Go Premium for a chance to win a PS4. Enter to Win

x

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi:
I'm getting spam emails on my iPhone Hotmail inbox but they are not showing up on my desktop or on any other device.  
These iPhone spam emails are nowhere to be found on my desktop, not even in my spam folder.
I'm suspecting that my iPhone is infected with some sort of virus.
I want to ensure my iPHone has no virus. What do I do?
0
Free Tool: Site Down Detector
LVL 11
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Please provide me with the URL address to download Symantec Antivirus for a Server 2016 Active Directory domain controller.
0
We have several users using their personal MAC Laptops for work purposes.

I have never had a problem yet with viruses on a a MAC; but, that does not mean it will never happen.  My question is what are some good policies and procedures on how to protect MAC laptops and the company network from Viruses and Spyware (from infecting MAC OSX devices).

Regarding Windows devices I do the following:

- We have commercial AV program installed to help prevent and clean any malware.
- We have a secondary AV program to double-check if the initial virus scan program (Hitman Pro.)

I think that having a secondary anti-virus program, such as Hitman Pro would be the most cost effective solution.  I am getting this concern from a previous question, https://www.experts-exchange.com/questions/29067896/How-to-scan-an-Apple-Device-for-Viruses-HOAX-SPAM-alert.html
0
Anyone know where I can download such a sample?  Don't want a  pdf  or  MSOffice file or
eicar.txt  but a graphics image file like  png or jpg .

If can't find a harmless one like eicar, a genuine malicious png/jpg is fine : wud like to test a product
0
What do you guys install on HOME machines for protection?    NOT server or corporate environments...  

What do you think of Avast Free version?  

Do you purchase anything for clients to use, if so what?  

What do you leave on systems for clients?  Thanks!
0
What is the cheapest source to obtain Symantec antivirus licenses for Windows 10 and Mac?

My organization needs to purchase around 60 licenses and we would like to purchase these for as cheap as possible.
0
Hi guys,

I see the PCMatic commercials, along with ALL of my clients.. I am a computer consultant that goes into homes & small businesses...

I do NOT deal with servers, just home computers.

How can these guys say they are 100% solution to protect against all threats?  100% against ransomeware too...

Is this a good solution?  
If yes, why?         If not, why not?

Should I recommend to clients?

I know I have read they blacklist everything, so nothing gets through...

If they are sooo good as they say, why wouldn’t everyone be using??  

Thanks again, :-)
0
Hi guys,

I own a computer consultant business & I go into homes & small business & do services on all kinds of things.  Google is a great tool for answers & of course EE.

My questions are, what do you do for continuing education?  

What softwares & tools do you guys use for:
Virus removal?
AntiVirus?
Ransomeware protection?
Cleanup of Systems?

I really just want to compare what tools I am using to most current softwares to make sure I am not missing things on cleanup...

Thanks for any input!  I appreciate it!
0
I've seen a few times where an Internet page popup displays a bogus warning about the Zeus Virus being detected.  The last one had a support number to sucker you into calling (888)289-9990.

In researching this I am very unclear as to if any sort of infection actually exists or if this is just all tricky web popups.
When I've seen these popups before I just End Task them.  Every time I've run Malwarebytes or another scanner afterwards, it has come up clean.

But googling the net shows people running adware remover, malwarebytes as well disabling and removing certain unspecified browser plugins/extensions/add-ons.

When I see one of these fake zeus popups, does it ever indicate my system is infected, not with Zeus but with the Fake Zeus Detector popup?

What's the real deal here?  Should I just close the popup, or should I take more serious measures?
0
We have been infected by Hermes 2.0. It has encrypted network files etc.
3 Questions: -
1. How do I find which user/PC it originated from?
2. How do I stop it spreading further?
3. We use Trend AV, should this have picked up the infection?

Thanks
1
Hire Technology Freelancers with Gigs
LVL 11
Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Greetings,

For all the programming and brainpower that goes into protecting systems today, anti-virus programs are always going to be desperately playing catch-up when it comes to zero-day attacks,   I would like to create an access policy through Windows that looks something like this:

Name:  Block access to *.doc except for winword and other allowed programs
Processes to include:  *  (all)
Exceptions:   winword.exe, chrome.exe, adobe.exe, explorer.exe (there are more to include, this is just an example)
File/folder name to bloc:  *.DOC
Actions to block"  Write access to files, New files being created

With the above policy in place, an illegitimate ransomware virus executable, e.g. deathstar.exe, would be unable to write to the data files because the access policy would block their efforts to write to and encrypt the protected data files.

I would want to do this for all main file types, e.g. *.doc/docx, *.xls/xlsx, *.pdf etc.

With what tools can I put these rules into place on a given Windows XP / 8 / 10  PC and/or on a Windows 2008 / 2012 / 2016 server?

Thanks.

jkirman
0
any specific anti-virus software recommended that doesn't take a lot of computer resources / overhead.
0
Can you please tell me how to i clear this message? I am using windows 7 32 bit and my computer is Dell Latitude D620. It installed with Norton Antivirus

A problem has occured in BitDefender. Threat Scanner. A file containing error information has been created at C:\Windows\Temp\BitDefender Threat Scanner.dmpl. You are strongly encouraged to send the file
0
Each time I open a folder, this indicator (blue time indicator by the cursor) like get on off on off several times before the folder is opened. Very quick on off on off but it's a time lag so it's disturbing (the folder doesn't open as fast as it should, that is, immediately).

Is it a virus? I've never had this until the last week or so.

I have Windows 7 Home Premium.
0
Sometimes legitimate websites such as for hotels or companies get flagged by my Malwarebytes Pro as scam websites (the websites get blocked):

"Malwarebytes blocked a suspected bad URL or an unwanted program."

In these cases, as I need to visit for example a hotel's website to make a booking, would it be safe to use a Chromebook instead? Or use another solution to visit this website?
0
Which AntiVirus program would you recommend for a Mac?

I know that usually a Mac doesn't need one, but still if yes , which one would you recommend?
1
TROJ_BINLODR.ZTEJ-A
TROJ_SVCTOOL.ZTEJ-A
TROJ64_BINLODR.ZTEJ-A
TROJ64_SVCTOOL.ZTEJ-A
HKTL_MULTINJECT
HKTL_LURC
HKTL_NETPASS
HKTL_MBRWRITE
HKTL_PREFDEL
BKDR_KLIPOD.ZTEJ-B
BKDR_KLIPOD.ZTEJ-A
RANSOM_HERMS.A

I was given the above AV signatures from Trendmicro but I can't locate them in our
latest McAfee AV signatures.  Anyone know what's the equiv for McAfee?
0
in TrendMicro's  .dat file, I could issue  
  find/I "malware_name"  AVfile.dat
& it will list if a specific malware is found in it.

McAfee releases csv file (from its portal) the rulesets for various
vulnerabilities which I could search by CVE number.

I wanted to do the same with McAfee AV but from its  amcore.dat
is simply all binaries & won't return anything.  
Is there any method to check what malware/viruses it protects against
in the DAT?

A colleague told me McAfee don't permit its DAT file to be searched
& don't publish full list of malwares (not the new signatures updated)
for each DAT released, true?

Link below mention there's a way but when I login to McAfee portal,
don't see that option anywhere or I navigate wrongly:

https://community.mcafee.com/message/243608#243608

Above link says:
 Try: http://www.mcafee.com/us/mcafee-labs/threat-intelligence.aspx
Select checkbox for 'Malware Name' and enter DNSChanger for the search.
0
It has never happened before. I copied the whole folder from my laptop to my USB to bring it with me to a print shop. At the first print shop everything on my USB drive suddenly were shortcuts only, that could not be opened (when clicking on any of them, the System32 in Command Prompt was opened)!

The same story when I went to the next print shop.

What happened? On my laptop, there are only regular files and these yellow folder icons, no shortcut icons like on the USB drive.

I have Windows 7 64-bit. I've been to the same print shop about 2 months ago using the same type of folders on exactly the same USB drive without problems!

Is it anyone else who have done this?
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE
LVL 5
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

I am wondering if there is a good way to scan for hijacking code on a Windows 7 machine.  the browsers are behaving funny, and something definitely is taking over the browsers.  Symantec SEP does pick up a "web attack" when Internet Explorer is opended up, but a full scan does not reveal anything.  Is there a better scanner out there?  Should I not even waste time scanning and rebuild the machine?  what's the consensus out there?

thanks
0
I could not download Combofix even though I have Windows 7 Home Premium (tried, but I was prompted to download Plumbytes Anti-Malware instead). I had the scan on whole night (took a long time), then the list included 27 threats (among them a hijacker, but which still was labelled as only a 50 % threat) which Plumbytes said can be removed only after I have purchased it.

Is this bogus, should I ignore these threats and delete Plumbytes?
0
Very strange, this morning when I turned on the computer I got a message that Malwarebytes (I have Pro version) has been turned off. When I turned it on, the option "Protection against malicious code" was switched off, and I can not switch it on! All other options are selectable and can be switched on, but not this option.

Last time I was in Manila I had similar problems with strange things happening. Then when I left the problems disappeared. And most often here in Manila I get warnings when connecting to the hotel wifi about insecure network or dangerous connection.

All kinds of small problems since 2 days when suddenly I got this problem with the message "Waiting for proxy tunnel" in Google Chrome and "TLS handshake" in Mozilla Firefox:

https://www.experts-exchange.com/questions/29058931/How-should-I-get-rid-of-the-message-Waiting-for-Proxy-Tunnel-in-Google-Chrome.html

Other problems: Can not use Google API any longer for connection to Google Translate API for my CAT tool. Can not switch input language any longer. Can not run Windows Update any longer:

https://www.experts-exchange.com/questions/29058918/Why-do-I-get-Windows-could-not-search-for-new-updates-in-my-Windows-7-Home-when-checking-for-updates.html

Other problems (continued):

Takes ages to save a text document or other document ("Not responding").
"Google has authentication problems" when logged in to Gmail.

Etc. etc. (new issues coming up all the time).
0
Hello,

We have a server which we believe being infected by rootkit virus.

There is a EXE keeps showing up triggering a process and spikes up the CPU of the server.

Malwarebytes detects the threats and reboot the server and clean.

Also, how to

But the issue comes back.

Please advise what tool I should use.

Thanks.
0
Should blocking EICAR be considered a minimum requirement for AV software?

Please note that the operative word here is "minimum."  In other words, if an antivirus program does not detect EICAR, should it be eliminated from selection?

Or is this too much of an over-generalization, i.e., that "anti-virus" software now comes in all manner of flavors, including those that might detect a ransomware attack, but not check the symptoms for an oldie like EICAR?
0
Message saying essentials support ended
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.