Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

My OS is win10 pro 64 bit and from time to time I get the error screen as attached.  Although I do not send the report, but I want to know if it is a virus or malware and I have run Avast scan and it did not remove it.
bugsplat.JPG
0
Keep up with what's happening at Experts Exchange!
LVL 11
Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Hi Experts

Could you point a way to stop Malwarebytes from start with Windows?

My intension is to start it by myself from time to time, the reason is the high consume of  MBAMService.

Thanks in advance
0
Desktop:Windows 8
VPN connection: Forticlient 5.6 or Sonicwall Netextender 8.0 used to connect to office network
Telus internet connection
Browser: Chrome, Firefox
Situation:
1. Telus internet connection works fine.
2. Without VPN connection, Chrome and Firefox access internet is normal, .
3. With VPN connection, Chrome works fine, only Firefox is very, very slow.
4. I turned off Firefox proxy server setting, Firefox works fine about two days then slowly again
5. Computer found unnormal login script error message, seems has malware in it.

Question:
How to block firefox access internet through VPN connection before I find a way kill the malware.
0
I have been informed by Spamhaus that the IP address we use for corporate email has communicated with a known spam site and is either infected by, or NATing for, a computer that is infected by the S_Gozi trojan / downloader.

It states that the infection is extremely difficult to detect and is not seen by most commercial AV or EndPoint protection suites.

I have been told to program the Sonic-wall TZ215 to stop all traffic to sites outside the US.  We have never done this before.  Not sure how to setup the sonic-wall for that purpose.  I know this virus does not use the standard port 25 for smtp traffic it uses port 80 which i cannot block.  It is extremely difficult to find so i am trying to stop its connections at the firewall level to stop it communicating.  Any help would be greatly appreciated.
0
Hi All,
I have a client with the same question/issue as described: https://www.experts-exchange.com/questions/28694856/Chrome-browser-extension-virus-malware-and-unable-to-uninstall.html
Under the solution provided by Exilir2, I am having trouble isolating the folder in: c:\windows\system32\  WebSecurity  is located. The EU cannot recall when it was installed or when he started having issues.

I have followed the process outlined to manually delete Chrome extensions as described here, but WebSecurity keeps coming back:
https://productforums.google.com/forum/#!topic/chrome/NwWyxq2axrI;context-place=topicsearchin/chrome/authorid$3AAPn2wQfmBaAsKW5QOBDEiE4VI7GpqyoZiiW4qS8ZzI3F2CmEWuLAAt2T0yZ9mg-591Ka5BAfqV7l%7Csort:date%7Cspell:false
0
We're in the process of changing our AV protection over our whole company. We're highly virtualized in both server and desktop.  Currently we running View 6.2 with non-persistent (NP) desktops, but soon will be moving to 7.x and instant clones (IC).

We decided to abandon the agentless products using NSX because we get more protection with the agent-based ones. However, it "seems" that the ones we've selected to look at haven't quite figured out how to work with NP or IC desktops as well as they claim.

The bottom line for me is has anyone here actually used an agent-based product with NP desktops and more importantly with IC desktops where it just worked like it was supposed to work?  I really only interested in real world experience for this question.  Thanx...
0
I can't delete this program no matter what I do but, is there a way to keep the renewal window from popping up every day?
0
I'm getting intermittently high CPU usage on Win2k8r2 Standard server.  just a little while ago I wasn't even able to rdp in.  my main issue is that we have Symantec Backup Exec on this server and the jobs are failing or going really slow most likely due to this high CPU usage.  At times it would be at 90 - 100%.  

About this physical server:
Dell PowerEdge 6950
The C: drive is in a Raid-1 configuration and is either SAS or SATA drives.  
Dual-Core AMD Opteron Processor 8218 2.59 GHz (2 processors)
12 GB RAM, 64-bit OS
Raid controllers: two Perc 5/1 Adapters and two Perc H800 Adapters (all attached to 4 Quantum tape drives)

I'm thinking that this may be a hard drive issue.  Or it could be a driver issue with the RAID controllers.  What is the best way I can go about diagnosing the hard drives on a server?  I've already contacted Symantec and Quantum and I don't believe it is their issue. Quantum firmware and drivers are completely updated to latest version.  Any other feedback would be helpful?
0
Is cisco umbrella professional [openDNS] a replacement of anti malware, or is it still needed something like anti malwarebytes
0
The user has a MacBook Pro (Retina, 13-inch, Late 2013)

They accepted a bogus phone call from "Apple Tech Support" and allowed them to run all sorts of 'diagnostics and repairs'   However, they didn't pay any money.

In their defense, they had been recently informed by their bank that some sort of Trojan horse was affecting their computer, and they mistakenly assumed that this was a follow up call.

Apple support had them install the latest version of MalwareBytes Mac, and nothing has been found after the initial scan and cleanup.

For peace of mind, are there other applications that can check for hidden threats?

Thanks.
0
Receive 1:1 tech help
LVL 11
Receive 1:1 tech help

Solve your biggest tech problems alongside global tech experts with 1:1 help.

Hi, I have been trying to delete Norton for about three hours and can't do it.  Windows 10 won't do it nor Revo Uninstaller.  The computer locks up when the Norton window shows up and says to wait for it to uninstall.  After about ten minutes I finally hit the button which turns the computer off and then I turn it back on.

Any ideas on how I can get rid of it?
Thanks
0
A customer of mine with a Windows 2016 Server got a ransomware infection this Monday.  Turned out to be the Xorist.  I got the Emsisoft decrypter tool and ran it with success and then decrypted all the files on the server.  

With that part done, scanned the machine with Webroot (installed, don't know how it didn't detect this) windows defender, sophos second opinion, TDDSKiller,  superantispyware  and malwarebytes.  a trojan was found in a zip file that was in a profile that was created by an external source.

I went through all my usual programs to look for anything further (process explorer, tcpview, netstat etc but when it got to process monitor i narrowed a lot of network traffic coming from the lsass.exe process, and it was going to random IP's (gamertalk.com.br)
snapshot of the process monitor
I could not get this traffic to subside, and it eventually crashed the server after 6-8 hours.

I took away the servers DNS settings as well as the gateway setting and this continued to flow in process monitor.

Am I reading this program incorrectly?
How else can I go about trying to find what is making this traffic?

Thank you.
0
I have 5 Server 2016 servers that need to be protected with Symantec antivirus.

What are the least expensive options for purchasing these Symantec antivirus licenses?
0
Our company are using Palo Alto Firewall ,we received the critical alert "Top 5 attackers" and the source is from one of the application server. What does it mean and what should I do .Please advice.Thanks
0
https://www.csa.gov.sg/singcert/news/advisories-alerts/alert-on-microsoft-office-memory-corruption-vulnerability
Above is protected by McAfee NIDS/NIPS.

Q1:
Does McAfee AV & HIPS detect/protect against above CVE?

Q2:
Can I say in general NIDS/NIPS protect against CVEs (esp MS & Adobe vulnerabilities) but AV don't as AV deals with
malware & not CVEs.

Q3:
Can I safely say that if a vendor's NIDS detect/protect against the CVE, likely its HIPS will also provide the same?
In particular, referring to McAfee & TrendMicro's
0
I'm having some PC troubles. I have a total of 3 hard drives connected. The other 2 hard drives stores my videos, pictures etc. I ran NOD32 and Malwarebytes and they both said I was infected with Virus.Win32.Neshta. I noticed that I couldn't launch Google Chrome then VLC started giving me errors and my videos wouldn't play. I reformatted my hard drive and did a fresh install of Windows 10. After I connected back my other 2 hard drives and started re installing everything, I got a message from Windows Defender saying "something" "malicious" was blocked. I ran full scans with NOD32, Malwarebytes and Windows Defender. NOD32 thinks that almost everything, even files that I know are safe, thinks its a Virus.Win32.Neshta. I didn't have problems like this a week ago so I'm trying to figure out where this is coming from? I guessing its from 1 of the other hard drives but really don't know what to look for. Has anyone else experienced something like this? Strange.
0
Everytime I try and start windows defender it gives me an Unexpected error message, I have tried a few things to no avail. I tried turning off  options, turning them back on, options such as working with the cloud so it's current and can compare to other files that are new viruses/malware I guess, but I choose to turn on and off many options to only continue to get the same message and  windows defender not working. I have screen shots I will post them if I am allowed. Thanks and hope someone can help. Thanks in advance!!!

Error Message
Where I try to restart windows defender, I click that button on left and then get error message above
Showing you my version info and other info that may be of help to you.
0
Hi:
I'm getting spam emails on my iPhone Hotmail inbox but they are not showing up on my desktop or on any other device.  
These iPhone spam emails are nowhere to be found on my desktop, not even in my spam folder.
I'm suspecting that my iPhone is infected with some sort of virus.
I want to ensure my iPHone has no virus. What do I do?
0
Please provide me with the URL address to download Symantec Antivirus for a Server 2016 Active Directory domain controller.
0
Automating Your MSP Business
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

We have several users using their personal MAC Laptops for work purposes.

I have never had a problem yet with viruses on a a MAC; but, that does not mean it will never happen.  My question is what are some good policies and procedures on how to protect MAC laptops and the company network from Viruses and Spyware (from infecting MAC OSX devices).

Regarding Windows devices I do the following:

- We have commercial AV program installed to help prevent and clean any malware.
- We have a secondary AV program to double-check if the initial virus scan program (Hitman Pro.)

I think that having a secondary anti-virus program, such as Hitman Pro would be the most cost effective solution.  I am getting this concern from a previous question, https://www.experts-exchange.com/questions/29067896/How-to-scan-an-Apple-Device-for-Viruses-HOAX-SPAM-alert.html
0
Anyone know where I can download such a sample?  Don't want a  pdf  or  MSOffice file or
eicar.txt  but a graphics image file like  png or jpg .

If can't find a harmless one like eicar, a genuine malicious png/jpg is fine : wud like to test a product
0
I host application servers for a website and to allow users to upload documents, we need them to be scanned first by AV software. I assume I will need to find AV with some sort of API to trigger the scan. Does anyone know how to approach this problem?
0
Dear Expect,

Yesterday, user reported to me, she couldn't open Symantec endpoint client but every one could  open it.
One of the error message of policy settings not allowed
open it.
If I give it local admin, she can open it.
What policy not allow open it?
Please help!
0
What do you guys install on HOME machines for protection?    NOT server or corporate environments...  

What do you think of Avast Free version?  

Do you purchase anything for clients to use, if so what?  

What do you leave on systems for clients?  Thanks!
0
What is the cheapest source to obtain Symantec antivirus licenses for Windows 10 and Mac?

My organization needs to purchase around 60 licenses and we would like to purchase these for as cheap as possible.
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.