In our first part of this series, we provided a few scenarios of your system not working the way it should and how it could be a symptom of a malware infection. Unfortunately, if you thought those were the only symptoms of infection, you were sadly mistaken. We have only scratched the surface so far – the people who create malware are continuously innovating and finding different ways to hit their targets.
How do we stay a step ahead and spot an attack immediately? Here’s a run-down of some other warning signs of an infection:
Help, I didn’t send this mail/Facebook message/status update
Are you getting calls from irritated friends and colleagues about being bombarded with messages of a dubious nature from you? And are you not able to convince them that it’s just not you?
Step very carefully because you might be in trouble. If messages are going out from your email id or from a social media handle belonging to you, your personal credentials have most certainly be compromised by a malware and are in the hands of a hacker. And if you are the sort who uses the same username and password on all their websites, step into action now. Change passwords of all your accounts, check with your bank about fraudulent transactions in your name – basically do a thorough and quick sweep everywhere you have an account. Remember the slower you move, the more damage the hackers cause.
Why am I getting pop-ups all the time…
…even when I’m not browsing the Internet?
Because most probably you have clicked on a link you shouldn’t have and downloaded a malware whose only purpose is to assault you of ads (often of pornographic nature). And it doesn’t have to be just when you’re browsing – it can even happen when you’re not browsing the Internet.
It’s time for a full-system, anti-malware scan preferably after putting the system in safe mode. Be thorough and be sure to uninstall anything that the scan turns up.
My pen drive has weird files on it which I didn’t put
Pen drives or USB disks, as they are also known, can be the most effective vectors of transferring malware. That’s why many offices ban their systems’ USB slots, both for information security and to ensure malware doesn’t get transferred easily. If a pen drive has files and folders on it of a suspicious nature, be careful. Scan it immediately with your cybersecurity solution which will either delete or quarantine the files. On no account, should you use the pen drive to transfer files without scanning – there is a significant risk of malware infection.
There are new programs that I see on my desktop/Start Menu
A lot of times when you download or install a software, it comes bundled with other software. At times, the fact that you are also installing the bundled software is hidden amidst reams of text in the Terms and Conditions and if it’s of a malicious type, it’s not even mentioned. This bundled software may or may not be malicious – but it could be annoying. It could install different screensavers, change your homepage, download music you don’t want or it could be malicious and track your actions online. Be aware of what you’re downloading or installing, where it’s come from and read the terms and conditions carefully.
Everything is working smoothly
Perhaps, your system is not facing any of the problems outlined in this list or the one before. Internet is browsing along, there are no suspicious pop-ups or messages, the disk space has not been tampered with – is it a chance to let your guard down?
That’s exactly what the cyber criminals want. Just because there is nothing untoward does not mean you are safe. Keep your defenses strong, scan everything you install and ensure you keep your passwords safe. Also, keep your anti-virus solution patched and updated always.
Seqrite’s Endpoint Security (EPS) offers a solution to guard against these threats – a simple and comprehensive platform boasting of advanced features such as Anti Ransomware, Advanced DNA Scan, Behavioural detection systems, Advanced Device Control and Web Filtering to protect any security vulnerabilities. By keeping devices secure, organizations can take one step more in keeping their networks safe.
As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more
No Comments