{"id":1387,"date":"2014-06-03T16:15:14","date_gmt":"2014-06-03T05:15:14","guid":{"rendered":"https:\/\/www.wiredoffice.com.au\/articles\/?p=1387"},"modified":"2014-06-03T18:11:07","modified_gmt":"2014-06-03T07:11:07","slug":"how-to-tell-if-your-computer-is-infected-with-malware-and-why-you-cant-trust-your-antivirus","status":"publish","type":"post","link":"https:\/\/www.wiredoffice.com.au\/articles\/computer-security\/how-to-tell-if-your-computer-is-infected-with-malware-and-why-you-cant-trust-your-antivirus\/","title":{"rendered":"How to tell if your computer is infected with malware and why you can’t trust your antivirus."},"content":{"rendered":"

As far back as January 2013 the New York Times ran a story about Chinese hackers who successfully installed 45 malicious-ware items on the NYT’s network with Symantec\u2019s antivirus detecting just one of them. It\u2019s a common story. Recently we seen a computer with Trend Micro Titanium edition installed that had around 90 malware items and Trend did not detect a single one of them. You can read more about this in my other posts about computer security and why your annual investment in antivirus and firewalls will be giving you a false sense of safety.<\/p>\n

In 2013 Symantec (Norton) would not comment on the Chinese hacking story, but in this article <\/a>they fessed up and said antivirus is not enough to face today\u2019s threats. In our experience in the trenches no antivirus is up to the task, regardless of who wins what award for best AV of the year in computer magazines. The no virus found message after a 2 hour scan is certainly one of the problems in creating a false sense of security.<\/p>\n

Modern malware has also shown the ability to interact with antivirus and take control of these programs. So far the security industry response has been to keep their customers spending and installing antivirus. It\u2019s about as lame as the response to hackers at ATM\u2019s \u2013 use your left hand to hide your PIN, \u00a0and while we are at it let’s \u00a0introduce tap & go cards.<\/p>\n

Until things change (and don’t expect that anytime soon) you are going to need to be aware of the warning signs of a compromised system. Trojans, viruses, malware and spyware are programs that can infect systems with no user interaction on vulnerable, exploited systems. Sometimes you will see pop ups or fake antivirus, other malware is less obvious. What is a vulnerable system? Typically small business and home\/home office computers that only have an AV installed, with no other levels of security hardening<\/em>.<\/p>\n

Typical warning indicators or group of indicators of malware infection:<\/strong><\/p>\n

1.\u00a0You have a downloaded a free antivirus program and it instantly found a lot of viruses and opens the scan window every time you start your computer. The search term \u201cfree antivirus\u201d and other search terms like speed up my computer or registry cleaner program are common infection methods.<\/p>\n

2.\u00a0Your existing antivirus program has alerted you to a scan with a result, but failed to delete or quarantine the found items, or your AV has shut down.<\/p>\n

3.\u00a0Your computer is running slower than normal, crashes programs or restarts randomly.<\/p>\n

4.\u00a0Your browsers start page has changed, and, or your searches redirect you to pages you didn\u2019t search for.<\/p>\n

5.\u00a0The internet has slowed down and generally the computer is running much slower.<\/p>\n

**You still need to have\u00a0an antivirus\u00a0installed for the viruses it catches, and for banking compliance on websites.<\/p>\n

There are a number of levels to hardening<\/em> your computer beyond an antivirus program. If you are in Perth WA contact us for optimised security, screening for bugs, and current best practice hardening.<\/p>\n

Want to know which is the best AV at this time? The free Microsoft Security Essentials is our preference but stopped working on XP as of April 8 this year. If you have trouble with Windows 7 backup and MSE you may need to uninstall and install an alternative.<\/p>\n","protected":false},"excerpt":{"rendered":"

As far back as January 2013 the New York Times ran a story about Chinese hackers who successfully installed 45…
More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts\/1387"}],"collection":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/comments?post=1387"}],"version-history":[{"count":17,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts\/1387\/revisions"}],"predecessor-version":[{"id":1404,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts\/1387\/revisions\/1404"}],"wp:attachment":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/media?parent=1387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/categories?post=1387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/tags?post=1387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}