluetooth device. It is not something damaging to your privacy or device system compared to the Bluesnarfing threat.

19. DDoS. One of the most famous thing done by Anonymous, which is to send millions of traffic to a single server to cause the system to down with certain security feature disable so that they can do their data stealing. This kind of trick which is to send a lot of traffic to a machine is known as Distributed Denial of Service, also known as DDoS.

20. Boot Sector Virus. It is a virus that places its own codes into computer DOS boot sector or also known as the Master Boot Record. It will only start if there it is injected during the boot up period where the damage is high but difficult to infect. All the victim need to do if they realize there is a boot sector virus is to remove all the bootable drive so that this particular virus will not be able to boot.

21. Browser Hijackers. A browser hijacker uses the Trojan Malware to take control of the victim’s web browsing session. It is extremely dangerous especially when the victim is trying to send some money via online banking because that is the best time for the hijacker to alter the destination of the bank account and even amount.

22. Chain Letters. When I was small, I got tricked with chain letters written by my friend. But chain letters does not stop at that era. It brings to adult life as well where people like to send chain letter such as Facebook account delete letter. It usually says if you don’t forward that particular message or email to 20 people or more, your account will be deleted and people really believe that.

23. Virus Document. Virus today can be spread through document file as well especially PDF documents. Last time, people will only advice you not to simply execute an EXE file but in today’s world with today’s technology, document file should also be avoided. It is best if you use an online virus scanner to scan first before opening any single file which you feel it is suspicious.

24. Mousetrapping. I am not too sure whether you had encountered a Mousetrapping Malware before where what it does is it will trap your web browser to a particular website only. If you try to type another website, it will automatically redirect you back. If you try clicking forward/backward of the navigation button, it will also redirect you back. If you try to close your browser and re-open it, it will set the homepage to that website and you can never get out of this threat unless you remove it.

25. Obfuscated Spam. To be really honest, obfuscated Spam is a spam mail. It is obfuscated in the way that it does not look like any spamming message so that it can trick the potential victim into clicking it. Spam mail today looks very genuine and if you are not careful, you might just fall for what they are offering.

26. Pharming. Pharming works more or less like phishing but it is a little tricky here. There are two types of pharming where one of it is DNS poisoning where your DNS is being compromised and all your traffic will be redirected to the attacker’s DNS. The other type of pharming is to edit your HOST file where even if you typed www.google.com on your web browser, it will still redirect you to another site. One thing similar is that both are equally dangerous.

27. Crimeware. Crimeware is a form of Malware where it takes control of your computer to commit a computer crime. Instead of the hacker himself committing the crime, it plants a Trojan or whatever the Malware is called to order you to commit a crime instead. This will make the hacker himself clean from whatever crime that he had done.

28. SQL Injection. SQL injection does not infect the end users directly. It is more towards infecting a website which is vulnerable to this attack. What it does is it will gain unauthorized access to the database and the attacker can retrieve all the valuable information stored in the database.

© 2016 virus security

  • w-facebook
  • Twitter Clean
bottom of page