Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 1 February 2013

Malware Countermeasures

Posted on 20:47 by Unknown
OK, now that we know the types of malware, what are we going to do about it? For that, I provide the top 3 things you can do to prevent infection.

1. Use Antivirus Software. 

One of the best things that can be done is to get good antivirus software and keep it updated. A lot of people have antivirus software, but some do not keep it updated. They say: "I will update it when I need it." This is akin to: "I will enable my airbag when I need it." Does this sound smart to you? Some estimates say that at least 100 unique viruses are sent out in the wild every day. Do I have your attention? Good, because antivirus software that is kept up to date can keep you from becoming a statistic. If you would like a recommendation for antivirus software, drop me a line in the comments with a basic description of what you use do online.

2. Use Antimalware Software.

To all the parents out there: If your child is sick, say running a 103 fever. And the doctor you take them to says that they are fine, would you want a second opinion? Antimalware software works the same way, it detects most of what your regular antivirus cannot. Because after all, no antivirus can detect 100% of all malware. My antimalware of choice is Malwarebytes Antimalware. It is fast, it is robust, and it does not slow down your computer. You can find it here.

3. Common Sense. 

Did you think the last one was going to be complicated? Yeah, what now? Believe it or not, this can help you with what your antivirus and your antimalware cannot, avoiding threats before they become a problem. The websites you would not expect to be infected often do get infected for the very reasons you would not think it would get infected. But still, the infections on websites you would expect to be infected should be avoided. If you get a "document" from a friend that has an .exe (executable) file name, does that sound like a document to you? And going to unsavory websites can get you infected, so just avoid them. Remember that on the internet, if you are thinking with your other head, or not paying attention to what you are doing, you are a big target.

So what do you think about this blog post? Like It? Hate It? Drop me a line in the comments, what you like is what I will write more about.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ▼  February (6)
      • Spotlight On Malware: The Melissa Virus
      • Spotlight on Malware: ILOVEYOU (the worm)
      • Spotlight On Malware: Mac Defender
      • 1,000 pageview celebration: NavaShield
      • Yes, Macs do get viruses.
      • Malware Countermeasures
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile