Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"

Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.

The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.

You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.

James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?

The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.

Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.

Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.

In The News:

Sharad Pawar says lapses in security led to Pulwama attack  Economic TimesNationalist Congress Party Chief Sharad Pawar said on Friday that the suicide attack on a CRPF convoy in Jammu Kashmir was worrying and leads to the ...
Trump will declare a national emergency to secure money for his border wall  Vox.comPresident Donald Trump has officially signed a spending bill that will keep the government funded until September, while also declaring a national emergency in ...
A new tactic for smart-home security: shaming Walmart  Yahoo FinanceThe state of smart-home security should be embarrassing. Take for instance the webcams hacked and exploited to launch massive denial-of-*service* attacks, ...
The Three Stages Of Cloud Transformation: Application, Network, Security  ForbesTransitioning to a cloud-first IT strategy has become an imperative.
Mobile networks call for 5G security inspector  BBC NewsThe mobile network industry has called for a new security testing scheme to check 5G equipment.
EU shuts down Puigdemont event over ‘security threats’  POLITICO.euParliament says there is 'a high risk that the proposed event could pose a threat to the maintenance of public order.'
February security patch now rolling out for the Galaxy Note 9  9to5GoogleThe February security patch is rolling out now to the Samsung Galaxy Note 9 in a staged update process that will no doubt expand over the coming days.
Timeline of Major Terror Attacks on Security Personnel Since 2000  News18As per the Ministry of Home Affairs, a total of 158 CRPF jawans have been killed since 2016. In 2016, a total 43 CRPF jawans were killed while in 2017, 2018 ...
These weatherproof wireless security cameras with 2-year battery life are half the price of Arlo cams  BGRThere's no question that Netgear's Arlo brand is responsible for starting the cord-free security camera craze. Of course once something gets popular you know ...
740 Security Forces Personnel Killed in 12 years in J&K; 23% of Total Casualties  News18According to data compiled by the South Asia Terrorism Portal (SATP), a Delhi-based open data source, the number of fatalities in the valley have increased in ...
'What Was The National Security Adviser Doing?' Mamata Banerjee on Pulwama Attack  News18Banerjee questioned why the Centre was not declaring national mourning for the CRPF jawans. She also slammed the PM for inaugurating a project on Friday.
The Internet of Dongs remains a security dumpster-fire  Boing BoingThe Internet of Dongs is Brad Haines's term for the world of internet-connected, "teledildonic" sex toys, and Haines, along with Sarah Jamie Lewis, have ...
Congress party stands with the security forces and government: Rahul Gandhi  Economic TimesVowing to stand with the security forces and the government, Congress president Rahul Gandhi today said that his party will refrain from political argument and ...
Pulwama terror attack: Entire opposition stands with security forces and govt, says Rahul Gandhi  Economic TimesA day after the Pulwama attack, Congress president Rahul Gandhi on Friday said his party and the entire opposition is fully supportive of the government and the ...
Ottawa security firm Interset bought by U.K. software giant  Ottawa CitizenAn Ottawa security and data analytics firm has been bought by a massive U.K. software company for an undisclosed amount.
What Is the Munich Security Conference, and Why Does It Matter?  The New York TimesWorld leaders gather on Friday for the annual Munich Security Conference, a meeting begun at the height of the Cold War to address severe military challenges.
Local schools have bolstered security since Parkland  NBC 15 WPMIBALDWIN COUNTY, Ala. (WPMI) — Governor Kay Ivey's Sentry Program is designed to help protect schools that do not have school resource officers on hand, ...
Facebook's internal security goons track ex-employees and critics using Facebook's apps  Boing BoingIf you're a disgruntled ex-Facebooker or someone who "made threatening statements" against the company, there's a chance its internal security force is tracking ...
SC Declines Karti's Plea of Putting His Rs 10 cr Security as Interest-bearing Short Term Deposit  News18The ED had earlier opposed the plea of Karti Chidambaram is seeking permission to travel abroad, and said that he has been evasive, non-cooperative and ...
Uganda deports MTN chief over 'national security'  Fin24Uganda has deported the Belgian head of South African telecoms giant MTN's local branch, the company said Friday, making him the fourth employee to be ...
How local towns are handling cyber security after several hit by hackers  WFSBThere have been major security breaches at global companies, such as Facebook Marriott, and Dunkin' Donuts, but recently, hackers are going local, hitting ...
IRL streamer shot in the leg by security guard during broadcast  Dexerto.comAn IRL YouTube streamer was injured when a security guard discharged his weapon while the streamer was broadcasting on Thursday, February 14.
Home security  YourErieFor many, home is a place to make memories with loved ones and a safe haven for children. But, it's not always the case.
UN praises Kenya's progress in food security  Daily NationOther countries show poor progress in attaining food security standards.
Why the security situation in Kashmir keeps going from bad to worse  ThePrintThings have come a full circle in Kashmir. When militancy declined in the mid-2000s, there was widespread acceptance in the Kashmiri society that violence had ...
Chinese facial recognition database exposes 2.5m people  Naked SecurityA company operating a facial recognition system in China has exposed millions of residents' personal information online.
Lowell school employee arrested by Homeland Security  WXMI FOX 17 West MichiganLOWELL, Mich. — A part-time employee at Lowell Area Schools and Lowell YMCA was arrested this morning by the Department of Homeland Security.
India withdraws MFN status to Pakistan; security forces given free hand: PM Modi  India TVPolitics News-Terrorists have committed grave mistake, their masters will have to pay heavy price: PM Modi Security forces given free hand: PM Modi The blood ...
I-TEAM INVESTIGATES: Unlicensed security company working at local venues  WRDW-TVThis is a list of all the security companies, security guards, and private detectives caught operating illegally in Georgia.
U.S. and Iceland boost trade ties, discuss Arctic security  ReutersThe United States and Iceland have agreed to set up formal economic channels to boost trade and business investment, the countries' top diplomats said on ...
Buddy Carter votes no on gov't spending bill; says 'border security deal is no deal at all'  WSAV-TVWASHINGTON - Congressman Earl L. "Buddy" Carter (R-Ga.) says he voted against the federal funding agreement Thursday night--he writes in a statement that ...
Samsung Galaxy S9 update brings scheduled Night Mode and February security patches  XDA DevelopersThe Galaxy S9 and Galaxy S9+ are receiving an update that includes the February 2019 security patches and a schedule option for Night Mode.
Pennsylvania Senate paying ex-security chief's legal bills in harassment lawsuits  Allentown Morning CallRepublicans in Pennsylvania's Senate have been paying the legal bills of the chamber's ex-security chief in lawsuits by two women accusing him of harassing ...
Munich Security Conference: Live blog  POLITICO.euRolling news and reaction from global gathering of leaders, ministers and policymakers.
Charleston Animal Society increases security after threatening Facebook post  WCBD News 2CHARLESTON, SC (WCBD) – Leaders at the Charleston Animal Society say they have increased security after a threatening post was made towards them on ...
White House security official files whistleblower complaint against boss  CNNWashington (CNN) A White House security manager who alleges she was punished for accusing her boss of flouting security procedures and engaging in ...
Foreign-born directors of security vetting companies cause concern  The AgeA private company tasked with security vetting government officials has four foreign-born directors, raising concerns about government oversight of its vetting ...
Border security compromise splits Georgia lawmakers  Atlanta Journal ConstitutionA bipartisan border security bill that raced through both chambers of Congress on Thursday won over several Georgia Republicans along the way.
Security video captures gunmen firing rounds at Markham home  CTV NewsPolice are searching for a pair of armed gunmen who were caught on surveillance video firing rounds at a home in Markham last month.
The secret to happiness? Health, housing and job security  The GuardianWhen it comes to the life satisfaction of UK citizens, the ball is in the government's court, says writer and philosopher Julian Baggini.
Lenovo Watch X packs various security bugs reveals a researcher  gizmochinaLenovo Watch X, launched last year as an affordable smartwatch for users in China. It was mainly designed to attract budget smartwatch segment users. Despite ...
How to enable HDR in your Ring security camera  TechHiveRing is adding an HDR (high dynamic range) feature to its cameras, but it doesn't come switched on by default. HDR helps even out the bright and dark areas of ...
Millennium Library introduces security upgrades  CTV NewsNew security procedures are coming to the Millennium Library.
Two radicalised Singaporeans detained under Internal Security Act  Channel NewsAsiaSINGAPORE: Two Singaporean men have been detained under the Internal Security Act (ISA) for their involvement in terrorism-related activities, the ...
Tesla’s new ‘sentry mode’ camera security feels more like a hack than a real feature  VentureBeatTesla is launching a 360-degree surveillance system to some cars today, but for now it feels like more of a hack than a real feature.
Canada's cyber security agency says it responds to thousands of 'incidents' on government networks — but no actual attacks  National PostCanada's foreign signals intelligence agency says government networks have weathered a lot of cyber security “incidents” but no successful attacks in the last ...
PREKEH THREATENS SECURITY FORCES | News  Jamaica Star OnlinePrekeh, the most wanted man in Jamaica, has released a video, threatening to avenge the death of his friend, Richard 'Cruz' Anderson, who he said was killed ...
Government makes security a priority  Jamaica ObserverTHE Government intends to create and table enhanced security measures legislation in Parliament t...
Off-duty security guards stop man with knife at Nashville restaurant  WSMV NashvilleThree off-duty security guards stopped a man who walked into a Nashville restaurant with a knife. They were eating lunch at Germantown Pub when it happened ...
New security measures under consideration at Providence City Hall  Turn to 10Providence officials are considering boosting security at City Hall, including adding metal detectors and closing some entrances to the public. The newly-created ...
7 security tips to stop apps from stealing your data  CNETWe regularly see news about ways our personal information has been compromised after a data breach -- and apps can be part of the problem. Apps have been ...
Prisons minister hails 'significant progress' after tougher security at problem jails  Sky NewsThe prisons minister has told Sky News he is "quietly confident" he will be able to keep his job amid indications drug-taking and violence in some jails is ...
Bars turn to security cameras to fend off Texas booze police  Houston Chronicle Just after midnight on June 1, 2017, an undercover team from the Texas Alcoholic Beverage Commission walked into Bombshells on Gulf Freeway, southeast of ...
True North apologizes after event security takes away man’s walking stick  CTV NewsA man with mobility issues hopes to see policy changes after his walking stick was taken from him at an event at the Burton Cummings Theatre on Tuesday.
Courts Should Not Defer to Trump’s National-Security Pretext  National ReviewEarlier today, Sarah Huckabee Sanders announced that President Trump will sign the compromise government funding bill and “will also take other executive ...
Extra security at Fayetteville middle school after student threatens shooting online  WRAL.comExtra school resource officers reported to a Fayetteville middle school on Friday after a student posted a threat on social media on Thursday.
Proposed border security deal includes more than $1.37B for steel barriers  KGBT-TVThe border security deal passed by Congress contains certain restrictions that would protect some areas in the Valley from a border wall. The bill the President ...
Drag Queen Story Hour: Threats compel deputies to make security plan for Greenville event  Greenville NewsThe Greenville County Sheriff's Office is putting several temporary rules in place for the duration of a Drag Queen Story Hour event and protest at the Five Forks ...
Selfies and security: Russia moves to ban certain millennial behavior in the military  DefenseNews.comMOSCOW — The Russian parliament has approved a second draft of a bill to ban *service* members from carrying certain electronic devices and sharing ...
Footage Shows Deputy Cover Home’s Security Camera With Mud To Block View  KFSM 5NewsonlineJEFFERSON COUNTY, MO — The Jefferson County Sheriff's Office is apologizing after surveillance footage shows a deputy covering up a home owner's ...
Awantipora attack due to compromise on national security by Modi govt: Congress  The Indian ExpressCondemning the attack, Randeep Singh Surjewala said, "Uri, Pathankot, Pulwama- the terror list and compromise of National Security by Modi Govt continues ...
Bankers have another data security issue to worry about  American BankerA key security vulnerability that many banks still need to address is how to keep data safe when it is being used by an application — a process called “data in ...
What Gwede Mantashe wants you to know about his Bosasa security systems  News24This weekend former ANC secretary general Gwede Mantashe took journalists on a tour of his three properties where "around" 2015 and 2016, corruption ...
Head of security at DNC issues stark warning to presidential candidates  CNNNew York (CNN) The Democratic National Committee's head of cybersecurity is warning presidential primary candidates that the best time for hackers to target ...
U.S. Congress poised to vote on border measure without Trump wall  ReutersThe U.S. Congress on Thursday aimed to end a dispute over border security with bipartisan legislation that would avert another partial government shutdown but ...
StartupBharat: This Indore-based security startup is securing your infrastructure data using a hacker’s point of view  YourStory.comSecuritybulls is a penetration testing and infrastructure security *service* provider that analyses threats to a company's digital assets from a hacker's point of view.
Authority disowns comments on arming of private security guards  The Star, KenyaThe board charged with regulating security firms has disowned statements by its chief executive Fazul Mahamed that guards will be issued with guns in June.
'Whistleblower' seeks protection after sounding alarm over White House security clearances  NBC NewsA White House staffer is seeking whistleblower protection after raising concerns about security clearances for Jared Kushner and other officials, sources say.
Apple takes data security seriously, adds two-factor authentication requirement for app makers  ETTelecom.comThe company said that 2FA dramatically improves the security of Apple IDs.
Android’s Real Security Problem is the Manufacturers  How-To GeekIf you're running a Google Pixel handset, your phone is safe from a security hole that could let a PNG file completely wreck the system. If you're using nearly any ...
‘They swarmed him’: Security guard badly beaten after asking group of boys to quiet down  Hawaii News NowKALIHI (HawaiiNewsNow) - Honolulu police are investigating after a security guard was badly beaten by a group of teenagers near the Towers at Kuhio Park on ...
Kagame in Munich for security conference  The New TimesPresident Kagame on Thursday arrived in Munich, Germany for this year's Munich Security Conference that starts Friday. On Thursday evening, the President ...
Don’t Get Your Valentine an Internet-Connected Sex Toy  WIREDMozilla expands its “Privacy Not Included” gift guide to the bedroom: It's all sexy fun and games until someone hacks a WiFi-enabled butt plug.
There Has Been No Aadhaar Data Security Breach: Centre Tells Delhi HC In Prof. Shamnad's PIL [Read The...  Live LawIn its response to the petition filed by IP Academic Prof. Shamnad Basheer in the Delhi High Court seeking damages for the losses due to Aadhaar data leak, the ...
Sudan accuses protest leaders of threatening national security  ArabnewsKHARTOUM: Sudan on Thursday accused campaigners spearheading protests against President Omar Al-Bashir's rule of threatening national security and ...
School security has intensified since Parkland  WCYBEver since a school shooting in Parkland, Florida took 17 lives a year ago, more than ever, school security is at the front of people's minds. Jon Dempsey is now ...
Patch Tuesday, February 2019 Edition  Krebs on SecurityMicrosoft on Tuesday issued a bevy of patches to correct at least 70 distinct security vulnerabilities in Windows and software designed to interact with various ...
Decline in local farmers' production could pose DC-area food security challenges  WTOPThe D.C. metro area is becoming less capable of being able to feed itself, one expert said, “particularly as population grows and demand increases, along with ...
Lenovo Watch X Riddled with Security Vulnerabilities  ThreatpostResearchers are raking the Lenovo Watch X over the security coals in a report that blasts the device for shipping with a half dozen “disturbing” privacy and ...
Security chiefs cited in theft of Karuma dam materials  Daily MonitorMaj Gen Sabiiti Muzeeyi recommended remedies such as construction of wall fence and setting up a monitoring tower.
Kaspersky Total Security vs. Norton Security Premium  PCWorldKaspersky is a fan favorite in the AV world, while Norton is a longtime brand that's not nearly as beloved. Who wins when these two suites mix it up?
Counter-Terrorism and Border Security Bill given Royal Assent  GOV.UKThe police will receive new powers to investigate hostile state activity as new the Counter-Terrorism and Border Security Act becomes law.
Encounter underway between militants, security forces in J&K's Pulwama  Moneycontrol.comSecurity forces launched a cordon and search operation in Ratnipora area of Pulwama in south Kashmir during the night following specific information about the ...
German Ex-Air Force General: 'US Betrayed European Security'  Sputnik InternationalA former head of NATO's Military Committee has slammed the US move against the Intermediate-Range Nuclear Forces Treaty (INF) as “extremely dangerous” ...
Watch | Rafale Deal: Did Modi Government Compromise National Security?  The WireIn this episode of 'Arfa ka India', the controversy regarding the Rafale deal is discussed.
Rational Security: The 'Home Stretch?' Edition  LawfareIs Robert Mueller nearing the end of his Russia probe? The administration moves to block Chinese telecom giant Huawei. And you too can have your own ...

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More