Russ Harvey Consulting - Computer and Internet Services

Security Software

Antivirus, Antimalware & Firewall Protection

Software | Evaluating Solutions | Fixing Issues
Update Your Software | Current Alerts | Hoaxes

An umbrella over top of a laptop computer representing the antivirus and other security software protection.

In this always-connected world you need to protect your privacy and your data. If your security software fails, you can lose both as well as your productivity.

Security is a cat and mouse game between malicious actors and security software companies.

You Need a Security Suite

Having antivirus-only protection is no longer sufficient. Your computer must be protected by a security suite — an up-to-date version that is currently maintained.

No Excuses

Even budget conscious users should have protection. Most vendors offer FREE versions of their security software. Not all security software is as effective.

Is it reasonable to save money by eschewing third-party security protection and just relying on what's built into the OS? Well, probably not. In most cases, you'll be safer springing for third-party security or using a top-tier free solution. Depending on what operating system is involved, going beyond the basics is always a good idea, and sometimes a necessity.

The security suite must include antivirus, antimalware, anti-phishing, anti-ransomware protection plus an effective advanced two-way firewall.

Be aware that the term “anti-virus” now generally refers to a security suite, but you should check to be sure.

We call it antivirus, but in truth it's unlikely you'll get hit with an actual computer virus. Malware these days is about making money, and there's no easy way to cash in on spreading a virus.


Ransomware and data-stealing Trojans are much more common, as are bots that let the bot-herder rent out your computer for nefarious purposes. Modern antivirus utilities handle Trojans, rootkits, spyware, adware, ransomware, and more.

Be certain you're getting enough protection before making a purchase.

  • Multi-faceted and simultaneous blended threats can overwhelm any protection unless the software is designed to deal with all of them simultaneously.
  • Because threats develop and change so rapidly, current security software relies more upon recognizing malicious patterns of infections than databases of past attacks.
  • Multi-faceted and simultaneous blended threats can overwhelm any protection unless the software is designed to deal with all of them simultaneously.
  • Because threats develop and change so rapidly, current security software relies more upon recognizing malicious patterns of infections than databases of past attacks.
  • Some infections are difficult to repair, particularly ransomware which encrypts your data and extorts money via untraceable bitcoins.
  • Malware (sometimes called spyware) can go unnoticed yet risks your privacy by stealing information and slows down your computer. Protection is specialized software with access to a current database of malware and removal instructions.
  • Keyloggers capture key strokes including passwords and other private information. There are both hardware and software keyloggers.

Real-time Protection

Some security products are more suited to fixing an infected system than providing protection in the first place.

Your security software must include real-time protection that detects threats to your computer and software without having to run a scan. This includes ensuring that the programs in memory are monitored for exploits and malicious activities.

Web Filtering

Web filtering watches your web browser to warn you about hacked website or downloads that redirect you to malicious sites or files. Web content is scanned before it is accessed or downloaded.

It also includes the ability to block malicious, hacked or inappropriate websites (porn, gambling, drugs, etc.). This is often referred to as parental controls, but it can also help you avoid content you're uncomfortable viewing.

VPN Recommended

Because so many of us are mobile (and because of the massive profiling and collection of personal data) a VPNs has become necessary.

The need for a VPN depends upon what you use it for. Three legitimate reasons to use a VPN are:

  1. to combat censorship;
  2. location spoofing; and
  3. to encrypt data.

Most browsers now encrypt data securely (if you're using HTTPS), but there can be circumstances where you'd like to increase that security.

Computer Scans

While realtime scanning is designed to protect you while surfing the Web and using other software, some downloads don't show their true nature while being retrieved from the remote site.

The real-time scanner should catch these files when they are opened, but a full-computer scan (or a scan of a particular file or folder) will test the files to see if they are malicious.

Threat emulation can evaluate unknown files in the cloud to see if they exhibit abnormal behaviour. When done remotely, your computer is not at risk.

Keep ALL Your Software Current

Ensure your security software is always current.

New threats can overwhelm your security software, especially if you don't update it regularly or fail to upgrade it to a new version when your installed version is no longer supported.

In addition, you must ensure that your operating system and the programs on your system are all current for your computer to be protected from zero-day and newly discovered vulnerabilities.

I strongly recommend regularly checking for updates to your operating system and software. To check the software version:

  • Windows: HelpAbout
  • Mac: program nameAbout

Business Users

Just as you install alarm systems and good quality locks to protect your physical premises, you need to protect your virtual premises, invest in excellent security software.

Lost Productivity & Credibility

For too long computer security has been ignored.

Businesses that fall victim to ransomware or a security breach suffer irreparable damage to their reputation. You will certainly lose productivity and an estimated 60% will never recover.

Consider Your Investment

When viewing the cost of security software, consider what you've invested into the hardware and software (never mind your time and data).

Recovery Can Be Expensive

You'll be without your computer while it is in the shop. What damage could that downtime do to your personal or business commitments?

Restoring your computer's operating system and software can be expensive. Recovery of lost data may not be possible at all if your backups fail or are not current enough.

By purchasing decent security software and training your staff in security basics you may avoid these costs.

Backups Ensure Data Recovery

Keep a current backup of everything important to you. These backups are your only method of recovery if an undetected threat cannot be treated.

In the worst case scenario, you could purchase a new computer and software, but your data is irreplaceable. A secure and current backup could be priceless.

Ransomware Recovery

Most current security suites provide some protection against ransomware but failure could be catastrophic to your business.

Be sure to evaluate the cost of convenience:

  • Backups to devices continually connected to your computer are just as vulnerable to ransomware as the computer itself.
  • Ransomware targets cloud storage because that is where the data has gone.

No Guarantees

Several companies provide tools that can help recover files if you send them a copy of an encrypted file with the unencrypted original to help determine the correct recovery tool but there is no guarantee. Ransomware is a rapidly evolving risk.

Check Point ZoneAlarm Anti-Ransomware remains one of the most effective ransomware-specific security tools we've tested. It detected all our real-world ransomware samples, though its recovery system missed some files.

Paying the Ransom Encourages Future Attacks

If you choose to pay the ransom, you're only making future attacks more likely. You can't be certain that your system is safe afterwards even if you obtain a working recovery key.

Remember, you're dealing with crooks, not a reputable business.

If, as appears true, some security companies negotiate with the ransomers, that is a symbiotic relationship involving the company you're paying to protect your data and those threatening it.

No Operating System or Device is Safe

While Windows has carried the reputation for being more vulnerable, you should consider ensuring that you can recover from an attack.

Depending on your operating system, adding antivirus protection beyond what's built in ranges from a good idea to an absolute necessity.

What About the Mac?

The Mac has a reputation for being safe from viruses and malware, but it is time to change that opinion:

macOS X is more secure than Windows. macOS used to be considered a fully secure operating system with little chance of security flaws, but in recent years we have seen hackers crafting additional exploits against macOS.

You need to be running decent security (antivirus) software on your Mac.

What About Linux?

Like Macs, many Linux users are under the impression that they don't need antivirus protection. Again, it is time to change that opinion.

Linux is considered to be more secure than other operating systems.


However, it's increasingly a target of attackers, as Linux systems are used for critical roles like, web servers and internal file servers.


In addition to being susceptible to Linux-based and cross-platform exploits, unprotected Linux machines can also become distribution points for Windows, Mac, and Android malware.

You need to be running security (antivirus) software on your Linux computer. doesn't yet test Linux security software (it has a much higher profile in server software) but that is coming.

You Need to Be Vigilant

Many threats, including ransomware, evolve rapidly and employ zero-day vulnerabilities, weaknesses in software that are immediately exploitable (before they are discovered).

Security software that uses virus signatures can only protect you against known threats.

Newer or evolving threats are harder to detect so most security software looks for unusual or malicious activity (threat emulation) to prevent unknown threats from infecting your computer.

Prepare for Disaster

Be prepared for disaster before it happens.

Backup your data regularly so you'll still have a copy of your data if you're infected with ransomware or something else your security software can't protect you from.

Anything not backed up could be unrecoverable. Schedule backups accordingly.

Copying current documents to a USB thumb drive or portable drive between backups can mean the difference between losing a week's data or recovering everything.

Hidden File Extensions

Windows hides “known” file extensions by default. They are known to Windows, but many users don't understand the risks or which files can infect their computer.

Malicious file types include .JS, .EXE, .SCR, .COM and .BAT. These are unsafe to open, especially when received as an email attachment.

You should unhide known file types.

Disable Macros in MS Word

Spammers often use macros in an attached Word document to infect your computer. Disable macros in MS Word: (Options ⇒ Trust Center ⇒ Trust Center Settings & Macro Settings). Choose “Disable all macros with notification.”

Even with macros disabled, many zero-day vulnerabilities can be exploited in MS Office files.

Watch for Unusual Activity

Be vigilant about what you download. Only install software from verified sources.

If you notice unusual file activity, disconnect your network connection (disable Wi-Fi and unplug the network cable).

While you may not protect your own data, disconnecting from the Internet can protect other computers and devices on your network, particularly if you share files between them.

Avoid Risky Behaviour

Pause before clicking: Stop. Think. Connect.

People tend to value convenience over caution. Pause to allow time for you to consider the potential cost of your actions.

Like any other piece of malware, common sense goes a long way. The critical thing is it's not going to install files by itself. You have to initiate some action.
Jason Glassberg

Be Wary When Opening Email

Malware generally spreads though malicious email attachments (including JPG images, documents and ZIP files) leaving you susceptible to data loss and identity theft. Tale of the Two Payloads illustrates this problem.

It has become very common to receive phishing emails that contain fake notices of unexpected invoices and similar tactics designed to get you to open malicious attachments or visit fake sites designed to look like the real site.

Don't trust either the attachments or the links. No legitimate organization should be using Gmail to send business emails (watch for knock-off domains as well).

Links Can Be Faked

Fake links can be used in emails, websites or text messages to misdirect.

Be wary of websites hosted on recent/short-term domains and of shortened links like those used on Twitter. Both can be used for malicious purposes.

Oversharing on social media?

Information posted online, particularly in social media, can be used to personalize the attempts to scam you. It can also be used to hack your passwords by learning answers to the password recovery questions.

Return to top

Security Software

While you can purchase security packages in retail stores, online sites offer software at reduced rates, provide 24/7 access to instant updates and technical support. Purchase directly from the vendor — never via third parties with unknown agendas and privacy practices.

Save Installation File and License

Save a copy of the installation file and the licence key (preferably on removable media in case you suffer a catastrophic loss of your operating system) so you can repair or reinstall your security software in the future.

Not All Products Equal

Assessing and comparing security products is difficult. Security software deals with the ever-changing world of online threats.

Reviews are essentially taking a snapshot of a series of products at a single point in time.

Products that have just completed an update will be rate higher, yet those ratings could be different in a week or a month. tests -- click to see live results. tests show significant variations in the ability of different security products to prevent infections:

  • green were automatically blocked;
  • yellow were user dependent; and
  • red were compromised.


Results vary by month as vendors update their products and fix issues.

I strongly recommend checking the reviews of products suitable for your operating system before finalizing your choice of products:

Recommended Security Solutions

ZoneAlarm Extreme Security NextGen

ZoneAlarm Extreme Security NextGen is recommended for folks that want a good security suite that works without much hands-on maintenance.

Most of my clients and I used ZoneAlarm Extreme Security for more than 10 years without incident. While I found the NextGen product unsuitable to my needs, many of my clients continue to run it.

  • It is a complete security & privacy suite that includes anti-ransomware. It guards you against the most sophisticated cyber threats and attacks.
  • Supported on Windows 7/10/11, Android, iOS.
  • Full details….

ZoneAlarm also sells a stand-alone Anti-ransomware service (additional protection for your primary security software).

Check Point ZoneAlarm Anti-Ransomware is the most effective ransomware-specific security tool we've seen. In testing, it showed complete success against all of our real-world samples.
PC Magazine

Kaspersky Total Security

Kaspersky Total Security provides excellent real-time protection, proactive detection and instantly isolates and removes dangerous attempts to download malicious scripts on websites you visit.

I originally purchased Kaspersky Total Security to protect my Mac computer because ZoneAlarm Extreme did not work on Macs. When I ran into problems using the new NextGen product, I switched over from ZoneAlarm.

  • Kaspersky Total Security includes a free VPN and premium versions of Kaspersky's password manager and protection for kids.
  • Supported on Windows 11/10/8.1/8/7 SP1+, macOS 10.12–12, Android 5–12, iOS 12–15.
  • Full details….

Because Kaspersky is a multinational corporation operating in 200 countries and territories I feel it is safe enough to use, especially given the increased vigilance it will receive as a result.

Kaspersky has no political ties to any government, and has customers in the private and public sector all over the world. Kaspersky's global research and analysis team continues to generate research exposing the activity of advanced threat actors, including those related to the conflict in Ukraine.


Kaspersky regularly partners with law enforcement authorities…aiding investigations with technical consultation or expert analysis of malicious programs. We also collaborate with international law enforcement agencies in the ongoing fight against cybercrime.

Mac and Linux

The Mac and Linux have traditionally been safer than Windows for security, but this is no longer true for either Mac or Linux systems.

Free Antivirus Solutions

I strongly recommend sticking with a paid subscription because it will offer more frequent updates, better security and requests for help from paying customers will always get priority. Some free versions may not perform as well as you expect.

In its recent endurance test, which was carried out over a period of 6 months, AV-TEST tested 18 Internet security suites for their protection, performance and usability. The test shows: more than two-thirds of the protection packages can be recommended, but the best performance does cost some money. Paid software packages are also the most secure.

The cost of repairs to your computer if a free product fails will far exceed the cost of most security products. If you truly cannot afford to purchase your security suite, there are basic (and sometimes excellent) free protection for home users.

ZoneAlarm Free Antivirus + Firewall

ZoneAlarm Extreme NextGen provides better protection, adding web secure and anti-ransomware.

Microsoft Defender

This Microsoft security product has been called Microsoft Defender, Windows Security Center and Windows Defender in its various incarnations.

Once considered poor protection, it now has much better reports. Effective protection requires a fully-updated Windows 10 or 11 system.

Defender's biggest plus is its minimal impact on system resources. It also offers a Offline Scan which can scan for and delete persistent malware before it has a chance to load.

However, Defender doesn't yet warrant eliminating other protection.

Windows Defender's own developers seem to consider it a Plan B, rather than a main solution. If you install a third-party antivirus, Windows Defender goes dormant, so as not to interfere. If you remove third-party protection, it revives and takes up the job of defense again. The best antivirus programs, even free antivirus tools, perform significantly better in testing and offer more features.
While acknowledging that Windows Defender has improved greatly over the last few years and that Windows 11 improves security, PCMag security expert Neil Rubenking states that you still need third-party antivirus software. The redubbed Microsoft Defender Antivirus gets mixed results from independent malware testing labs and falls short of the competition in phishing protection.

What About Other Antivirus Solutions?

Other products may be excellent security software solutions but I have not personally tested them recently.

Some require significant system resources (mainly RAM) and most have a firewall inferior to ZoneAlarm Extreme NextGen, my recommended solution.

More about evaluating solutions.


Malwarebytes can be downloaded and installed for free. However, without a premium subscription, it doesn't automatically scan your system and recent tests by AV-Test were less than stellar.

It is a good interim solution for checking an infected computer. Long-term security requires a subscription.

ISP-Provided Packages

Many ISPs include security software protection either as a part of their regular services (some charge a fee).

Most are intensive memory hogs and not as effective as commercial products.

Even though many ISPs automatically check email for spam and viruses you still need a security suite installed to protect your computer and data.

Return to top

Evaluating Security Software Solutions

Often one product will excel in one area but be weak elsewhere so be sure to include your specific needs into the evaluation process. Both the strengths and weaknesses of specific products can change over time so be sure to view a current assessment.

No matter how good your security product is, the developers face state-sponsored hackers that are continually looking for weaknesses and are usually better funded.

Don't trust blanket statements that say that the code is “military-grade” or “NSA-proof” these mean nothing and give a strong warning that the creators are overconfident or unwilling to consider the possible failings in their product.

Avoid creating your own “suite.” Running multiple security programs can conflict with each other and prevents detection rather than improving it. One security program can appear to be attacking the system when viewed by competing security software.

  • Purchased software generally offers better protection, especially when threats are evolving quickly.
  • Free software provides protection for those that truly cannot afford to purchase protection.
  • Free security software is usually not licensed for businesses.
  • Verify the system requirements (optimally the recommended rather than minimum requirements) to ensure your computer has enough RAM (memory) and available disk space to run the software.

Security addons like browser extensions can increase your vulnerability and threaten your privacy.

Microsoft Security

Microsoft enables the Windows firewall by default and checks for the presence of a current antivirus solution, enabling Windows Defender if security software is not detected.

Base-line Protection

These capabilities provides for a base-line protection on a fully-updated Windows 10 system but is insufficient on its own.

Third-party security software is designed to work alongside Windows Defender (but no other security software).

Use a Security Suite

A security suite that includes all the security protection is recommended. Avoid shopping component-by-component to meet your needs.

Consumer Protection

Companies that use misleading language or outright lie about the suitability of software need to be exposed.

Avast is harvesting users' browser histories on the pretext that the data has been 'de-identified,' thus protecting your privacy. But the data, which is being sold to third parties, can be linked back to people's real identities, exposing every click and search they've made.

Consumers don't have the ability to assess claims made by software vendors.

No consumer would realistically have an inkling that their antivirus software could be selling their browsing data and—even more sensitive information such as mouse movement — to an array of third parties.
US Senator Mark Warner

Consumers, including small businesses, can check out the evaluations found on reliable websites and magazines to evaluate antivirus and other security products.

I strongly recommend AV Comparatives for independent reviews of antivirus software.

False Positives

The number of false positives (safe files tagged as viruses) should be few or none. Most antivirus programs look for certain traits that are common to virus activity to detect unknown threats. Unfortunately, this can occasionally flag legitimate programs.

Files such as password hacking utilities for recovery specialists are legitimate but can be flagged by security software. This sort of software should not be on most people's computers.

Automatic Scans and Updates

Ensure that your security software will update automatically and provide for a scheduled scan to detect issues missed while running a realtime scanner (which checks files as they are opened).

Enterprise Protection

Enterprises should consider a Managed Security Services Provider (MSSP) because these larger businesses involve a different level of risk.

Managed security provides security via the network rather than on individual machines.

Keep in mind that moving to a MSSP is not without risk.

The Kaseya ransomware attack on July 2, 2021 infected 800 to 1500 small to medium-sized companies. Kaseya and each infected business would have to pay independently (and paying the ransom only encourages future attacks).

Return to top

Issues with Antivirus Software

No security software is ever a finished product. Conditions are continually changing and, without constant updates to both the product and its methods of detection, the software cannot do the job it was designed to do.

First, Check for Updates

At any one point in time, specific security products can be more or less effective than their competition.

Ensure that there are no updates available starting with new virus definitions (installed automatically) then seek newer software versions (requiring manual download and installation).

Scan Your System

Once everything is updated, do a complete scan of your system including archived (zip) files.

Multiple Security Products can Conflict

If updating your software doesn't resolve issues, you need to verify that there are no competing security products installed on your system.

If you have more than one antivirus program running at the same time–or more than one firewall–you're asking for trouble. Two such programs, trying to do the same thing at the same time, will slow down your system. Worse, they can cause conflicts.

There is the potential for conflicts and problems when using multiple firewalls or security programs.

Today's programs use “threat emulation” to detect new and unknown threats which looks like malicious activity to a second security program. Rather than improving security, multiple products leave your system vulnerable.

Because MS Defender is included as part of Windows, it is the only exception.

Acronis Not Recommended

I no longer recommend Acronis True Image backup software. Current versions have added anti-ransomware and antimalware.

While the addition of this protection may sound reasonable, it appears to run even if True Image's active protection has been disabled

This is problematic if you have other security software installed that you trust because it can conflict with your actual security software.

  • Microsoft's Windows Defender and Windows Firewall are generally either allowed or disabled by most security software.
  • McAfee Security Scan Plus (installed with other software as an optional download) shouldn't conflict but is also unnecessary.

Unwanted software can slow or harm your computer.

Use a Security Suite

I strongly recommend installing a decent security suite rather than independent antivirus, anti-spyware, anti-ransomware and firewall programs to avoid bloat and ensure compatibility.

Watch for add-on security features in other software (such as Acronis True Image) which can interfere with your security software's ability to protect you.

Can Security Software Slow Your System?

Security software has been known to have significant impact on your system performance.

There are several reasons for this, including the necessary complexity of modern protection, but there can be other reasons including:

  • startup and background processes
  • unwanted programs
  • malware
  • older hardware
  • insufficient RAM

Startup and Background Processes

Many programs are configured to run with Windows (or other operating systems) to make them appear to run quickly when you choose to launch them.

Unless you're running a particular program on a legacy system that is your primary system, most of these startups can be disabled.

Windows 10 and 11 provide a control of these (Start ⇒ Settings ⇒ Apps & Features ⇒ Startup) but I strongly recommend CCleaner for this purpose. Click on the Tools then select Startup. Disable startups rather than deleting them so you can recover if you make a wrong choice.

Unwanted Programs

Windows 10 and 11 install a lot of additional software by default but that isn't the only source.

  • Manufacturers can add even more, including “customer participation” software (bloatware that tracks what you do with their software).
  • During the download and installation of programs, watch for unwanted added software.

Uninstall any software you don't want or need (Start ⇒ Settings ⇒ Apps & Features).


One of the first signs of a malware infection is a slowing down of your system.

Malware, which includes viruses, adware, spyware and more, is seriously harmful to your computer. Aside from exposing your sensitive information to hackers, disrupting your computer operations, and causing frequent freezing and crashing, malware can seriously slow your computer down, making it almost impossible to make any use of it at all.
— ZoneAlarm Blog

If your security software isn't up to the task of protecting you, you'll have to find anti-malware software to remove the infection or seek professional help.

Legacy Hardware

If you're running a current operating system (Windows, Mac, Linux, etc.) on an older computer, the performance can be hampered. Developers for new hardware so they can provide new features and take advantage of modern technology. Your computer may be suffering as new updates are released even if it was responsive when newer.

The other aspect of hardware is the size of your hard drive. Solid state drivers are much faster but can be much smaller. Legacy driver are cheaper, but don't work well when they are nearly full.

Insufficient RAM

RAM (or “memory”) is where a lot of the processing of information on a computer happens. When you don't have enough RAM the computer offloads some of its load onto the hard drive which is much slower than RAM. This results in significant slowdowns.

RAM is one of the least expensive upgrades, although it will depend upon your hardware as to how much RAM it will support and whether it is used efficiently.

Onboard video (motherboard-based video) uses part of the system RAM. By purchasing a separate video card (not possible for laptops or some name-brand computers) you release this RAM, replacing it with the video RAM on the card (more is better).

Finding Help

While there are some generic similarities between security products (they provide the same function), you'll need to locate help specific to the program(s) you're running.

Start with Vendor's Site

First, seek help on your product's support website and their support forum. Search for your specific problem, using an error message or other specific search criteria.

Internet Searches

Generic searches on the Web can be helpful, but you'll need to ensure that the suggestions don't get you into more trouble or land you on a malicious site.


Maintain Your Software

All software requires maintenance.

Update Security Software

Regularly download and install security software definitions and program updates.

  • New virus and spyware definitions usually update automatically.
  • Even though your security software updates automatically, it is a good idea to regularly update manually.

Major updates provide new features while interim updates fix security gaps.

Install Program Updates

If you download an update from the Web, it has to be manually installed by clicking on the installer program you downloaded.

Update Your Operating System

Set your operating system to automatically check for updates. These include feature updates (which replaced the service packs in older versions of Windows).

It is also a good idea to check for updates manually.

Updates Improve Security

Updates to your operating system do more than install new features.

Updates remove zero-day vulnerabilities and improve security.

Service Packs

Service packs are significant updates to your operating system and provide a baseline for maintaining security.

Windows 10 now has two feature updates per year, spring and fall, as well as periodic security updates.

Obsolete? Upgrade or Uninstall

Upgrade or uninstall any software that becomes unsupported.

  • Don't run unsupported versions of any operating system.
  • Upgrade your software when your vendor no longer offers security updates.

Base Engine Updates

Some security products don't update the base engine automatically.

You may need to purchase the newest version to get current security but check to see if you can download an updated version from the vendor's site first.

Microsoft Programs Vulnerable

Built-in programs are tightly tied into Windows and vulnerable even if you're not using them.

  • Microsoft Office vulnerabilities have been used to compromise email programs and inject threats into the system's web browser.
  • Microsoft Edge cannot be uninstalled so it needs to be updated, even if you're not using it.
  • Internet Explorer is obsolete and pending removal in Windows 10.

Return to top

Hardware Issues

Some vulnerabilities are hardware-based.

Spectre and Meltdown

Meltdown and Spectre were discovered in early 2018 that affects virtually every computer and mobile device produced since 1995.

Hardware released after 2018 shouldn't be as vulnerable. New processors have been re-engineered to avoid a similar problem in the future.

Security Patches

The patches significantly affect system performance and AMD restart issues.

Return to top

Current Alert Listings

New vulnerabilities are found all the time. This site is not capable of tracking them all, but provides some examples to help you learn what to watch for.

What You Can Do

Take precautions when opening unexpected email attachments.

Threat Emulation software included with ZoneAlarm Extreme can analyze suspicious files for threats.

Referring to online backup servers as being “in the cloud” is misleading.

These are large clusters of computers and storage devices, running imperfect software, managed by imperfect staff and too easily accessible from anywhere in the world.

There's not much that average users can do, other than install updates for various online services whenever they're available.

Checking For Alerts

You can find current alert listings on these sites:

Threat Evaluation

Learning more about threats:

Error Messages

If your security software generates an error or detection message, you can use that to learn more about what was detected by searching the web using the identifiers.

Different vendors can describe the same infection differently.

Fake Error Messages

Beware of fake error messages.

Return to top

Be Wary of Hoaxes

There are many forms of hoaxes and fake news, including social media, news reports, emails and websites.

Learn how to determine what is true by verifying information.

Know Your Security Software

The best defense is to keep your protection current and to know how your security software works.

Legitimate security software will list the actual threat, not simply tell you there are hundreds of infected files.

I will only discuss those concerning computer warnings in this section.

Fake Virus & Spyware Warnings

Watch out for website “ads” that "report spyware on your system."

These ads are simulated (but realistic-looking) “infection reports.”

If you install their software, its search displays large numbers of “infections” to be removed only if you purchase their product. Scam!

Popup Messages

Popups telling you that you're infected or that security problems have been detected are seldom true except those generated by your security software.

These are rip-offs or fakes. Most report an unrealistic number of infections. Don't be scammed.

Fix popup warnings that won't go away.

Telemarketing Scams

You many also receive calls from telemarketers telling you your computer is infected.

Simply hang up.

Related Resources

Related resources on this site:

or check the resources index.

Buy Me A Coffee


Return to top
Updated: May 12, 2023