Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x

Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.

Share tech news, updates, or what's on your mind.

Sign up to Post

how to remove ramsomware samsam or .weapologize extension?
0
[Webinar] Database Backup and Recovery
LVL 11
[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Hello,

I have been infected by some ransonware i don`t know.

In the attached file is the readme file with the instructions to decrypt the files. Anyone knows the ransomware and how to decrypt it?

It seems a xorist one, but the tool by kaspersky doesn`t work.

Any information will be welcomed.
README_9670338_05489.txt
0
Hi Experts

Could you point a way to stop Malwarebytes from start with Windows?

My intension is to start it by myself from time to time, the reason is the high consume of  MBAMService.

Thanks in advance
0
I ran a virus scan during the night, and received this result in the morning:

Trojan: BAT/Stravdri.A
Serious
2017-10-30
This program is dangerous and runs commands from an attacker.

I deleted it and restarted the computer whereupon the computer worked much faster. But now I am not sure if there is an issue again, begin to get slow sometimes.

I have a large project I am working with that has a tight deadline and have no time to run more thorough virus searches. So I wonder if there is any quick measure I can take? My normal AV software (MSE) takes more than 24 hours to run a thorough scan with. Malwarebytes Pro did not find anything when I run it two days ago.

I had someone use my credit card a few weeks ago, and had it blocked by the bank. Lost around 300 USD. It is possible it could be related to this.

I use Windows 7 Home 64-bit.
0
Dear Experts,

I have a client whose 2 PCs got infected.

When they go to yahoo webpage in Singapore -> Finance -> Currency Converter, there is a pop up at the bottom of the page.

Do you want to open or save OAD_Comscore_NoID2.js from secure-ds.serving-sys.com?

I went into Control Panel, Internet Add-Ons, Registry.

Malware scan also did detect it.

Any idea on how to stop this?
0
This is not a real virus.  AVG just does not recognize the program.
I made an executable file that AVG stops from downloading.
It says it Threat: DRep.
I scanned it on my computer since its my own file and AVG says its clean on my computer, but aborts the download from website.
Other people are also complaining about this.
Any suggestions how to stop avg from aborting?
Thank You
0
Hi all, my disk is full and are created a several files in windows\temp\  
please help you guys!
0
I'm having some PC troubles. I have a total of 3 hard drives connected. The other 2 hard drives stores my videos, pictures etc. I ran NOD32 and Malwarebytes and they both said I was infected with Virus.Win32.Neshta. I noticed that I couldn't launch Google Chrome then VLC started giving me errors and my videos wouldn't play. I reformatted my hard drive and did a fresh install of Windows 10. After I connected back my other 2 hard drives and started re installing everything, I got a message from Windows Defender saying "something" "malicious" was blocked. I ran full scans with NOD32, Malwarebytes and Windows Defender. NOD32 thinks that almost everything, even files that I know are safe, thinks its a Virus.Win32.Neshta. I didn't have problems like this a week ago so I'm trying to figure out where this is coming from? I guessing its from 1 of the other hard drives but really don't know what to look for. Has anyone else experienced something like this? Strange.
0
Please provide me with the URL address to download Symantec Antivirus for a Server 2016 Active Directory domain controller.
0
One of my co-workers informed me that a family member received an error message on their Home MAC Laptop “Error #0x80072ee7"  A good description of the problem is on this web site:  https://www.2-spyware.com/remove-error-0x80072ee7-virus.html

My co-worker actually called the number and someone was able to remote into his home laptop.  Afterwards he called me and asked me for my thoughts.  I told him it was a scam and not to trust that person or call that number again.  My co-worker informed me that even though the fake spam tech was on his wife's laptop for 3 minutes that same guy did not connect to his work MAC laptop (that is at home).

I want to scan every device that this co-worker has before he connects to our corporate network.  I researched an anti-virus that can be used for MAC/Apple Laptops and found:  https://www.clamxav.com/  

Then I would suggest that the co-worker use that anti-virus program for every other Apple device at his home.   For Windows computers I like to use Hitman pro; but, there are a lot of other programs as well.

I wanted to ask the Experts, if I should do anything else besides scan the co-worker Apple devices (Home and Work Devices)?  I am also thinking about having a little safe computing presentation for top executives of the company.  Even if their time is extremely important.

So my questions is:

What should I do to make sure that the co-worker's devices are virus free before he connects with them to the corporate network?  SO…
0
Evaluating UTMs? Here's what you need to know!
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. The term ‘spyware,’ covers a wide variety of such sinister software programs that installs on a computer without the user’s knowledge to essentially hijack web browsers, monitor all user activity on a machine, open backdoors for remote attackers, steal personal information, display unsolicited advertising, and slow PC performance.


The threats and risks posed by spyware for businesses include loss of productivity, profitability and credibility, liability from privacy violations, increased helpdesk cost, and damage to brand reputation. Spyware remediation and countermeasures to keep your company computer systems as safe as possible are in fact as critical as antivirus and antispam measures.


How Does Spyware Work?


Spyware generally falls into two broad categories.


  1. Surveillance software that includes applications such as key loggers, screen capture devices and trojans used to collect sensitive information about the user for monetary exploitation

 

  1. Advertising spyware that can be used by legitimate companies to log information about the user’s browsing history, personal details and online shopping habits to download and display advertisements on your computer utilizing your system resources, such as RAM and CPU.


Once installed on a computer, the program begins logging keystrokes, monitors online purchasing, websites visited, personal data or scans your hard drive to gather valuable information, all of which is then silently transmitted to a third party via file transfers to be aggregated and used for either legal or illegal purposes.


How Does Spyware Infect A Computer?


Spywares are designed to do its work without attracting suspicion and uses a number of convincing disguises to get installed on a user’s computer.


Spyware can be downloaded from web sites, direct file sharing programs, free downloadable software, or even be hidden in email attachments and instant messaging applications. Users can unknowingly install the spyware by clicking on the attachment or weblink, or by downloading the software.


Spyware often relies on “Drive-by installs,” wherein innocuous-looking pop-up windows with “OK” or “Click Here To Read” buttons which, when clicked, leads to the spyware being downloaded. This method of infection is usually accompanied by some form of adware, unwanted toolbars, links, new bookmarks in web browsers, or users get a host of pop-up ads.


Spyware also uses flaws and security holes in certain web browsers.


Often users receive spyware by unwitting accepting an End User License Agreement from a software program.

The new breed of spyware is both clever and tenacious enough to remain undetected for long periods of time. This is when spyware detectors come in handy.


What Are Spyware Detectors?


Spyware detectors are antispyware programs that perform routine checks on the computer to block and prevent spyware infections so that your system is clear of any unwanted and threatening software. Antispyware applications protect organizations from spyware intrusions by automatically scanning and sending potential spyware to quarantine potential malware so that you can delete threats before they can do any damage to your computer software.


They also monitor incoming data from email, websites, and downloads of files to stop spyware programs from being installed. You won’t have to worry about which email attachments are safe to open or whether certain software is suitable for download.


Spyware detectors also send out alerts when a spyware tries to install itself on your computer and warns users against suspicious links within emails, websites and live chats.


Antispyware programs can speed up the computer and browsing performances by removing spyware, adware.


Install Antispyware To Protect Your Business Computers

 

Today, spyware detectors play a critical a role in securing an organization’s system, just like the antivirus and personal firewall software. Always purchase your antispyware program from a retail store or reputable online retailer so that you get a legitimate program. There are many free antispyware programs available on the net but some of these are really spyware programs in disguise and can end up infecting your computer.

Choose the best spyware detector for your business. One that can help scan, detect, remove and block spyware using a friendly and intuitive interface. There are some antispyware programs such as Malwarebytes, SuperAntispyware and Spybot – Search & Destroy  that have been designed specifically to protect your machine from spyware, while others block both viruses and spyware serving as a great endpoint security system, such as Avast Endpoint Protection,  Sophos Endpoint Protection or McAfee. Bitdefender’s GravityZone Business Security package is a more comprehensive security system that can easily detect and fight a variety of malware, ransomware and zero-day threats that may go undetected by traditional security products. For organizations that use a range of different devices and platforms, it may be good to give Trend Micro Worry-Free Business Security a try, as it provides protection for Windows, Mac, mobile devices and servers. Moreover it also stops emails carrying sensitive information from being sent out accidentally or even deliberately.

In today’s world of data threats, your business just cannot do without antivirus and antispyware software. Also implement proactive measures, such as being selective about what you download, reading licensing agreements, being aware of clickable ads and antispyware scams, to deal effectively with both known and unknown threats.

0
Hi guys,

I see the PCMatic commercials, along with ALL of my clients.. I am a computer consultant that goes into homes & small businesses...

I do NOT deal with servers, just home computers.

How can these guys say they are 100% solution to protect against all threats?  100% against ransomeware too...

Is this a good solution?  
If yes, why?         If not, why not?

Should I recommend to clients?

I know I have read they blacklist everything, so nothing gets through...

If they are sooo good as they say, why wouldn’t everyone be using??  

Thanks again, :-)
0
I'm looking at Cylance for my malware solution. We're all set to go with Malwarebytes. I'm confident in the latter being a worthy adversary for all the risk at here. But Cylance was brought up recently and I wonder if anyone has used it and what they think of it as a viable solution.
0
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
0
Hi There,

For the past few weeks users on my network and users they typically email have been complaining about receiving a lot of spam from our users.  I have gone around to every computer and ran malware cleaning tools such as malwarebytes, superantispyware, ccleaner, adwcleaner, antivirus and so on.  I have found many problems and removed them but the spam will stop for a few days then suddenly come back with a ton of emails.  Our email is hosted by an outside company like godaddy and it is pop.  We don't have a good firewall yet so i can't scan the logs of the firewall.  Is there another way to scan the network to detect which pc has the spambot infection and do you know how to remove the virus.
0
Sometimes legitimate websites such as for hotels or companies get flagged by my Malwarebytes Pro as scam websites (the websites get blocked):

"Malwarebytes blocked a suspected bad URL or an unwanted program."

In these cases, as I need to visit for example a hotel's website to make a booking, would it be safe to use a Chromebook instead? Or use another solution to visit this website?
0
in TrendMicro's  .dat file, I could issue  
  find/I "malware_name"  AVfile.dat
& it will list if a specific malware is found in it.

McAfee releases csv file (from its portal) the rulesets for various
vulnerabilities which I could search by CVE number.

I wanted to do the same with McAfee AV but from its  amcore.dat
is simply all binaries & won't return anything.  
Is there any method to check what malware/viruses it protects against
in the DAT?

A colleague told me McAfee don't permit its DAT file to be searched
& don't publish full list of malwares (not the new signatures updated)
for each DAT released, true?

Link below mention there's a way but when I login to McAfee portal,
don't see that option anywhere or I navigate wrongly:

https://community.mcafee.com/message/243608#243608

Above link says:
 Try: http://www.mcafee.com/us/mcafee-labs/threat-intelligence.aspx
Select checkbox for 'Malware Name' and enter DNSChanger for the search.
0
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
3
I am wondering if there is a good way to scan for hijacking code on a Windows 7 machine.  the browsers are behaving funny, and something definitely is taking over the browsers.  Symantec SEP does pick up a "web attack" when Internet Explorer is opended up, but a full scan does not reveal anything.  Is there a better scanner out there?  Should I not even waste time scanning and rebuild the machine?  what's the consensus out there?

thanks
0
Who's Defending Your Organization from Threats?
Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

I could not download Combofix even though I have Windows 7 Home Premium (tried, but I was prompted to download Plumbytes Anti-Malware instead). I had the scan on whole night (took a long time), then the list included 27 threats (among them a hijacker, but which still was labelled as only a 50 % threat) which Plumbytes said can be removed only after I have purchased it.

Is this bogus, should I ignore these threats and delete Plumbytes?
0
Very strange, this morning when I turned on the computer I got a message that Malwarebytes (I have Pro version) has been turned off. When I turned it on, the option "Protection against malicious code" was switched off, and I can not switch it on! All other options are selectable and can be switched on, but not this option.

Last time I was in Manila I had similar problems with strange things happening. Then when I left the problems disappeared. And most often here in Manila I get warnings when connecting to the hotel wifi about insecure network or dangerous connection.

All kinds of small problems since 2 days when suddenly I got this problem with the message "Waiting for proxy tunnel" in Google Chrome and "TLS handshake" in Mozilla Firefox:

https://www.experts-exchange.com/questions/29058931/How-should-I-get-rid-of-the-message-Waiting-for-Proxy-Tunnel-in-Google-Chrome.html

Other problems: Can not use Google API any longer for connection to Google Translate API for my CAT tool. Can not switch input language any longer. Can not run Windows Update any longer:

https://www.experts-exchange.com/questions/29058918/Why-do-I-get-Windows-could-not-search-for-new-updates-in-my-Windows-7-Home-when-checking-for-updates.html

Other problems (continued):

Takes ages to save a text document or other document ("Not responding").
"Google has authentication problems" when logged in to Gmail.

Etc. etc. (new issues coming up all the time).
0
Message saying essentials support ended
0
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
4
 
LVL 52

Expert Comment

by:Jackie Man
Comment Utility
If you are a hacker, will you design a rootkit for Android OS?
0
 
LVL 30

Author Comment

by:Thomas Zucker-Scharff
Comment Utility
Jackie,

The short answer is yes, but there is really no need.  Hackers are more likely to use lockers than rootkits on androids. Due to the need to elevate privileges to properly execute a rootkit,  the target for such an attack would be more limited than standard lockers.
0
Earlier today I got rid of the search.yahoo.com redirect. I ran avast smartscan and malwarebytes, and I've rebooted. It's only on Google Chrome, and there are no extra extensions installed. Any ideas? Thanks.

Capture.JPG
0
I had this question after viewing anti virus software protecting against ransom ware.

Is this for a single computer or network of them?  

The best and cheapest protection is a solid regular backup of your system. Windows 10 has built in backup utilities.

I am looking for a product I can put on 4 personal computers windows 10,8,7 so I can defend my new and old computers
Not for business use
0

Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.