Archive for September, 2016

 

How to keep backups safe from malware

img_5327

The worst of malware doing the rounds is so-called ransomare, locky, cryptolocker, rogue or fake antivirus, with new variations popping up often. It is installed covertly on the machine and may first attack your antivirus programs to avoid detection. The likelihood of detection is reduced due to the malware’s attack vectors and its sophistication. Modern antivirus programs are often found on computers with this type of active malware.

We are seeing more recent variations of this virus which bypass the ransom payload,  its purpose can also be to steal banking information, credit card details, or identity. The ransomware version may lock (encrypt) your files or even attack the MFT (master file table) which locks you out of your drive. This is the point where you can say goodbye to your data.

img_5328

 

Protecting your backup from nasty malware.

If you are backing up your files to any medium that backup will be at risk of the same data encryption described above. If you are a small business, a home office, or just a home user with precious family photos, you need to make sure you are using best practice to prevent the cryptolocker virus from infecting your backup. We now offer this service by safe, remote login to your computer.

Call today to get industry best practice backup mitigation for home or small office, small business.

 

 
 
 

Removing Browser redirect hijacks (solved!)

 

redirect-hijack

example of a browser hijack with spyware

You will know it if you have a browser redirect virus, also known as the google redirect virus or malware. The various iterations of the dreaded browser hijack or redirect removal solution is a mystery to many on internet forums. It’s nasty and resists every attempt at removal. It is invisble, undetectable by all the malware scanners and antivirus programs including Norton’s Powerful Eraser tool, bitdefender speciality tools, eset’s usually very efficient scanner in ramdisk, in fact just about everything.

We had a business client with this infection and after struggling to remove it, we decided to persevere until we found the mechanism and methods to remove it. Unfortunately, it seems each variant or type of this infection has it own methods to provide a successful removal. There is no single access point to remove it.

But good news! We offer an online (remote access) service to remove this, along with all the other bugs on your computer. If you are anywhere in Australia call or email to arrange a good time for us to log in for you.

wiredoffice.com.au has been providing trusted service for over 15 years and is a Microsoft registered partner, and a Microsoft Certified Professional (MCP).