PC Computer Virus Detection, Identification, Removal and Mitigation Strategies
Disinfecting Spruce Grove, Stony Plain, Acheson and Parkland County of Computer Malware
Celter Technologies Computer Repair & Service employs tools and strategies to deal with unwanted software. Most of the time our clients detect the nasty
software and then bring it to our attention. There are times when computer equipment is brought to us with a lone detail of being ridiculously slow.
The next step is identifying the rogue piece of code. The majority of the time the bug is only adware or some other PUP (potentially unwanted progam). There
is, on occasion, software written with malicious intentions that will make it to your machine. Sometimes, these can be sensitive code bits to deal with. We
classify malware in four categories:
If you are currently in a battle with one of these bad guys or you need to discover why your computer or laptop has been under the weather lately, Call Celter
Technologies Computer Repair & Service for an examination today - 780-905-5624.
Adware and PUPs (Potentially Unwanted Programs)
PUPs and adware software designed by corporate marketers to shape your experience from the habits you display while using your computing device. They're relatively
harmless from the standpoint of; they don't cause damage to data nor hardware. They're just annoying and sometimes leave you wondering; how do they know I was interested
in that? This type of software will usually make it's way on to your device, tagging along with an install of a wanted program. Java runtime software is an example
of software that you might install, but a toolbar and other adware pieces will come along with it. You may notice default boxes checked that notify you of what is
getting installed. When you're aware of this, it is easy to uncheck this unwanted software. Celter Technologies can usually rid your computing device of these critters
in an hour or less.
Phishing and Browser Attacks
The first of our malicious categories of malware. An email dressed up to look official but is not. The link appears to take you to a familiar site, but it's not.
Phishing can be a very damaging attack which no one will be able to rescue you from the damage already done if you click on one of those links and decide that link
takes you to a safe place to enter your credentials - say, to an online bank. The bad guys now have what they need to really go to your online bank and use the
credentials that you just supplied them on their website could damage you financially. It is important, however, to roll out the damage control at this point and
call the bank if they're not in the process of already calling you.
When people ask us how to avoid this trap in the future, we explain that it is hard. As a rule, personally, I make sure that when I receive an email about something
that needs attention, instead of clicking the link, I open my browser and use my bookmark (that I created) to go to the site I need to check. This way I can ensure I
am going to the correct place. This is also a great rule to use when approached by phone. Instead of taking their word for it over the phone, why not get a reference
number and pursue the number yourself and call back using the reference number. This won't be a hassle to legitimate people doing legimite business, because they
understand the issues behind identity theft.
If you do find yourself in a position where your credentials are in the hamds of crooks and thieves, give us a call (after you have contacted the appropriate
authorities) and we will be thorough about making sure there were no tracks left behind to further take advantage of you. It is not uncommon for the bank to
contact you and inform you that online banking will cease until you can prove your computer has been cleaned of any malware that they detected while your computer
or your credentials tried to access your banking information online. Talk to us about keeping the bad guys out at 780-905-5624.
System and Network Attacks
System and network level attacks are designed to propogate and cause severe damage in most cases. If you're unfortunate enough to get hit by one of these, you're
probably wondering how it happened? This type of malware can also be started by phishing or from browsing websites which carry a payload. A payload is a piece
of software that runs on your computing device and this would be considered a virus. An exammple of this is ransomeware and if you have ever had to deal with
your files being encrypted by someone other than yourself, well, the authorities want you to learn a lesson and lose your data and never pay the ransom! People
and especially businesses will decide the price is to high to not recover the data and end up paying the ransom. Regular backups is the best strategy against
this type of attack. With Cloud computing beginning to mature, there are also other fantastic viable options. Ask us about strategies that allow you to keep
your data safe and out of the reach of bad actors.
Hardware Level Attacks (BIOS & Firmware)
We believe that hardware level attacks can be the most damaging of all. The complexity that goes into the code that produces these weapons of data destruction
also takedown hardware or affect it in ways that seem perplexing to the user. The authorities will sometimes use this type of attack to shutdown hackers and
theft rings around the globe. Meltdown and Spectre have been infamous in recent history affecting Intel and AMD CPUs and a lot of resources were spent to help
ensure the attack from these two malwares have minimal impact in the future. An attack of this level should be reported to the authorities immediately, because
there is potential of the malware to be an existential threat to society. We hope you don't have the opportunity to observe this threat.
Data Backup & Restore - Recovery
When you've lost data that just can't be lost. Whether from Virus, Malware or Human error - ask us about restoring from crashed, damaged
and even deleted media.