Video courtesy of HowStuffWorks.com: Marshall Brain
Nowadays, there is absolutely no excuse to go without an antivirus program on your PC or even your Mac. Since the first Macintosh-targeted malware began to appear in mid-2011, anti-virus companies have been stepping up their game on all fronts. The virus-writing community still favors PCs running Windows, and although Microsoft's latest version is largely more secure than previous versions, an ounce of prevention is still very much worth a pound of cure. And, with inexpensive protection that is light on system resources, along with Microsoft's offering of a free anti-virus solution, you can be assured of complete protection, without having to break your wallet.
MICROSOFT SECURITY ESSENTIALS
Microsoft Security Essentials provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free download from Microsoft that is simple to install, easy to use, and is automatically updated to protect your PC with the latest technology. Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.
GET SECURITY ESSENTIALS NOW FOR FREE:
SOPHOS ENDPOINT SOLUTIONS
Ruggiero AV Services supports systems which utilize the anti-malware protection of Sophos Endpoint Security (AntiVirus, Firewall, and Application Control). Sophos products are usually distributed by businesses, schools, and other such institutions. Based on their license agreement, a student, teacher, or employee may utilize the same protection afforded their corporate machines on their home computers. Ruggiero AV Services handles reinstallation and upgrades ONLY, although we will perform a full install as part of a pre/reload of a customer's system IF proper proof is provided that said user is allowed to access the Sophos product in question. For the latest anti-virus news and updates, to learn about trial products, and to download free virus-removal tools, all users can visit Sophos at http://www.sophos.com
Because antivirus software is so important, virus-writers have taken a new tack on propagating their code - make it look like an anti-virus product! Rogue Security Software continues to be a growing and serious security threat in desktop computing, and was first referenced in a 2008 Microsoft Security Intelligence Report.
An example screenshot of such software is shown below. Please see this website for more information: http://en.wikipedia.org/wiki/Rogue_security_software
Name-Changer: "Windows 7 Recovery", "Vista Security 2012", Others
This is another variant of the many fake anti-virus programs out in the wild. This is not just limited to Windows 7 systems, as it will present itself as Windows XP Recovery or Windows Vista Recovery on those specific systems.
For removing these and other variants, please visit BLEEPINGCOMPUTER.COM
It used to be that an e-mail viruses propagating through Windows used your address book to spread themselves. Now, in 2012, more people are finding their web mail accounts -- such as those from Yahoo or Hotmail -- spewing OUT junk mail besides receiving it! The old "safety checks" still apply - make sure your password is secure, change it often, and double check your contact list to ensure there are not any rogue addresses. But, how DO modern-day hackers get access to your e-mail account now? The answer - common sign-in services that link your e-mail or portal account to another account on Facebook, or Twitter, for example. While this is convenient, there is a caveat that if anything goes awry at Facebook, for example, and you've GRANTED PERMISSION for Facebook to access your address book at ANY TIME, your e-mail account is at risk.
Another way for hackers to grab your e-mail account details is by trying to log in via the MOBILE vector of these services. Some people turn on mobile access to their mail, Facebook, Twitter, or other such account, then forget about it ... until it is too late. So, unless you really have a need, UNLINK your account from your phone, or establish secondary credentials to authorize only YOUR specific devices. Also, if available, make sure that log-in sessions time out after a short period, as well as making sure that they can only take place from your specific city, state, or country, as most hacks take place from off-shore locations.
If you have any questions about this, or need assistance in clearing up a supposed breach, please let us know... CONTACT US right away!
11 Sure Signs You've Been Hacked: