Anti-Virus Support

Video courtesy of Marshall Brain

Nowadays, there is absolutely no excuse to go without an antivirus program on your PC or even your Mac.  Since the first Macintosh-targeted malware began to appear in mid-2011, anti-virus companies have been stepping up their game on all fronts.  The virus-writing community still favors PCs running Windows, and although Microsoft's latest version is largely more secure than previous versions, an ounce of prevention is still very much worth a pound of cure.  And, with inexpensive protection that is light on system resources, along with Microsoft's inclusion of a free anti-virus solution in the latest versions of Windows, you can be assured of complete protection, without having to break your wallet.

Microsoft Security Essentials, available for Windows XP and Windows 7 users, provided real-time protection for home or small business PCs against viruses, spyware, and other malicious software. Microsoft Security Essentials evolved into revisions of the Windows Defender product included with Windows 10, and is no longer offered as a stand-alone product.

Ruggiero AV Services supports systems which utilize the anti-malware protection of Sophos Endpoint Security (AntiVirus, Firewall, and Application Control).  Sophos products are usually distributed by businesses, schools, and other such institutions.  Based on their  license agreement, a student, teacher, or employee may utilize the same protection afforded their corporate machines on their home computers.  Ruggiero AV Services handles reinstallation and upgrades ONLY, although we will perform a full install as part of a pre/reload of a customer's system IF proper proof is provided that said user is allowed to access the Sophos product in question.  For the latest anti-virus news and updates, to learn about trial products, and to download free virus-removal tools, all users can visit Sophos at


Because antivirus software is so important, virus-writers have taken a new tack on propagating their code - make it look like an anti-virus product!  Rogue Security Software continues to be a growing and serious security threat in desktop computing, and was first referenced in a 2008 Microsoft Security Intelligence Report.

An example screenshot of such software is shown below.  Please see this website for more information: Defender 2010 Screenshot - fake antivirus

Name-Changer: "Windows 7 Recovery", "Vista Security 2012", Others

This is another variant of the many fake anti-virus programs out in the wild.  This is not just limited to Windows 7 systems, as it will present itself as Windows XP Recovery or Windows Vista Recovery on those specific systems.

For removing these and other variants, please visit BLEEPINGCOMPUTER.COM



It used to be that an e-mail viruses propagating through Windows used your address book to spread themselves.  Now, in 2012, more people are finding their web mail accounts -- such as those from Yahoo or Hotmail -- spewing OUT junk mail besides receiving it!  The old "safety checks" still apply - make sure your password is secure, change it often, and double check your contact list to ensure there are not any rogue addresses.  But, how DO modern-day hackers get access to your e-mail account now?  The answer - common sign-in services that link your e-mail or portal account to another account on Facebook, or Twitter, for example. While this is convenient, there is a caveat that if anything goes awry at Facebook, for example, and you've GRANTED PERMISSION for Facebook to access your address book at ANY TIME, your e-mail account is at risk. 

Another way for hackers to grab your e-mail account details is by trying to log in via the MOBILE vector of these services.  Some people turn on mobile access to their mail, Facebook, Twitter, or other such account, then forget about it ... until it is too late.  So, unless you really have a need, UNLINK your account from your phone, or establish secondary credentials to authorize only YOUR specific devices.  Also, if available, make sure that log-in sessions time out after a short period, as well as making sure that they can only take place from your specific city, state, or country, as most hacks take place from off-shore locations.

If you have any questions about this, or need assistance in clearing up a supposed breach, please let us know... CONTACT US right away!