Technologically challenged?

Leave it to the egg-sperts!

Egghead Computer Solutions provides egg-ceptional service and support at affordable prices for all of your computer repair and consulting needs. Call us today at 610-762-1891!

Business hours: 8:30AM - 5:00PM Monday-Friday

Virus and Malware Removal

Specializing in virus and malware removal

New types of malware (malicious software) are always under development, becoming harder to avoid, and even harder to remove. While some infections result only in annoyance and inconvenience, many exploit a computer or the data it contains without user knowledge, potentially allowing credit card numbers, passwords, and other sensitive information to be divulged to hackers. This can lead to identity theft, fraud, and other problems that no one wants to experience.

If your computer has begun to behave strangely, e.g. run very slowly, lock up or crash, or display unusual messages, this could be an indication of an infection. Many users mistakenly believe that an anti-virus program provides adequate protection, when in fact, most are surprisingly ineffective at preventing or removing infections once they have been detected. New variants often require a combination of different software tools and manual removal methods, as they are specifically designed to prevent you and your anti-virus solution from getting to them.

If you’re struggling with a virus or malware, do not wait any longer to get help! Egghead Computer Solutions will rid your computer of any and all threats, and at costs well below other competitors.

Latest Malware Threats

  • Theonlinesearch.com Search Redirect
  • Smartwebfinder.com Search Redirect
  • Smashapps.net Search Redirect
  • Smashappsearch.com Search Redirect
  • PBlock+ Adware
  • BipApp Chrome extension
  • Toksearches.xyz Search Redirect
  • Srchus.xyz Search Redirect
  • Wisip Chrome Extension
  • Vitosc.xyz Search Redirect
Source: Bleepingcomputer.com (removal methods available)
Technically Speaking

Technically Speaking

Google Chrome gets real-time phishing protection later this month


Google will roll out a Safe Browsing update later this month that will provide real-time malware and phishing protection to all Chrome users, without compromising their browsing privacy. The company launched Safe Browsing in 2005 to defend users against web phishing attacks and has since upgraded it to block malicious domains that push malware, unwanted software, and various social engineering schemes.

An opt-in Safe Browsing Enhanced Protection mode, which uses AI to block attacks, is also available for those who want fast and proactive protection enabled by deeper scans of downloaded files. Currently, the standard Safe Browsing feature checks sites, downloads, and extensions against a local list of malicious URLs downloaded from Google's servers every 30 to 60 minutes. However, Google plans to switch to real-time checks against its server-side list to keep up with ephemeral malicious websites that surface and disappear in under 10 minutes.

"Safe Browsing already protects more than 5 billion devices worldwide, defending against phishing, malware, unwanted software and more. In fact, Safe Browsing assesses more than 10 billion URLs and files every day, showing more than 3 million user warnings for potential threats," said Google's Jasika Bawa and Jonathan Li. "If we suspect a site poses a risk to you or your device, you'll see a warning with more information. By checking sites in real time, we expect to block 25% more phishing attempts. The new capability — also rolling out to Android later this month — uses encryption and other privacy-enhancing techniques to ensure that no one, including Google, knows what website you're visiting."

​Google's Safe Browsing real-time protection protects users' privacy with a new API that uses Fastly Oblivious HTTP (OHTTP) relays to obfuscate visited sites' URLs. The users' partially hashed URLs are relayed to Google's Safe Browsing engine via an OHTTP privacy server that hides their IP addresses and mixes the hash checks with those sent from other users' web browsers for added privacy protection. Hash prefixes are also encrypted before being sent through the privacy server to Safe Browsing using a public key known only by Google's URL-checking service. "The privacy server then removes potential user identifiers such as your IP address and forwards the encrypted hash prefixes to the Safe Browsing server. The privacy server is operated independently by Fastly, meaning that Google doesn't have access to potential user identifiers (including IP address and User Agent) from the original request," Google explained in a separate blog post. "Once the Safe Browsing server receives the encrypted hash prefixes from the privacy server, it decrypts the hash prefixes with its private key and then continues to check the server-side list."

Google and Fastly will not be able to match users' browsing activity with their identity by decrypting both the URL hash prefixes and the IP addresses they originate from, ensuring the users' privacy. Google announced the Safe Browsing real-time phishing protection feature in September when the company also shared its plans to use privacy-preserving Fastly Oblivious HTTP relays to collect hashed URLs for checking without exposing users' IP addresses and request headers.FULL ARTICLE

Self-Help

Self-Help Info/Links

Not all computer repair requires professional assistance. Depending on your experience and level of comfort, there are some things that you can do yourself to get up and running again.

We have organized a list of utilities and resources pertaining to troubleshooting a Windows-based computer. Although we believe that these are excellent sources for self-support, we are not associated with these websites and make no claims as to the performance of these products - please use at your own risk. Don't hesitate to call if you need assistance.

Go to Resources.

Beware of Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need. But the purpose behind their elaborate scheme isn’t to protect your computer; it’s to make money.

Once they’ve gained your trust, they may:
• ask you to give them remote access to your computer and then make changes to your settings that could leave your computer vulnerable
• try to enroll you in a worthless computer maintenance or warranty program
• ask for credit card information so they can bill you for phony services — or services you could get elsewhere for free
• trick you into installing malware that could steal sensitive data, like user names and passwords
• direct you to websites and ask you to enter your credit card number and other personal information
FULL ARTICLE