Get started Bring yourself up to speed with our introductory content.

Remove malware step 8 -- Don't rely solely on a search engine

Don't rely solely on a search engine for malware discovery. Get tips on what to do instead in this part of our step-by-step guide for value-added resellers (VARs), systems integrators (SIs) and security consultants.

Don't totally rely on Google or your favorite search engine to find specifics on how to clean up your system. Check vendor sites directly. I've had to browse antivirus and antispyware sites (Symantec, Trend Micro, Sophos, and others) to find the right answers many times over. Symantec's Security Response site and CA's Spyware Encyclopedia site both contain a lot of good information. Also, check Google Groups postings as well as they often contain a wealth of information from other users that you can't find anywhere else.


Remove malware step-by-step

  Introduction
  Step 1: Use several tools
  Step 2: Try free tools
  Step 3: Check obvious places
  Step 4: Dig deeper
  Step 5: Unload infected software
  Step 6: Disable system restore, reboot in safe mode
  Step 7: Check for software corruption or hardware problem
  Step 8: Don't rely solely on a search engine
  Step 9: Check for vendor-specific removal tools
  Step 10: Hash suspect files
  Step 11: When in doubt, reload
  Step 12: Create a formal security incident response plan

About the author
Kevin Beaver is an independent information security consultant, author, and speaker with Atlanta-based Principle Logic, LLC. He has more than 18 years of experience in IT and specializes in performing information security assessments. Kevin has written five books including
Hacking For Dummies (Wiley), Hacking Wireless Networks For Dummies, and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He can be reached at kbeaver @ principlelogic.com.

This tip originally appeared on SearchWindowsSecurity.com.

Dig Deeper on Best practices for cybersecurity management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close