Community
Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked.
After the attack, locate the portal through which the crumb-bag entered. This could be the e-mail program or browser. This may be easier said than done. Give it a shot.
Next, this portal must be disconnected/uninstalled from the Internet to prevent it from getting into other systems. Look at your Task Manager or Activity Viewer for any suspicious activity. The CPU usage must be checked too. If it goes way up, you’ll have a better chance of detecting fraudulent activity. It helps to know how your computer runs so that you know what’s typical and what’s atypical.
Otherwise head over to Microsoft’s Malicious Software Removal Tool page here: http://www.microsoft.com/security/pc-security/malware-removal.aspx
After severing ties with the hacker or hackers, take inventory of their destruction.
Preventing an Attack
This content is provided by an external author without editing by Finextra. It expresses the views and opinions of the author.
Kristine Jakovleva Chief Marketing Officer at Advapay
17 February
Taras Boyko Founder at BTG Corporate Services Provider
14 February
Rolands Selakovs Founder at avoided.io
Sergei Grechkin Chief Risk Officer at AIFM Cayros Capital
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.