2 min read

Infected or Not? Five Symptoms of a Security Breach

Loredana BOTEZATU

April 02, 2013

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Infected or Not? Five Symptoms of a Security Breach

Most viruses, worms and Trojans circulating nowadays have learned to be discreet to avoid detection. Unlike predecessors that displayed warnings on users` monitors, modern malware operates silently because crooks understood that users will install an antivirus to clean their computer at the first sign of infection.

But, no matter how stealthy these pieces of malware are, there are still signs that give them away. Here`s a list of five such signs that can help you determine whether your PC is infected:

  • Increased CPU activity. Some malware performs CPU-intensive tasks (such as mining for Bitcoins, or brute-forcing passwords). Before jumping to conclusions, though, check if the CPU spike is caused by a legit application, such as video editing software or compression utilities.
  • Keep an eye on the bandwidth. Worms and Trojans exchange lots of data with their command and control servers or, even worse, send spam or specially crafted data packets to trigger denial of service attacks. If your Internet connection is sluggish, close all applications that legitimately transfer large amounts of data across the web (such as file sharing utilities or other Internet downloads) and see if the network usage drops. If not, you`re probably infected.
  • Unknown files keep showing up in your boot partition. Malware usually creates temporary files or writes configuration details in the boot partition. If you see files that look suspicious, look them up on the web to check if they belong to a known application. If they are there and ” most importantly ” if they get re-created after you have deleted them once, run an online scan to see if you are infected.
  • You keep sending messages to your contacts. Some infected computers automatically send shady messages to contact lists via IM or e-mail. If you notice your system does this, disconnect your PC from the network and run an antivirus scan to identify the infection.
  • Lots of alerts about your PC security shown on your desktop. This is by far the most obvious hint as to your PC`s poor security. If you happen to get plenty of alerts from an antivirus you have never heard of that you are infected, it`s clear that you`re infected with a Rogue AV. Installing an antivirus is the only way to clean the infection, as these rogue products rarely come alone.

Bottom line: Most malware tries to stay undetected as long as possible to take advantage of your infected PC. You should perform regular scans with either an online scanner or with a regular antivirus utility. Don`t wait until cops show up at your door with a warrant. Act responsibly and protect your PC to keep your virtual friends safe.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chinese criminals scam kids desperate to play games for more than three hours a week Chinese criminals scam kids desperate to play games for more than three hours a week
Graham CLULEY

August 12, 2022

2 min read
Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read