Q&A for How to Tell if Your Computer Is Infected by a Trojan Horse

Return to Full Article

Search
Add New Question
  • Question
    How do I know if my computer has malware?
    Michael Thompson-Brown
    Cybersecurity Expert
    Michael Thompson-Brown is a Cybersecurity Expert based in Portland, Maine. He is the owner and founder of PCRescue!, a company that provides cybersecurity and data management solutions to small businesses and individuals. Michael has over 25 years of experience in the IT industry and is a certified ethical hacker. He is passionate about helping clients protect their data and systems from malicious attacks and helping them optimize their online presence and reach. He received a Master’s degree in Cybersecurity and Information Assurance from Western Governors University, and a Bachelor’s degree in Business Administration from the University of Phoenix.
    Cybersecurity Expert
    Expert Answer
    To determine if your computer has malware, open Task Manager by right-clicking on the taskbar and selecting "Task Manager." In Task Manager, navigate to the "Processes" tab and scan through the list for any unfamiliar or suspicious processes and applications. Look for processes with random or nonsensical names, high CPU or memory usage without any apparent reason, or processes running from unfamiliar locations on your system. These could indicate the presence of malware, and further investigation or removal may be necessary.
  • Question
    What's the best anti-virus program?
    Michael Thompson-Brown
    Cybersecurity Expert
    Michael Thompson-Brown is a Cybersecurity Expert based in Portland, Maine. He is the owner and founder of PCRescue!, a company that provides cybersecurity and data management solutions to small businesses and individuals. Michael has over 25 years of experience in the IT industry and is a certified ethical hacker. He is passionate about helping clients protect their data and systems from malicious attacks and helping them optimize their online presence and reach. He received a Master’s degree in Cybersecurity and Information Assurance from Western Governors University, and a Bachelor’s degree in Business Administration from the University of Phoenix.
    Cybersecurity Expert
    Expert Answer
    The best antivirus program is often the built-in one, as it receives daily updates and runs smoothly in the background without consuming excessive resources. These built-in solutions seamlessly integrate with the operating system, ensuring efficient utilization of resources and optimal performance.
  • Question
    I got a notification that I got a Zeus virus and I called and they said that I have a trojan and that it costs 100 dollars to fix. Is this a scam?
    Community Answer
    Yes, this is a scam.
  • Question
    I got a message saying I have a virus. I left the website, do I still have a virus?
    Arbiter Gaming
    Community Answer
    You may have a virus. Go into safe mode with networking, delete restore points and turn off system restore. Scan using malware bytes.
  • Question
    I got a notification of a virus but I didn't click it. How can I be sure I don't have it?
    M3wz
    Community Answer
    If you don't have an antivirus or the notification seems fake, that notification is probably a virus. If you didn't click it, you don't have it. But scan using a real antivirus just in case.
  • Question
    How do I actually know the Trojan is active right now on my system?
    Community Answer
    You should check a full scan with antivirus software. Signs would include slowing of the computer, ads popping up and files getting deleted without permission.
  • Question
    How do I know if my computer is infected with a trojan horse if I got a notification of one, but my antivirus says there is nothing?
    Community Answer
    The notification might be a scam, so if your antivirus didn't find anything, you most likely have nothing to worry about.
  • Question
    Can a trojan horse take a video of me on my computer?
    Community Answer
    Yes, absolutely. If you don't use your cameras, the best thing to do is to cover them with tape so nothing can be seen if someone should somehow tap into them.
  • Question
    I connected an old USB drive to my computer, then my antivirus (Kaspersky) tried to quarantine it. I disconnected the USB before it could, as I panicked. Am I safe? I did a system scan.
    Community Answer
    You should be safe, as Kaspersky blocked it.
  • Question
    I got a notification that I got a trojan virus. I restarted my computer and deleted all recent downloads. How do I make sure its no longer there without downloading anything?
    Jake Asunto
    Community Answer
    You need to scan you PC with your antivirus software to make sure its no longer there.
  • Question
    If my computer has a Trojan Horse, will it cause popups?
    Community Answer
    Yes, most of them are ads or fake virus announcements. All you need to do is get a free anti-virus software as mentioned in the steps above.
  • Question
    How do I detect the Trojan virus in my PC when I don't have any antivirus software?
    Jake Asunto
    Community Answer
    You need to download Hitmanpro or Bitdefender on another PC and then transfer it to the infected PC via thumb drive.
  • Question
    I received a porn blackmail email claiming that a Trojan virus had been used via a vulnerability in my router and that I have 48 hours to pay $600 in BTC, otherwise it would be sent to my relatives. What should I do?
    Community Answer
    Don't do anything. It's just an extortion attempt called "scareware". Google it to find more information.
  • Question
    I have a trojan virus that is making sounds, even after I tried all these steps. What else can I do?
    Community Answer
    Back up all of your data, then wipe your hard drives clean and try rebooting your computer with fresh hard drives.
  • Question
    What can a trojan horse or virus do to my computer?
    Community Answer
    A trojan horse creates a session for the hacker to monitor your activities, such as key logs and download account credentials, potentially giving them access to sensitive personal information.
Ask a Question

      Return to Full Article