Spruce Grove On-site Business Services

10% Off Malware and Virus Removal Services July 22 - August 3

Virus, Malware and Malicious Software Removal Services

PC Virus Detection, Identification, Removal and Mitigation Solutions

Malware Solutions for Computer Networks

malware detection and removal services Celter Technologies Computer Repair & Service employs tools and strategies for disinfecting client's PCs, notebooks, servers and networks in Spruce Grove, Stony Plain, Acheson and Parkland County of computer malware and other malicious software. Most of the time our clients detect the nasty software and then bring it to our attention. There are times when computer equipment is brought to us with a lone detail of being ridiculously slow. The next step is identifying the rogue piece of code. The majority of the time the bug is only adware or some other PUP (potentially unwanted progam). There is, on occasion, software written with malicious intentions that will make it to your machine. Sometimes, these can be sensitive code bits to deal with. We classify malware in four categories:

  •   

If you are currently in a battle with one of these bad guys or you need to discover why your computer or laptop has been under the weather lately, Call Celter Technologies Computer Repair & Service for an examination today - 780-905-5624.

 

Adware and PUPs (Potentially Unwanted Programs)

PUPs and adware software designed by corporate marketers to shape your experience from the habits you display while using your computing device. They're relatively harmless from the standpoint of; they don't cause damage to data nor hardware. They're just annoying and sometimes leave you wondering; how do they know I was interested in that? This type of software will usually make it's way on to your device, tagging along with an install of a wanted program. Java runtime software is an example of software that you might install, but a toolbar and other adware pieces will come along with it. You may notice default boxes checked that notify you of what is getting installed. When you're aware of this, it is easy to uncheck this unwanted software. Celter Technologies can usually rid your computing device of these critters in an hour or less.

 

Phishing and Browser Attacks

The first of our malicious categories of malware. An email dressed up to look official but is not. The link appears to take you to a familiar site, but it's not. Phishing can be a very damaging attack which no one will be able to rescue you from the damage already done if you click on one of those links and decide that link takes you to a safe place to enter your credentials - say, to an online bank. The bad guys now have what they need to really go to your online bank and use the credentials that you just supplied them on their website could damage you financially. It is important, however, to roll out the damage control at this point and call the bank if they're not in the process of already calling you.

When people ask us how to avoid this trap in the future, we explain that it is hard. As a rule, personally, I make sure that when I receive an email about something that needs attention, instead of clicking the link, I open my browser and use my bookmark (that I created) to go to the site I need to check. This way I can ensure I am going to the correct place. This is also a great rule to use when approached by phone. Instead of taking their word for it over the phone, why not get a reference number and pursue the number yourself and call back using the reference number. This won't be a hassle to legitimate people doing legimite business, because they understand the issues behind identity theft.

If you do find yourself in a position where your credentials are in the hamds of crooks and thieves, give us a call (after you have contacted the appropriate authorities) and we will be thorough about making sure there were no tracks left behind to further take advantage of you. It is not uncommon for the bank to contact you and inform you that online banking will cease until you can prove your computer has been cleaned of any malware that they detected while your computer or your credentials tried to access your banking information online. Talk to us about keeping the bad guys out at 780-905-5624.

 

System and Network Attacks

System and network level attacks are designed to propogate and cause severe damage in most cases. If you're unfortunate enough to get hit by one of these, you're probably wondering how it happened? This type of malware can also be started by phishing or from browsing websites which carry a payload. A payload is a piece of software that runs on your computing device and this would be considered a virus. An exammple of this is ransomeware and if you have ever had to deal with your files being encrypted by someone other than yourself, well, the authorities want you to learn a lesson and lose your data and never pay the ransom! People and especially businesses will decide the price is to high to not recover the data and end up paying the ransom. Regular backups is the best strategy against this type of attack. With Cloud computing beginning to mature, there are also other fantastic viable options. Ask us about strategies that allow you to keep your data safe and out of the reach of bad actors.

 

Hardware Level Attacks (BIOS & Firmware)

We believe that hardware level attacks can be the most damaging of all. The complexity that goes into the code that produces these weapons of data destruction also takedown hardware or affect it in ways that seem perplexing to the user. The authorities will sometimes use this type of attack to shutdown hackers and theft rings around the globe. Meltdown and Spectre have been infamous in recent history affecting Intel and AMD CPUs and a lot of resources were spent to help ensure the attack from these two malwares have minimal impact in the future. An attack of this level should be reported to the authorities immediately, because there is potential of the malware to be an existential threat to society. We hope you don't have the opportunity to observe this threat.