In “the ABCs of Malware,”  part one (1) of our 3-part series, Alan Buckwalter of Jefric Consulting helped us define exactly what Malware is, and what it does.

In part 2 of our three-part series on Malware, we focus on what to look for to help you minimize the chance of an attack and to at least help you realize that you may have been victimized which is sometimes half the battle so that you can at least take steps to clean up the mess.

Malware Examples

An email from “Microsoft Team []” – What’s wrong here?

At quick glance, this email seems to be coming from Microsoft.   A closer look shows it coming from me.  The message also had a small attachment. This is possible malware.

While I don’t often send email to myself, I certainly don’t try and pass it off as coming from Microsoft. This is a common method used to confused junk mail filters. The attachment could be malware, which would open my computer up to other types of infections. In this case, I just delete it.

Pop-Up’s – Your computer is infected – click here to download a fix.

People writing malware are getting cleverer each day. In this case the user is being presented with a possibly false alert which may trick them into downloading the actual piece of malware. In this case it is best to “X” out of the window and manually scan your computer with a known and trusted anti-malware piece of software. Don’t take chances.

Your bank policy has changed, click here to update your account profile.
Your password has expired, click here to change it.

This may be a Phishing scam. When you click on the link you are asked for your old one, and then a new one. Now the attacker has two of your likely choices. Be cautious when you click on links in an email, if at all. Let your mouse hover over the link in the email. You should be alarmed if the address in the email does not match the address that is displayed next to the mouse pointer.

Next:  Suggestions on how to prevent and remove Malware.