infection

Fri
11
Aug
Dennis Faas's picture

How to Fix: Remove CPX, SVCVMX and CT.EXE Malware (SmartService Rootkit)

Infopackets Reader Priscilla writes: " Dear Dennis, I am running Windows 10 and my computer seems to be infected with a rootkit from what I read online. In Task Manager's Startup , I have the following programs running: cpx.exe , svcvmx.exe , and ... ct.exe . I have tried to disabled these from startup but I get 'Access denied'. I have tried to download Malwarebytes Antimalware to scan the computer but the setup file simply won't run. I have tried downloading other antivirus programs but Edge reports that the file is corrupt. I have tried resetting Windows 10 but it fails and tells me I cannot ... (view more)

Thu
18
Dec
Brandon Dimmel's picture

TorrentLocker Ransomware Spreading Fast: Report

A new report from security firm ESET finds that the TorrentLocker ransomware scam has now encrypted an estimated 285 million files. Unfortunately, ESET security experts don't see the rate of infections dropping off any time soon. A TorrentLocker ... infection, like other ransomware schemes (such as CryptoWall or CryptoLocker ), usually takes place when a victim downloads a malicious file. Although the name TorrentLocker might suggest infections come through the way of torrents (a file typically used for file sharing), it does not; in fact, most TorrentLocker infections come through email. ... (view more)

Mon
11
Nov
Dennis Faas's picture

'CryptoLocker' Takes Your Digital Life Hostage

The newest and most frightening threat on the web is the 'CryptoLocker' ransomware, which allows cybercriminals to take control of your digital life and then offer it back to you for a fee. Thankfully, there are ways to prevent an infection. Like ... many other infections, CryptoLocker is most often spread through malicious email attachments. However, the malware can also be deployed through malicious pages on websites and compromised browser plugins. According to reports, a CryptoLocker infection allows cybercriminals to "scramble" all of you important files -- from images to Word documents to ... (view more)

Wed
29
Aug
Dennis Faas's picture

Electronic Sutures Heal Surgical Wounds Faster

The surgical process of stitching up a patient will soon receive a hi-tech makeover. The change could reduce the chance of infection and decrease healing times. A team of researchers at the University of Illinois have created the first ever ... 'electronic suture' (a stitch used by doctors and surgeons to hold tissue together). The special suture contains ultrathin silicon sensors integrated on polymer or silk strips that penetrate the skin and knot, just like standard medical stitches. To create the 'electronic sutures,' the researchers first use chemicals to cut an ultrathin film of silicon ... (view more)

Fri
13
May
Dennis Faas's picture

Windows 7 Malware On The Rise, says Microsoft

Microsoft has revealed that the infection rate for Windows 7 computers has increased. But the Windows 7 operating system still remains considerably more secure than its predecessors. The most talked-about figure in the newly-published statistics is ... a 33 per cent hike in the proportion of Windows 7 computers suffering from a malware infection. That's a potentially misleading oversimplification, though. The actual rate increased during 2010 from three PCs per thousand to four per thousand, figures that could easily be distorted by rounding errors. Windows XP Still Riskiest for Malware ... (view more)

Mon
23
Feb
Dennis Faas's picture

Spyware Doctor With Antivirus Review

If you're lucky, spyware will slow down your computer and make your daily use a frustrating experience. That is *NOT* a typo. If you are lucky, that's what will happen ... but if you are unlucky, spyware will leave your computer as good as useless, ... steal your personal data, banking information, credit card numbers, and passwords -- and make your life a living hell. What is the Difference between Spyware, Malware, and a Virus? There are distinct classifications for rogue software: all of which cause harm to your PC in some way or another. The terms spyware and malware generally refer to ... (view more)

Thu
18
May
Dennis Faas's picture

Remove SpywareQuake (Removal Instructions): Simplified

SpywareQuake is the latest rogue anti-spyware program that dupes unsuspecting users into registering (paying) for a full version of the program in order to remove a supposed Spyware infection. SpywareQuake operates in the same manner as SpyAxe and ... SpywareStrike by issuing fake warning messages similar to Windows Update Notification balloons. Click here for an example. Like SpyAxe and SpywareStrike, SpywareQuake infects the host computer due to an exploit ("bug") in MS Windows. This exploit *must* be resolved by visiting Windows Update after SpywareQuake is removed; otherwise, you ... (view more)

Wed
05
Apr
Dennis Faas's picture

System32 Folder Opens at Startup?

Gazette Reader 'Frances' writes: " Dear Dennis, When I start my computer, the System32 folder opens. I don't know how it started, but how do I make the System 32 folder stop appearing? I went to Start -> Run, typed in 'MSCONFIG', then went and ... looked at my Startup, but I don't know what to uncheck. My Norton software is up to date and I am using Windows XP and Verizon DSL. Please help. Thank you. " My response: This is a frequently asked question. In fact, I managed to find a Microsoft Knowledge Base article (KB#170086) which describes why the System32 folder may appear after you login to ... (view more)

Sat
11
Feb
Dennis Faas's picture

Remove SpyFalcon (Removal Instructions)

SpyFalcon is the latest rogue anti-spyware program that dupes unsuspecting users into registering (paying) for a full version of the program in order to remove a supposed Spyware infection. SpyFalcon operates in the same manner as SpyAxe and ... SpywareStrike by issuing fake warning messages similar (and almost identical to) Windows Update Notification balloons. Click here for an example. Like SpyAxe and SpywareStrike, SpyFalcon infects the host computer due to an exploit in MS Windows. The exploit can be resolved after infection is removed and after visiting Windows Update Web site. Both steps ... (view more)

Wed
23
Nov
Dennis Faas's picture

Anti-Spyware Options

There are so many different types of anti-spyware tools out there, that it's a daunting task trying to figure out which will work best. Is anti-spyware protection best with real-time registry monitoring tools (as with Spy Sweeper) -- or not? You may ... recall that, whenever a program is installed on (or removed from) your computer, changes are typically made in the System Registry simultaneously. By definition, a registry monitor tool will watch for changes made to your registry as a result of adding or removing, and will prompt you to either accept or deny those changes. This is a good way to ... (view more)

Pages

Subscribe to RSS - infection