VIPRE is not able to remove an infection.
- VIPRE Home
- All Supported Environments
If you are experiencing symptoms of an infection, The first thing you should do is run a deep scan with VIPRE in Safe Mode With Networking. Make sure to update VIPRE's definitions previous to running the scan.
Also, check if the Remediation setting is set to either Quarantined or Delete. If so, that means VIPRE took care of the threat detected. If not, proceed with the next step.
Run a deep scan with VIPRE while booted into normal mode. (There is no need to boot to safe mode)
If VIPRE advises that it needs a reboot in order to fully remove the infection, please do so. This will allow VIPRE's boot time cleaner to remove any files which could not be removed at the time of the scan due to those files being in use by the operating system.
If you need any further assistance, or are still seeing signs of infection, and you have an active subscription, the Technical Support team can escalate your support request to a Malware Removal Specialist to manually remove the threat(s).
VIPRE failed to locate and remove a threat while in normal mode.
Without having extremely detailed network logging in place at the time of infection, it is virtually impossible for Technical Support to tell you with certainty how you became infected.
Here is a list of the more common methods of infection so that you know what to look out for:
- Exploits: These are pieces of malware that take advantage of a weakness in a web browser, e-mail client, Adobe Flash installation or operating system. They install themselves without any user intervention whatsoever. Many take advantage of older vulnerabilities in applications or operating systems that don t have the latest updates installed. This is why it s important to install updates promptly.
If you look at your system tray at the bottom right and see Adobe, Java, or Windows updates waiting to be installed, your system is out of date which is more likely to be infected by an exploit.
- Malicious links: Never click on a link unless you know the target destination is safe.
- Drive-by downloads: These are the download of spyware, a computer virus, or any kind of malware that happen without knowledge of the user. Drive-by downloads may happen when you visit a website, view an e-mail message or click on a deceptive popup window. Many users click on the window in the mistaken belief that, for instance, it is an error report from their own PC or that it is an innocuous advertisement popup. In such cases, the malicious "supplier" may claim that the user "consented" to the download though he or she was completely unaware of having initiated a malicious software download.
- Email attachments: Infected attachments that arrive in spam emails can infect machines then send emails to everyone in the users address book. These spoofed email messages will contain some kind of enticing story to get you to follow a link to a malicious site or open an attachment which is actually the installer for the malware.