Worms, Trojans , and Rootkits are not the same.
A recent report from TrendMicro/ZDI stated that Apple has ceased development of Apple Quicktime, and has also revealed two critical vulnerabilities under their Zero Day Initiative. These two vulnerabilities are considered “remote code execution” vulnerabilities, which means a miscreant could get the victim to click on a link or visit a website, and can remotely […]
Microsoft Office users must take steps to guard against ‘macro’ viruses
17 signs that your PC might be infected with a virus or some kind of malware.
Easy things you can do to protect against one of the fastest growing threats on the Internet.
Historical data from Virus Bulletin reveals an alarming trend.
A tip-filled conversation with Andrew Brandt, director of threat research at Solera Networks, reveals some of the ways hackers sneak malware into PCs.
All the advice you’ve ever heard about how to avoid getting infected by a computer virus may be wrong. Well, at least some of it…
How to prevent your USB drive from getting infected and protect your system from USB drive virus attack.
The most common virus in the wild is called the Department of Justice Virus. The virus locks your computer and requests a bounty of $300 to unlock your computer and avoid government prosecution.
How a new type of computer virus is using millions of PCs to generate $96k per day…and how to get rid of it.
Microsoft’s EMET app can help fight off an attack until there’s a patch.
There is a saying that nothing in life is free however, I do believe that there are some very good free software programs that you should use on your system to help maintain it, keep it free of malware and viruses and even provide technical support to family and friends.
Over the years I’ve attended a number of conferences and panels on what originally was called Spyware and Adware. I think we’ve finally settled on using the term Malware for any kind of spyware, virus, Trojan horse or any kind of unwanted computer invasion. I fondly remember my first conference in Washington DC which included panel discussions like “What is Spyware”.
The good news for Detective Mills is “not her pretty head”.
The bad news for Detective Mills is “some rogue AV”.
“Somehow I got a virus called XP Total Security, and I can’t get rid of it. It blocks my security software, and it won’t let me download any new anti-virus tools. It’s even asking me for money… how do I get rid of this thing?”
The death of Bin Laden has generated a whole bunch of scams and new malware.
A nasty piece of malware known as LizaMoon has hijacked links on millions of websites in the past weeks, including some normally safe iTunes and Google links.
Windows Emergency System is not a Microsoft application, but a fake created by scammers designed to infect PC after PC in hopes of tricking people into buying the software.
Score one for the good guys this week as the The FBI and US Department of Justice unleash a powerful and quick take down of the “Coreflood” botnet.
Coreflood was a massive international network of more than two million infected computers; computers that were used to empty bank accounts, score sensitive corporate data and steal untold financial data. This is a huge victory as this particular botnet has been in operation for 10 years.
By Leo Notenboom
For some reason many people’s gut reaction to a malware infestation is to consider a new machine. That’s just … wrong.
By Leo Notenboom
Virii & Spyware & Worms … oh my!
“Internet Safety” seems like an oxymoron.
It seems like not a day goes by where we don’t hear about some new kind of
threat aimed at wreaking havoc across machines connected to the internet. While
products other than Microsoft’s are certainly vulnerable, anti-Microsoft
sentiment coupled with the massive installed base make Microsoft products an irresistible target for hackers and “script kiddies”.
Here are some things you can, and should, do to stay safe.
Malware can mutate within minutes. If you’re infected, clean it fast and clean it completely.
First and foremost have a solid and reliable detection and removal program installed on your system. I use and recommend PC Matic everyday. It’s my first line of defense. I run PC Matic once a week and let it check for infections while it cleans and updates my system. The latest virus definitions are updated from our server each time I run the program. I know I’m ahead of the curve for detection.
By Leo Notenboom
If your contacts are getting email from you that you didn’t send, then it’s very likely that your email account has been compromised.
PC Pitstop is proud to welcome industry veteran Leo Notenboom as a new guest contributor. Leo has been involved in the tech industry for nearly 30 years. After retiring from an 18 year career as a Microsoft Software Engineer Leo went on to create Ask Leo!, a free web site where he answers real questions from ordinary computer users.
By Leo Notenboom
You’re minding your own business and one day you get email
from someone you’ve never heard of and they’re asking you to
stop sending them email. Or worse, they’re angry. Or worse
yet, they accuse you of sending them a virus! But you don’t
know them, you’ve never heard of them, and you know you’ve
never sent them email.
By Bill Pytlovany
No, itâ€™s not under attack by rebelâ€™s in Iran. Itâ€™s the same old malware attacks using popular topics or trends on Twitter.
Itâ€™s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.
PC Pitstop is proud to introduce: Exterminate 2.0 – a groundbreaking, mold smashing – malware, virus and spyware fighting solution
It was a cold day in South Dakota (circa 1990) as I entered the Gateway building. Unlike most days, the hustle and bustle of a rapidly growing computer company were missing, replaced by an eerie still and quietness. The security guard shook his head, and said, “The software download server got hit with a virus.” All of production was shut down.
There is no doubt that the lines are being drawn for a galactic cyber battle for control over your PC and your desktop. Spyware and adware companies make barrels of money installing their clandestine applications on your PC without your knowledge. Even for an advanced user, typically the most expedient solution is to install an anti spyware product. This article will take an in depth look at the various anti spyware solutions we have seen at PC Pitstop. During this discussion, the reader should refer to our anti spyware graph from our research section.
As the companies that use deceptive software installations rack up bigger and bigger profits, their tactics are evolving to further increase their profits and ensure their long term existence. Although we had already been sued by Gator, we were a little surprised when, when we received two emails like the one below last month.
PC Pitstop is now 2 years old. Let’s all close our eyes, make a wish, and blow out the candles. PC Pitstop has been officially alive for 2 full years. And just like an infant, we have learned and gained a lot of experience in our 2nd year.
Spring cleaning for your PC
Time to update your virus list
Help support the Pitstop
E-mail your test results, troubleshoot PC problems with TechExpress
Anti-virus update: PITSTOP topples K0URNIK0VA virus, 40 – Love
Improved test results: Get detailed info on running programs
Enhanced Internet tests
Update your anti-virus file
E-mail/print a page
Cool savings on hot Gateway PCs
Improve your Internet connection speeds
Update your anti-virus file
PC Pitstop opens its e-commerce doors
Updates to our PC diagnostics and tests
Cool stats from our database