Online PC Support

OPS Technical Solutions : +1(833)-522-1003


Android™ Trojan Mimics PC Drive-by Malware Attack

Lookout Mobile Security, a security company, has discovered an Android ‘drive-by’ malware that is used to infect Windows computer systems. Discovered on a number of websites, the odd Trojan is distributed using a webpage containing a hidden iFrame.

How the malware infects?

Any Android browser visiting an affected page (the attack ignores PC browsers) will automatically start downloading the malware without the user being aware what has happened. The malware is not quite a PC drive-by attack because the app needs to be installed by the user. It relies on the user having ticked the ‘Unknown Sources’ box, which is in most cases unchecked.

The rough equivalent of this layer on a Windows Vista or Windows 7 PC would be the User Access Control (UAC) which is usually circumvented using social engineering or by misrepresenting the nature of the application.

The purpose of the infection is a bit of a mystery. “This specific sample, while relatively well constructed, does not appear to go to great lengths to hide its intended purpose: it can be used to access private networks,” commented Lookout Mobile Security in its blog post.

How to Remove Avast Antivirus

Antivirus software is an application program that is bought or downloaded from websites to prevent a computer from being attacked by different forms of virus, spyware, worms, Trojan horses and other infections. These threats may harm the hardware and software components of the system and make the system slow and unresponsive to commands that you put in. Some of the popular forms of antivirus programs that continue to have a high demand are Norton Antivirus, McAfee and Avast.

Antivirus programs no doubt are extremely useful in keeping a check and eliminating new types of virus that find their way into computer networks; however, they can also have drawbacks. They can degrade computer performance and inexperienced users who have never understood the basics of using such software may have a hard time dealing with them. The programs often prompt users to make several decisions; and if incorrect decisions are made on the part of the user, it may lead to security breach.

One of the famous Antivirus programs that have gained importance in past few years is the Avast Antivirus. First released in 1988, it incorporates anti-spyware technology, and anti-rootkit and self-protection abilities. The program also has several other features, the most important being automatic incremental updates. It regularly updates both the program and the virus database that is used to identify potential threats, and this process is automatic by default. Whenever the virus definitions are updated or a virus has been detected, it comes up with a voice warning.

How to disable Avast Antivirus

In case you wish to disable the antivirus for any reason, there are specific steps that are required to be followed.

Step 1: Right click on the Avast Antivirus icon on the taskbar, which is located at the bottom of your home screen.

Step 2: Select the option called ‘Access Protection Control’. Then you would be required to enter the same password that you had chosen while installing the program. After entering the password, click on OK and you would be taken to the scanner window.

Step 3: Now click on ‘Terminate’ in order to disable the Avast Anti-virus protection and email scanning.

Step 4: To terminate, click on OK to confirm and save changes.

You can also go through the following steps in case you want to disable Avast Antivirus permanently.

Step 1: In the notification area of your toolbar, right click on the Avast Antivirus icon. The notification area can be found on the right side of the toolbar.

Step 2: Go over to the ‘Avast Shield Control’ option of the right click contextual menu. The menu then expands and offers additional options. There you can select ‘Disable Permanently’ for turning off all Avast protection shields.

Step 3: Click ‘Yes’ and this would confirm that you want to put an end to Avast protection.

Despite it being a great Antivirus program, some inexperienced users may not find it very comfortable to use on some computers. Others may want to disable it for trying out any different protection software.

How to Remove Fake Antivirus Malware

You definitely know that your computers can get infected with a virus. You will think of protecting it from malware, viruses, Trojan horses and worms by installing an antivirus program on your computer. Right! But be aware! There aremany fake antivirus applications like Advanced Virus Remover and Internet Security 2010, which are rogue viruses in reality that can create havoc on your computer. They will fool you by telling that your computer has got infected by viruses, and you will be asked to pay them to get rid of the fake viruses that aren’t really there. It’s a big problem because they are not easy to remove since whatever you try and run, including any real anti-malware tools they will block everything you are trying to remove that fake virus.

But no need to worry, every problem has a solution and you can try these simple guidelines I am going to give in order to get rid of rogue antivirus infections as well as malware or spyware infections of any type.

Step 1: While surfing the Internet, never click Yes if whenever an application pops up on your screen and asks if you want certain type of virus to be removed from your computer. There are more chances of it being one of those rouge antivirus programs that are tricking you into a trap.  Always click No to or the X button to close the window no matter how many times it pops up.

Step 2: Now you need to shut down your computer and re-start in safe-mode. You can get rid of the fake anti-virus is by doing a System Restore. But you will not  be able to do a system restore since you will be usually blocked by the malware from doing so until you are in safe-mode. For starting your computer in safe-mode, press the F8 key at the beginning of the start-up process before the Windows screen appears. A black screen will appear with only some writing asking you for further instructions. You will not be able to use your mouse here so use arrow keys to select safe-mode and hit enter. Another prompt will appear asking you what installation you want to access. I guess you have only one choice and that is Windows XP since it is the most widely used OS. Press enter to start the computer in safe mode.

Step 3: Now you need to use the System Restore function to return your computer to a previous state prior to when it was infected. To do this, click the start button on the lower left of your screen and choose Help and Support option from the menu. On that window, pick Undo changes to your computer with System Restore from the Pick a Task list. You can also access System Restore by going to Start > All Programs > Accessories > System Tools > System Restore. Once there, you need to choose a date before your system got infected, then click next. You will be asked for the confirmation. Click next. It will re-boot the system after restoring computer to the previous state.

How to run a Command Antivirus Scan

As the title suggest, this article has got to do with antivirus and its function. Antivirus is a program used to protect your computer against malicious programs such as Viruses, Worms, malwares and Trojan horses by detecting and deleting them. You need to either purchase or download the freely available Antivirus programs on the Internet and install them on your computer in order to protect it against harmful programs. But you can also make your computer safe without installing an antivirus program on it! Command Antivirus by Authentium is an antivirus software package which scans your computer for malicious programs without staying on the hard drive of your computer. Another remarkable feature of this package is that it is updated every day with new virus profiles. Also Command Antivirus runs a computer scan without interfering with other tasks on your computer. So it is quite easy to run a virus scan using this program. To run a virus scan using Command Antivirus, you have to go to the Authentium website.

Step by step instructions are as follows:

Step 1: Go to the Authentium website. You can download this program only if you are downloading it using Internet Explorer. You cannot download the program if you are using any other browser.

Step 2: Click on the green Download button to download the program.

Step 3: If Authentium requires any permission before the download starts, grant the permission. So that the download can start.

Step 4: once the download is finished, click Install to install Command Antivirus program on your computer. Remember that this for once only. If you need to run the scan again, you have to download it again by repeating the steps given above.

Step 5: You will be prompted to follow on screen commands if any virus is found on your computer. This way Command Antivirus program will be able to delete the virus from your computer and rescan your computer.

After running the Command Antivirus scan, you must uninstall it from your computer because it one time program and you need to reinstall it if you wish to run the scan a second time. To uninstall the Command Antivirus program from your computer, follow the steps given below:

Step 1: Press the Start button on the task bar, go to Control Panel option, click on it.

Step 2: A list of the programs installed on your computer will be displayed. Search for the Command Antivirus program and click on it. It will be highlighted with a remove button.

Step 3: Click on the Remove button to uninstall the Command Antivirus from your computer.

After the Command Antivirus program is removed from your computer, you can run a virus scan by reinstalling it on your computer. Simply follow the process for the installation described above. Since Command Antivirus program comes with updated virus profile every 24 hours, you have a free antivirus virus program to protect your computer every day so you can have a sigh of relief!

How Trojan Horses Work

You must have encountered the word Trojan many a times when your anti virus or your Anti Spam ware runs a scan through your system. These Trojan are high lighted as critical danger, but you have no clue of how they entered your computer. Here a comprehensive view about Trojan horses:

  • Trojans are basically viruses which make a back door entry, which is allowed by the user unknowingly. They are usually hidden under emails, attachments which lure users stating it as gifts, then messages and links on Social Networking sites, which when visited trigger the attack of Trojans. A Trojan is made of two programs. One program is called Client and the other is called Server. The Client is not stored on the user’s computer, while server is stored on the user’s computer.
  • The client is used by the hacker to control the victim’s computer, and is installed on the hacker’s side. Once the Server program is executed it will provide information to the client program upon request. This server program once installed hides itself on your computer and will run automatically every time you start the computer. It does not replicate within the system, and so it is easy to catch it using many sophisticated anti virus soft wares also.
  • It opens up the ports, which allows the hacker to get into your system. They are named after the Greek myth, where in the Greek used a Trojan Wooden horse to get into Troy and then destroyed the city, with the help of soldiers hidden in the horse. Similarly these Trojans seem to be desirable at first site, but contain unwanted and harmful malwares to affect your system. These Trojans cannot get into your system by way of pop ups as the ad wares do. They are to be activated by the users by downloading files on its systems. As in when you download files using P2P software and Torrent Soft ware. These files contains executable .EXE files, which when played are unresponsive, but in the back ground they have started their work.
  • They are not designed to harm the system, but still vital information such as Website passwords, credit card details, which are then sold by the hacker at a price in the black market over internet. Firstly the creator writes a code, and disguises it as something other than a damaging program. Then it is uploaded on websites for download. They might arrive as an email attachment and masquerade as a screen saver, a program update, or a graphics file. When a user receives the email message, he believes the attachment is a nice “gift” and double-clicks it, “inviting” the Trojan horse onto his computer system. This software then opens the system to a backdoor attack. The installed software allows the Trojan horses to be installed. Then the hacker can access the user’s files and programs. For instance, the hacker might steal the user’s financial data. The cracker also might use the system as a zombie, launching DoS (denial of service) attacks on a large server or Web site.

Great are the implications of a Trojan Horse attack, so be vigil and download only secured items for the internet after going through a security scan.

Types of Malware and the Extent of Damage they can cause to your Computer

Malware is the codename for malicious software and refers to any software that can access a computer system without the consent of the owner. Software can be classified as malware based on the perceived motive behind its creation rather than its features. Some people consider defective software as malware, but this is a wrong classification. Defective software is originally intended to be helpful but for the harmful bugs in it, while malware is designed to be harmful to computers.

Malware are very common nowadays, especially on the Internet and may come in several forms. Some of them are advertised as useful programs and others come attached to other useful materials on the internet. E-mail messages may also contain malware that gets attached to the user’s computer when the mail is opened for reading. Examples of malware include computer worms, viruses, Trojan horses, spyware, rootkits, dishonest adware and many more.

Microsoft security intelligence reports have shown that, Malware accounts for over 82 percent of online threats in the United Arab Emirates. The details of Microsoft’s Malicious Software Removal Tool reports have revealed that 82.6 percent of all computer threats detected on infected computers are malware. The reports went further to show that the most common malware in the UAE was worms, followed by Trojan horses.


Computer worms are malware that have the ability to replicate by themselves. They send copies to other computers on the network of the infested computer, without the intervention of the user. Worms do not need to attach themselves to any file to spread and may cause harm to the network by consuming a lot of bandwidth. Examples of computer worms include Morris worm, Mydoom, ExploreZip worm and payload. Worms may also encrypt files and send documents via e-mail to allow the creation of a zombie on the computer by installing a backdoor.

Trojan Horses

A Trojan horse may come as a useful program to the user but instead helps unauthorized access to the computer. It is not self-replicating as with the worm. The users themselves usually install them as they look like useful programs. Trojans open the infested computer for access by hackers who access it to perform their activities. Trojans may allow a hacker to perform Denial-of -service attacks, data theft, downloading and uploading of files, deletion of files, keystroke logging and viewing the user’s screen.


Viruses are the well-known form of computer malware. Viruses attach themselves to files on an infested computer and are spread by means of storage devices. Viruses are dangerous to infested computers as they corrupt files and may eventually crash the computer.


Rootkits do not cause any harm to the computer but allow the concealment of malicious programs as well as human attackers on a computer system. They keep the files of malicious software from being read and may also defend malicious software against removal.

Malware should be a major concern of organizations and anybody who owns a computer. No computer is safe from malware so far as it is on network or copies information from other computers, directly of indirectly. It is not enough to have antimalware on a computer, but have drastic measures to prevent the computer from being infected.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003