Lou has adware and after scanning for it, it hasn't disappeared. Leo says that adware is annoying, but most antivirus software doesn't view it as malware because the user chooses to install the software that had the adware in it. He can probably remove it through "add/remove programs". Leo advises getting rid of TechGenie and whatever's left of McAfee, and install only Microsoft's Security Essentials. Lou should also run the Malicious Software Removal Tool. Start -> Run -> type "MRT" return.
Michele accidentally clicked on an ad and now she keeps getting pop ups to download "Windows updater." Leo says that's malware and to avoid it. Leo also thinks that Michele hasn't gotten a virus just yet. But since she clicked on the ad, there may be a cookie there that keeps bringing it up. Leo advises running MalwareBytes, but she should only download it from http://www.malwarebytes.org/. There are bad versions out there that are designed to confuse people. Always download software from the original designer.
Bob is having trouble with Internet Explorer and switched over to Google Chrome. He also dumped Adobe Flash Player and Reader. Leo says that those are two apps that are a target for hackers. The nice thing about Chrome is that Flash is built into the browser and is always up to date. It's also sandboxed so it can't get to the rest of his data.
Patricia got a new Dell computer since her XP machine was getting really old. She's finding it challenging to learn. She has Microsoft Security Essentials on it, but she keeps getting something called "Windows Version Installer" that's popping up. Leo suspects it's just Windows installer wanting to run an update, and should be OK. She says it won't stop popping up, though. Leo says Patricia is right in her instinct to be concerned, but it seems a normal request to update the Windows installer.
James updated his Synology NAS with the latest software, but he's concerned that Heartbleed may infect Synology's cloud station. Should he deactivate the service or is he safe? Leo says that Heartbleed did bite Synology's NAS software. Synology has some patch information in their forums.
Jose wants to know about keystroke loggers. He's concerned that his passwords would get recorded if he pasted them in. Leo says they probably wouldn't. They tend to focus on keyboard strokes. Leo says that keystroke loggers are only put on computers of specific people that are being targeted. They are too much work to be a mass virus attack. Just practice safe computing with these tips:
Brian downloaded DropBox from Download.com and now he's stuck with Search Conduit. This is adware, and it's not technically malware. Leo believes that it is, though, because even though it asks the user to install, it isn't very clear. Leo says he wishes CNet/CBS Interactive would stop doing this with wrappers that install adware. Search Conduit even schedules itself in Windows to reinstall after it's removed. The fact that Brian has other symptoms in addition to this makes it sound like Brian has more malware as well.
Bob has been getting warnings that he's "overdrawn" on his MiFi data plan and wants to know if he's been struck by the Heartbleed virus. Leo says no. Heartbleed attacks servers, not mobile devices. More likely, Bob has an app that is active and downloading everything. Someone may have also commandeered the system and is using it.
OpenSSL is a widely used protocol for providing secure internet traffic. The "Heartbleed" bug takes advantage of a hole in OpenSSL to peer into the memory of SSL servers. It can allow a hacker to ping 64K of random memory repeatedly, thereby allowing them to glean usernames and passwords, and even fake a server certificate.
Marie got the FBI Virus Scam popup that has locked up her computer. Leo says it's highly customizable by the hacker who sends it out and in Marie's case, it demands she call to address the issue. So Leo thinks that it may be an offshoot of the cyrpto locker virus. Or just a malicious website. Regardless, her system has been compromised. The only real way to handle it is to backup her data, wipe the drive and reinstall Windows from a known, good source. She can also run the system restore discs, then update the OS completely.