Your Computer Has Been Hacked IF!

gAtO kNoWs If –

Unexpected images. You might see pornographic images pop up or replace benign images, such as photos on news sites.

Random connections to unknown websites. You’ll get an alert from your legitimate anti-virus software telling you that an application is trying to connect to a website you’ve never heard of.

Your computer slows down. “One of the popular scams right now is something called ‘pay per install,'” Armstrong said. “There are third-party companies out there in places like Russia and China that will allow you [bad guys] to go to their forums and sign up to receive a piece of software and they will pay you for every thousand users you can fool into installing the software.

“So these people who try to trick you into installing rogue software will put as many things on your computer as possible at the same time to make the most money. And with all this spyware and applications running at the same time, you’ll see a slowdown in performance.”

Files or folders are deleted or changed for no reason.

Your files might be missing, or the icons and/or content of your files could be different.

Unexpected sounds play randomly.

Occasionally, the computer will respond with an audio signal to things that you have no control over.

“They’ll be things like warning beeps,” Armstrong said. “When an error message pops up a lot of times, it will come along with a warning message and certain pieces of malware will stifle that window so you can’t see it. But you might still hear the warning message — a sound in the background that you didn’t initiate.”

Unexpected pop-up windows, such as fake virus warnings telling you that you have security threats on your computer.

“One of the things we always tell people is that as of right now, there’s no way a website can tell you if your computer is infected,” gAtO said. “Sometimes Skype will pop up a message saying, ‘urgent security vulnerability.’ But Skype can’t tell if your computer is infected.”

Check your anti-virus software vendor’s website: 

for information on dedicated utilities that you might need to remove a particular malicious program.

But remember: The best defense is a good offense. Take the necessary precautions to keep your computer from getting infected. Install anti-virus software now, if you don’t have it already, and take the time to create a rescue CD using that vendor’s software.

Boot from a rescue CD. Some nasty forms of malware will cripple or kill anti-virus software. In that case, burn a Linux-based rescue CD, which will reboot your PC or Mac and disinfect and repair its files. Most major anti-virus software makers offer the files for free — all you need is access to another PC with broadband connection and a CD burner.

Restart your computer in safe mode. On a Windows PC, press and hold F8 as soon as the reboot begins, then choose ‘Safe Mode’ from menu that appears. On a Mac, hold down the Shift key while rebooting. Then perform an antivirus scan to eliminate any other potential infections.

Stop a pop-up message by going into the Task Manager (on a Windows PC, hit the Control, Alt and Delete keys at the same time) and manually killing the process that’s running the pop-up. (On a Mac, go to the Apple menu in the top left and select Force Quit.)

But the infection will persist. Installing and /or running anti-virus software — if the malware will let you — is the way to fix this problem. (If not, keep reading.)

o if you suspect that you know your computer may be infected with malware, what can you do about it?

The first thing to do is take steps to avoid getting infected in the first place, Armstrong said. That includes making sure your applications, anti-virus software and operating system are all updated.

You can also reduce potential vulnerabilities that cybercriminals could exploit by uninstalling applications that you don’t use very much.

But if your system is already infected get HELP FAST!!!!!

gAtO oUt-


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: