Malware Removal

How did I get this malware?

We get this question all the time. Unfortunately, there are a number of ways to get malware. It could be careless downloading, an infected email, social media, games or a number of other things. Fortunately, we have you covered. We have yet to meet a piece of malware we can’t remove and don’t plan to ever be in that situation.

If you suspect you have malware, the best thing you can do is turn off your computer and call. While most malware is pretty harmless and is meant to be more of a nuisance than anything else, there are a handful of different pieces of malware that are very malicious and can steal information off the computer or corrupt the computer. Turing the computer off is usually the best method to protect yourself from those.

As mentioned above, there are many different types of malware, below are just a few of the most popular ones.

  • Adware: Software that gets installed on your computer that’s primary function is to display ads and popups on computer. While they are more of a nuisance most of the time, they can be bundled with spyware which makes them much more dangerous.
  • Bot: A program created to perform automatically specification operations. While some uses of bots are relatively harmless like video games, internet auctions and other minor uses, activities such as a DDoS (Distributed Denial of Service)  are much more harmful.
  • Ransomware: This type of malware is dangerous. Essentially it will infect the computer and request a monetary ransom in exchange for your files and information back. They are growing in popularity and are increasingly difficult to remove / protect against
  • Rootkit: A program that is installed on a computer to remotely control it without being detected by other users or security programs. It has the ability to steal information, change software and modify your system once it penetrates the system.
  • Spyware: It’s primary function is to spy on the user without the user knowing. Spyware is known to steal information from users such as logins and other confidential information.
  • Trojan Horse: A program that masks itself as another program to install more malware on the computer. They are very dangerous and deceptive to users.
  • Virus: A program that copies itself and spreads to other computers. It can be spread a number of ways like script files, documents, pictures or a number of other file formats.

Note that most malware that users encounter tends to be Adware and not the more malicious form, however; all malware should be treated seriously. If you think your computer is infected, reach out to us as soon as possible.

how can we help you?

We’ll help with anything from your wifi not working to setting up a comprehensive technology plan for your business. Contact us and we’ll get in touch with you ASAP.

First time experience with HAS The Geek (Hunter) and we are completely satisfied. He repaired two home computers which were near death ….professional, courteous, affordable rates …highly recommend. Give him a call now!

Dave L