Malware: Know Your Enemy!
As we discussed previously, email is a very common method used in the transmission of malware to your computer. The malware that can be distributed to your device itself, however, can vary greatly in terms of its function and result. Some can be a mere annoyance, while others can wind up costing you a great deal of money. For this reason, it’s important to be able to recognize the threats available and know what is at stake.
Types of Malware:
Adware

When downloading and installing a new file, it is very important to see if it comes bundled with any other software and uncheck any “premium utility upgrades” or something similar.
Bots

You can tell if you are infected with a Bot by monitoring your email activity. Common signs of infection include new email accounts synced with your computer and undelivered message alerts for emails you did not send.
Ransomware

Ransomware is arguably the most harmful to your devices because it can permanently block usage unless the fine is paid. By simply paying the fine, however, you provide a cyber criminal with personal information that can be used to steal more money from you. Depending on the complexity of the encryption used, a hard drive wipe may be the only way to remove the lock. For this reason, it is highly important to backup your data regularly as a precaution.
Rootkit

Due to the stealthy nature of Rootkits, they are virtually undetectable on the devices they infect. The only way to locate the file with specialized software the can recognize it within your processes.
The best approach in prevention and detection is to regularly look up the processes that run in the background of your device and look out for any new files.
Spyware

In its most malicious form, however, SpyWare can be used to record your keystrokes and acquire important data, such as passwords and credit card information. Like Rootkits, keylogging software also runs silently, and can best be recognized from within your processes tab. Spyware can also slow your computer function by a considerable amount, so you must also be on the look out for sudden changes in computer performace.
Trojan
Trojans are not so much malware with a specific function as they are a specific mode of delivery. Similar to the story of the Trojan Horse in Greek Myth, Trojan software will be presented as a safe file to download but have malicious content hidden within. For this reason, it is important to review all potential downloads for incorrect spelling, vague titles and other conspicuous details.
Results of a Trojan download include infection with any of the other forms of Malware described above, and the subsequent effects associated with them.
What do I do if I’m Infected?
First off, simply keeping all your software updated is a very good preventative measure against malware, as it can recognize malicious files before they have the chance to infect you. Updated operating systems and antivirus, for example, can quarantine viruses and prevent them from affecting your files and spreading elsewhere.
In the event that you are infected, running anti-virus software the moment you notice the infection is the first step to make. From there you can isolate and delete the malicious content. If this does not work, see if you can restore your computer to a previous saved state before the infection. There is always the chance that the infection may carry over back to the previous iteration of your device and may require a more in-depth removal process.
In this case, taking your device to a professional like Metro CSG for removal may be your best bet. In addition to removing infection, Metro CSG can also review your system for weaknesses and provide upgrades to prevent future infection.
If you have any concerns about your risk for infection, please reach out to us for a discussion about your security options. We would be happy to speak with you.
			
					
