Go Premium for a chance to win a PS4. Enter to Win

x

Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.

Share tech news, updates, or what's on your mind.

Sign up to Post

Please provide me with the URL address to download Symantec Antivirus for a Server 2016 Active Directory domain controller.
0
Lessons on Wi-Fi & Recommendations on KRACK
Lessons on Wi-Fi & Recommendations on KRACK

Simplicity and security can be a difficult  balance for any business to tackle. Join us on December 6th for a look at your company's biggest security gap. We will also address the most recent attack, "KRACK" and provide recommendations on how to secure your Wi-Fi network today!

One of my co-workers informed me that a family member received an error message on their Home MAC Laptop “Error #0x80072ee7"  A good description of the problem is on this web site:  https://www.2-spyware.com/remove-error-0x80072ee7-virus.html

My co-worker actually called the number and someone was able to remote into his home laptop.  Afterwards he called me and asked me for my thoughts.  I told him it was a scam and not to trust that person or call that number again.  My co-worker informed me that even though the fake spam tech was on his wife's laptop for 3 minutes that same guy did not connect to his work MAC laptop (that is at home).

I want to scan every device that this co-worker has before he connects to our corporate network.  I researched an anti-virus that can be used for MAC/Apple Laptops and found:  https://www.clamxav.com/  

Then I would suggest that the co-worker use that anti-virus program for every other Apple device at his home.   For Windows computers I like to use Hitman pro; but, there are a lot of other programs as well.

I wanted to ask the Experts, if I should do anything else besides scan the co-worker Apple devices (Home and Work Devices)?  I am also thinking about having a little safe computing presentation for top executives of the company.  Even if their time is extremely important.

So my questions is:

What should I do to make sure that the co-worker's devices are virus free before he connects with them to the corporate network?  SO…
0

Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. The term ‘spyware,’ covers a wide variety of such sinister software programs that installs on a computer without the user’s knowledge to essentially hijack web browsers, monitor all user activity on a machine, open backdoors for remote attackers, steal personal information, display unsolicited advertising, and slow PC performance.


The threats and risks posed by spyware for businesses include loss of productivity, profitability and credibility, liability from privacy violations, increased helpdesk cost, and damage to brand reputation. Spyware remediation and countermeasures to keep your company computer systems as safe as possible are in fact as critical as antivirus and antispam measures.


How Does Spyware Work?


Spyware generally falls into two broad categories.


  1. Surveillance software that includes applications such as key loggers, screen capture devices and trojans used to collect sensitive information about the user for monetary exploitation

 

  1. Advertising spyware that can be used by legitimate companies to log information about the user’s browsing history, personal details and online shopping habits to download and display advertisements on your computer utilizing your system resources, such as RAM and CPU.


Once installed on a computer, the program begins logging keystrokes, monitors online purchasing, websites visited, personal data or scans your hard drive to gather valuable information, all of which is then silently transmitted to a third party via file transfers to be aggregated and used for either legal or illegal purposes.


How Does Spyware Infect A Computer?


Spywares are designed to do its work without attracting suspicion and uses a number of convincing disguises to get installed on a user’s computer.


Spyware can be downloaded from web sites, direct file sharing programs, free downloadable software, or even be hidden in email attachments and instant messaging applications. Users can unknowingly install the spyware by clicking on the attachment or weblink, or by downloading the software.


Spyware often relies on “Drive-by installs,” wherein innocuous-looking pop-up windows with “OK” or “Click Here To Read” buttons which, when clicked, leads to the spyware being downloaded. This method of infection is usually accompanied by some form of adware, unwanted toolbars, links, new bookmarks in web browsers, or users get a host of pop-up ads.


Spyware also uses flaws and security holes in certain web browsers.


Often users receive spyware by unwitting accepting an End User License Agreement from a software program.

The new breed of spyware is both clever and tenacious enough to remain undetected for long periods of time. This is when spyware detectors come in handy.


What Are Spyware Detectors?


Spyware detectors are antispyware programs that perform routine checks on the computer to block and prevent spyware infections so that your system is clear of any unwanted and threatening software. Antispyware applications protect organizations from spyware intrusions by automatically scanning and sending potential spyware to quarantine potential malware so that you can delete threats before they can do any damage to your computer software.


They also monitor incoming data from email, websites, and downloads of files to stop spyware programs from being installed. You won’t have to worry about which email attachments are safe to open or whether certain software is suitable for download.


Spyware detectors also send out alerts when a spyware tries to install itself on your computer and warns users against suspicious links within emails, websites and live chats.


Antispyware programs can speed up the computer and browsing performances by removing spyware, adware.


Install Antispyware To Protect Your Business Computers

 

Today, spyware detectors play a critical a role in securing an organization’s system, just like the antivirus and personal firewall software. Always purchase your antispyware program from a retail store or reputable online retailer so that you get a legitimate program. There are many free antispyware programs available on the net but some of these are really spyware programs in disguise and can end up infecting your computer.

Choose the best spyware detector for your business. One that can help scan, detect, remove and block spyware using a friendly and intuitive interface. There are some antispyware programs such as Malwarebytes, SuperAntispyware and Spybot – Search & Destroy  that have been designed specifically to protect your machine from spyware, while others block both viruses and spyware serving as a great endpoint security system, such as Avast Endpoint Protection,  Sophos Endpoint Protection or McAfee. Bitdefender’s GravityZone Business Security package is a more comprehensive security system that can easily detect and fight a variety of malware, ransomware and zero-day threats that may go undetected by traditional security products. For organizations that use a range of different devices and platforms, it may be good to give Trend Micro Worry-Free Business Security a try, as it provides protection for Windows, Mac, mobile devices and servers. Moreover it also stops emails carrying sensitive information from being sent out accidentally or even deliberately.

In today’s world of data threats, your business just cannot do without antivirus and antispyware software. Also implement proactive measures, such as being selective about what you download, reading licensing agreements, being aware of clickable ads and antispyware scams, to deal effectively with both known and unknown threats.

0
Hi guys,

I see the PCMatic commercials, along with ALL of my clients.. I am a computer consultant that goes into homes & small businesses...

I do NOT deal with servers, just home computers.

How can these guys say they are 100% solution to protect against all threats?  100% against ransomeware too...

Is this a good solution?  
If yes, why?         If not, why not?

Should I recommend to clients?

I know I have read they blacklist everything, so nothing gets through...

If they are sooo good as they say, why wouldn’t everyone be using??  

Thanks again, :-)
0
I'm looking at Cylance for my malware solution. We're all set to go with Malwarebytes. I'm confident in the latter being a worthy adversary for all the risk at here. But Cylance was brought up recently and I wonder if anyone has used it and what they think of it as a viable solution.
0
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
0
Hi There,

For the past few weeks users on my network and users they typically email have been complaining about receiving a lot of spam from our users.  I have gone around to every computer and ran malware cleaning tools such as malwarebytes, superantispyware, ccleaner, adwcleaner, antivirus and so on.  I have found many problems and removed them but the spam will stop for a few days then suddenly come back with a ton of emails.  Our email is hosted by an outside company like godaddy and it is pop.  We don't have a good firewall yet so i can't scan the logs of the firewall.  Is there another way to scan the network to detect which pc has the spambot infection and do you know how to remove the virus.
0
Sometimes legitimate websites such as for hotels or companies get flagged by my Malwarebytes Pro as scam websites (the websites get blocked):

"Malwarebytes blocked a suspected bad URL or an unwanted program."

In these cases, as I need to visit for example a hotel's website to make a booking, would it be safe to use a Chromebook instead? Or use another solution to visit this website?
0
in TrendMicro's  .dat file, I could issue  
  find/I "malware_name"  AVfile.dat
& it will list if a specific malware is found in it.

McAfee releases csv file (from its portal) the rulesets for various
vulnerabilities which I could search by CVE number.

I wanted to do the same with McAfee AV but from its  amcore.dat
is simply all binaries & won't return anything.  
Is there any method to check what malware/viruses it protects against
in the DAT?

A colleague told me McAfee don't permit its DAT file to be searched
& don't publish full list of malwares (not the new signatures updated)
for each DAT released, true?

Link below mention there's a way but when I login to McAfee portal,
don't see that option anywhere or I navigate wrongly:

https://community.mcafee.com/message/243608#243608

Above link says:
 Try: http://www.mcafee.com/us/mcafee-labs/threat-intelligence.aspx
Select checkbox for 'Malware Name' and enter DNSChanger for the search.
0
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
3
New Tabletop Appliances Blow Competitors Away!
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

I am wondering if there is a good way to scan for hijacking code on a Windows 7 machine.  the browsers are behaving funny, and something definitely is taking over the browsers.  Symantec SEP does pick up a "web attack" when Internet Explorer is opended up, but a full scan does not reveal anything.  Is there a better scanner out there?  Should I not even waste time scanning and rebuild the machine?  what's the consensus out there?

thanks
0
I could not download Combofix even though I have Windows 7 Home Premium (tried, but I was prompted to download Plumbytes Anti-Malware instead). I had the scan on whole night (took a long time), then the list included 27 threats (among them a hijacker, but which still was labelled as only a 50 % threat) which Plumbytes said can be removed only after I have purchased it.

Is this bogus, should I ignore these threats and delete Plumbytes?
0
Very strange, this morning when I turned on the computer I got a message that Malwarebytes (I have Pro version) has been turned off. When I turned it on, the option "Protection against malicious code" was switched off, and I can not switch it on! All other options are selectable and can be switched on, but not this option.

Last time I was in Manila I had similar problems with strange things happening. Then when I left the problems disappeared. And most often here in Manila I get warnings when connecting to the hotel wifi about insecure network or dangerous connection.

All kinds of small problems since 2 days when suddenly I got this problem with the message "Waiting for proxy tunnel" in Google Chrome and "TLS handshake" in Mozilla Firefox:

https://www.experts-exchange.com/questions/29058931/How-should-I-get-rid-of-the-message-Waiting-for-Proxy-Tunnel-in-Google-Chrome.html

Other problems: Can not use Google API any longer for connection to Google Translate API for my CAT tool. Can not switch input language any longer. Can not run Windows Update any longer:

https://www.experts-exchange.com/questions/29058918/Why-do-I-get-Windows-could-not-search-for-new-updates-in-my-Windows-7-Home-when-checking-for-updates.html

Other problems (continued):

Takes ages to save a text document or other document ("Not responding").
"Google has authentication problems" when logged in to Gmail.

Etc. etc. (new issues coming up all the time).
0
Message saying essentials support ended
0
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
4
 
LVL 51

Expert Comment

by:Jackie Man
Comment Utility
If you are a hacker, will you design a rootkit for Android OS?
0
 
LVL 30

Author Comment

by:Thomas Zucker-Scharff
Comment Utility
Jackie,

The short answer is yes, but there is really no need.  Hackers are more likely to use lockers than rootkits on androids. Due to the need to elevate privileges to properly execute a rootkit,  the target for such an attack would be more limited than standard lockers.
0
Earlier today I got rid of the search.yahoo.com redirect. I ran avast smartscan and malwarebytes, and I've rebooted. It's only on Google Chrome, and there are no extra extensions installed. Any ideas? Thanks.

Capture.JPG
0
I had this question after viewing anti virus software protecting against ransom ware.

Is this for a single computer or network of them?  

The best and cheapest protection is a solid regular backup of your system. Windows 10 has built in backup utilities.

I am looking for a product I can put on 4 personal computers windows 10,8,7 so I can defend my new and old computers
Not for business use
0
Please provide me with the URL address to download the Mac Symantec antivirus evaluation product.
0
Hello, we manage x 3 client OS's, Windows 7/8 and Windows 10, Windows defender is turned off in our build/SOE,
Anti Virus management is done using the Symantec EndPoint Protection client installed on machines, can we enable/turn on windows defender whilst another AV product co exist? Can the 2 products run together? The business wants us to download updates for defender yet it's turned off? Trying to understand why we would need to do this?
0
The Evil-ution of Network Security Threats
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

What is a good anti virus software

Something that may combat ransomware
on windows 10
1
I have a customer with a SBS 2003 and the server became infected with the .amnesia infection.  Unfortunately it also attacked many of the servers executable file such as Seagate Backup Exec.  I ran a thorough scan on all workstations.  I installed Microsoft Essentials and Spyhunter on a workstation.  I copied the data folder from the server to a new folder called server on the workstation.  I was told that Spyhunter 4 would detect and remove/repair the infection.  I ran a full scan and it does not seem to see the infected files that are obviously infected because they all have the extension .amnesia.  Does anyone have a recommendation for the repair and removal of this infection in the data files?
0
I need a download of a earlier version of Microsoft office is it safe to download from https://goo.gl
0
Get to work and find out one of the staff let a fake tech support person who rung them up, onto their PC to fix a non existant problem.

Apparently this person was on the PC for about 5 minutes.

I've searched for new files & folders created around the time, run a few anti malware apps found nothing. Looked for any new user accounts on the PC, nothing.

Gone through Add/Remove Programs, nothing.

Is there anything else I should look for, anything I've overlooked?
0
I need a download of a earlier version of Microsoft office is it safe to download from web.archive.org?
0
"check short URL" is not working for me.
Can I get a recommendation of a site I can check my shortened links.
Can someone tell me about this link?
http://ow.ly/sc5930dP4vs
0

Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.