home home Staff Contact
Forensic Protection - Services Forensic Protection - Rates Forensic Protection - FP_System Forensic Protection - Feedback
Cybersecurity

How to stop spying, adware, malware and ransomware
by  Doug Carner   (Published May 2019, all rights reserved)

Anyone can use free software to attack any computer system without writing a single line of programming code. Newer automated attacks locate victims at random without discriminating between home and mission critical computers, and often without the victims ever being aware of the threat...until it is to late.

One only needs to search the internet for "Ransomware", "Spyware attack", or "webcam spying" to truly appreciate the frequency and gravity of such attacks. Cities and major corporations have fallen prey, but you don’t have to be next.

I provide audio and video enhancement and authentication. While my lab goes to extensive lengths to secure our network, there are some simple and free solutions that anyone can implement. While no solution can ever be 100% secure, it only takes a few minutes to get close to that goal. Following any of this advice is to be done at your own risk, and assumes a high degree of comfort installing and configuring software on a Windows computer.
Mouse over this sentence to review basic computer safety, or mouse click to copy the text to the clipboard.

First, you will need good antivirus software to serve as a critical line of defense. If you already like your antivirus protection, then there is no need to change vendors. If you are looking for free antivirus protection, then I recommend AVAST (else Malwarebytes). NOTE: Running two antivirus programs on the same computer can cause computer crashes and performance reduction.
Mouse over this sentence to learn how to silence Avast's pop-up messages. Click to copy text to clipboard.

Antivirus programs rarely gain the ability to stop new spyware or ransomware attacks until after other computers have fallen victim, and such attacks are originating from an ever evolving list of web addresses. Your internet modem likely provides basic firewall protection to intercept some attacks, but this can be exponentially improved by installing firewall software.

The Peerblock firewall blocks inbound and outbound traffic with an ever updating list of threatening web addresses. While Peerblock is free, to maximize protection one must subscribe to i-blocklist, and then add their subscription lists (including advertisers) into Peerblock. Peerblock must be manually launched each time Windows is restarted.
Mouse over this sentence to learn how to automate the launch of Peerblock. Click to copy text to clipboard.

The Zonealarm firewall works by trapping suspicious inbound and outbound traffic. This firewall method eliminates the need for updated lists or subscriptions, but does require the user to teach the software which activity is to be permitted. Software settings (and the default “Express” installation option) let the user increase software automation, while still providing good security. NOTE: Some users have experienced reduced computer performance when using Peerblock and Zonealarm together.

To prevent and remove adware/malware, and prevent unauthorized changes to your Window’s registry, I highly recommend installing Spybot (Adwcleaner is my second choice). Some other tools to consider are: Sandbox software (e.g. Sandboxie) to temporarily install software without actually exposing it to your computer, a laptop webcam cover (e.g. this) to prevent hacker's from gaining access, and a Kensington lock (e.g. this) to prevent physical theft using your laptop's built-in port. Now might also be a good time to remove unwanted applications (search your PC for "Add or remove programs"), and remnant or harmful registry links (ccleaner or Wise).

Mission critical computers are isolated from the internet, but even that can't eliminate the risk of data loss or destruction. Humans make mistakes and systems eventually fail, so everyone needs the mundane routine of regular updates and backups. At the very least, use your computer’s search feature to locate “create a restore point”, and then create a new restore point weekly. Each day, update your antivirus software and also backup your files to a cloud backup service (e.g. iDrive) and removable drive (e.g. this) kept off-site or in a fireproof safe. Most backup resources include software to only update what has changed, thus making the process quick and easy. Keeping frequent redundant backups may seem frivolous and paranoid, until the day your computer becomes corrupt or your hard drive fails.

Using a Windows log-on password might deter the amateur thief, but it is easy to bypass. So, to prevent others from accessing your files, consider encrypting an entire drive or partition (veracrypt or BitLocker), and / or specific files on demand (AxCrypt or 7zip).
Mouse over this sentence to learn more about encryption, or mouse click to copy the text to the clipboard.

You also may want to review what Microsoft can do with your data by holding down the Windows logo key on your keyboard and then touching the letter “I” to open your settings. Then choose the “Privacy” option and review all of the tabs and settings to disable everything that you do not need to share.

While on the topic of privacy, if you want anonymity while online, then consider using the free Tor browser and a Virtual Private Network VPN to keep your web habits private. Using a VPN (e.g. SurfShark or PIA) prevents your personal information from being captured while using public Wi-Fi. Internet service providers (ISP) can legally monitor your data, and degrade your speed when you use a VPN. SurfShark VPN solves this by using OpenVPN-UDP to be invisible to your ISP, and they routinely have deep pricing promotions. Most VPNs also include a Kill Switch that prevents internet usage until a secure connection has been established.

For those who put their life on social media (e.g. Facebook), just keep in mind that others can mine that data to answer the “challenge” questions used for the banking or email’s “forgot password” website feature. Once thieves reset those passwords, they can steal money and prevent the account holder from receiving notifications until it’s far too late. As such, consider appending all your challenge question answers to always begin or end with a consistent added alphanumeric key phrase you will never forget (e.g. "L3afbl0wer"). Also, whenever offered, activate a website's two-step verification process.

Websites that store financial, shopping or other personal information usually require a log-in password. Rather than re-using the same vulnerable password, keeping passwords on paper, or using your browser's weak password security, you can entrust this task to software. KeePass is a cost-free, ad-free, and maintains unique website passwords within an encrypted file that safely and exclusively resides within your control.

The preceding steps provide a simple, yet nearly impenetrable, layer of security to your data. Obviously, there are additional security steps that you can do, but the foregoing tips are free (or inexpensive), effective, and non-intrusive. I want you to be safe. Click HERE to learn more about my lucrative career path or HERE to get training or certification.

Suggested next article

Copyright © Forensic Protection
QuickLinks | Main page | Case study | Media | FAQs | Contact us