note:HP SmartFriend is a support service that can help you strengthen security and resolve vulnerabilities on your computer. For more information, see HP SmartFriend.
Welcome to HP Customer Support
InformationHP fraudulent caller alert - protect yourself from scams
Learn what to do if you are contacted by fraudulent callers posing as HP representatives. This could be a scam; do not provide any personal information.View article
HP PCs - Computer Might Be Infected by a Virus or Malware (Windows 10, 8)
This document is for HP computers and tablets with Windows 10 or Windows 8.
This document explains viruses and malware, provides instructions for removing viruses and malware, and offers suggestions for preventing future infections. There are thousands of viruses, software programs, and security threats that can harm your Windows computer, allow private information to be accessed by others, or make the computer perform slower.
Perform the steps in this document when the computer shows signs that it might be affected by a virus or malware, after the computer returns from service, or after running a system recovery. When the computer is serviced or when a system recovery is performed, the computer software is changed back to its original configuration, meaning it is set to the same condition as when the computer was first purchased. All software and driver updates that were installed on the computer, from the time it was first started, are lost. In this like-new condition, the computer is more susceptible to viruses because the added security updates have also been removed.
Signs that your computer might be affected by a virus or malware
Some indications your computer might be affected by spyware, adware, or browser hijacking software include:
The computer takes longer to boot to the Windows desktop.
Applications do not load or frequently stop responding.
Frequent system error messages occur.
Unfamiliar icons are added to the desktop.
The system performs slowly, especially while browsing the Internet.
Browser windows close unexpectedly or stop responding.
The browser home page changes and cannot be reset.
Pop-up windows display more frequently and/or when the browser is not open.
Unfamiliar toolbars are added to the browser.
The default web search engine changes.
Clicking a web link does nothing or leads to an unrelated website.
Webpages are automatically added to your favorites list.
Email messages or social media posts are sent from your account without your knowledge.
Unexpected and near constant hard disk access occurs.
Step 1: Turn on a firewall
Setting up a firewall provides basic protection against security threats before connecting to the Internet. You can use Windows Defender or other firewall software, such as McAfee Personal Firewall.
note:Do not enable more than one firewall. Firewall software programs can interfere with one another if more than one is open.
Using the search box on the taskbar, search for and open Control Panel.
Make sure View by is set to Category.
Click System and Security.Figure : System and Security
Select Security and Maintenance from the list.Figure : Security and Maintenance
Check the message under Review recent messages and resolve problems.
If the message is No issues have been detected by Security and Maintenance, security settings are up to date.
If a security alert displays, click Turn on now to activate the firewall.Figure : Turn on firewall
Step 2: Obtain Windows Security updates
Microsoft regularly provides critical updates to make Windows more secure. These updates are important for protecting a computer. If you have a broadband connection that is always on, set the Windows Update tool to automatically check for updates daily. Windows automatically sends security updates as they are required.
If you do not have a broadband connection that is always on or you want to check for updates, you can manually check for and install security updates.
Using the search box on the taskbar, search for and open Check for updates.
Click Check for Updates.Figure : Checking for updates (Windows 10)Figure : Checking for updates (Windows 8)
After the search completes, install any updates found.
Figure : Device is up to date (Windows 10)Figure : Summary of updates found (Windows 8)
If the PC has Windows 10, updates automatically install.
If the PC has Windows 8 and updates are available, click Install updates.
Step 3: Check your virus scanner software for correct configuration
Many HP and Compaq computers come with a trial version of antivirus software already installed, but you should check that it is set up and running correctly.
note:Your computer might have come with a trial subscription to McAfee VirusScan or Norton Internet Security. HP recommends following on-screen prompts to renew your subscription. Renewing your subscription helps protect your system against new threats.Check with your Internet Service Provider (ISP). Many ISPs offer free or inexpensive antivirus software to their subscribers.
Check your security software by clicking the security icon in the system tray
Open the security software by clicking the software icon on the system tray area of the Windows taskbar.
Move the mouse pointer along the lower right corner of the Windows desktop, over the icons near the clock, and then read the text above each icon to find the security software icon. You might need to expand the system tray to show hidden icons.Figure : Common security software icons
Right-click the security icon to open the security software and examine more options.
Search your computer for security software
If you could not find a security software icon in the system tray or you are still not sure if your computer has security software, check Security and Maintenance or Action Center for security software.
Open Security and Maintenance or Action Center, depending on your operating system.
Windows 10: Using the search box on the taskbar, search for and open Security and Maintenance.
Windows 8: In Windows, search for and open Action Center.
Click the arrow in the Security category to expand the list of security items, and then check the Virus protection area for security software.The security information displays.Figure : Security section of Security and Maintenance (Windows 10)Figure : Security section of Action Center (Windows 8)
If an antivirus software program is installed, skip to Updating antivirus software definitions.
If an antivirus software program is not installed, continue to the next step.
Step 4: Installing antivirus software
If antivirus software is not installed, HP recommends you install antivirus software. New viruses are created and released often, and without antivirus software, the files and folders on the computer are at risk. If you found antivirus software on your computer in the previous step, skip to the next step.
Many HP and Compaq computers with Windows come with Windows Defender. Other HP and Compaq computers might come with free trial versions of other antivirus software. These trial versions are usually limited versions that can be kept up to date for a specific period. After the period expires, your computer becomes more vulnerable to new viruses and security threats. It is important to upgrade or refresh the subscription to keep virus definitions current and continue protecting your computer.
note:If you have antivirus software installed, but want to install different antivirus software, make sure to remove the old antivirus software before installing new software. Having multiple programs installed might make the computer slow, erratic, and potentially unprotected.
Step 5: Updating antivirus software definitions
Because new viruses are created and released often, regularly update the virus definition files for the antivirus software. A virus definition file is a list of known viruses that the antivirus software uses to find and eliminate viruses.
The following steps offer a general overview for updating antivirus software, but if you need additional help, go to the antivirus software manufacturer website for more information. For a list of antivirus software support websites, refer to Security software support sites and other antivirus software (not HP) in this document.
Open the antivirus software.
Click buttons or menu items that read update or live update.
An update window opens. Follow the on-screen instructions to update your antivirus software.
Step 6: Scanning for viruses and malware
After updating the antivirus software definitions, scan for viruses and malware. Go to the software manufacturer's website if you need help scanning, as antivirus software varies. For a list of antivirus software support websites, refer to Security software support sites and other antivirus software (not HP) in this document.
Usually, you can scan for viruses by opening the antivirus software and clicking a scan button. This example shows how to scan for viruses and malware using Windows Defender.
note:If a virus is found and removed, open System Restore and delete any dates when the virus was active. This prevents the computer from accidentally becoming reinfected. Refer to Using Microsoft System Restore (Windows 10, 8) for information about using Microsoft System Restore.
Using the search box on the taskbar, search for and open Windows Defender Security Center.
Click Virus & threat protection.Figure : Virus & threat protection
Click Advanced scan.Figure : Advanced scan
Select Full scan, and then click Scan now.Windows Defender scans for viruses and other threats.Figure : Full scan
For more information about using Windows Defender, refer to:
Step 7: Removing virus or malware by recovering the computer
If a virus is found, the virus might have already damaged or destroyed some files on the computer. The antivirus software might not be able to repair the damage. If the software cannot repair the damage, the computer might need to be fully recovered.
For information about recovering Windows using HP System Recovery, see HP Guided Solution - Performing an HP System Recovery.
Best practices for preventing virus and malware infections
You can avoid computer problems including viruses, spam, and spyware by using simple safety precautions when you connect your computer to the Internet. You can begin using the following security actions immediately.
note:HP SmartFriend is a support service that can help you prevent and remove unwanted software on your computer. For more information, see HP SmartFriend.
Detect and remove adware, spyware, and hijacking software with trusted professional removal software
You can manually remove most nonaggressive adware by uninstalling the software that it came with or removing the adware itself using Windows Add/Remove programs.
Aggressive spyware and browser hijacking software can be extremely difficult to remove. Do not try to remove this software without the aid of spyware removal software.
To remove aggressive malicious programs, use professionally developed products, such as Windows Defender. For more information, see one of the following support documents depending on your operating system:
Prevent adware by buying full versions of known software
To prevent adware from being installed on your system, buy and use full versions of software that are not supported by advertising.
If you want to download and use software that claims to be free, carefully read the license agreement and cancel the installation if there is something that you do not agree to or understand. Know the software before you install it. The cost of installing such software might be slower Internet connection times, annoying pop-up ads, or an increase in unwanted emails (spam).
When you download a file, do not select Run to install the program from the web. Select Save, and then download the file to your hard drive. Before you install the program, test the file by right-clicking the file name, and then selecting an option like Scan or Scan for viruses to run the file through your antivirus software.
Before you install any program, read the End User License Agreements (EULA) carefully. Reputable companies tell you if they plan to install any adware or other background programs along with the software you want to use.
Be cautious of opening email attachments
Never open an attachment or a link in an email when you do not trust the sender. Sometimes a person intending to do harm sends an email message that appears to be from a trusted source, such as Microsoft. Most reputable companies do not attach software to email. If you do not trust an email, research it on the Internet or contact the company or sender named in the email.
Do not click on unfamiliar pop-up windows
To close a popup window in your web browser, click the X in the upper right corner of the window. If there is no X on the pop-up or browser window, press the Alt and F4 keys at the same time to close the window. Do NOT select OK or Ignore or Close buttons within the advertisement because you might not know what action is performed behind the button.
Do not click on security warning screens that pop up from a webpage you do not know or trust
Read any pop-up messaging carefully before clicking on the window. Many times the message looks like an official warning to use some program or resolve a problem, but it can be an advertisement encouraging you to purchase an unnecessary program.
If you receive an official looking message or warning from a company, such as a bank or store where you have shopped, do not click any button to respond or verify receipt of the message. Call the company immediately, or open another browser and go to the company's official web site to contact their customer service on the web. Criminals might be trying to steal information using a web URL that is similar to the company's official web address.
Often, spyware or hijacking software is installed when you "consent" to a security warning window that displays over a webpage. By clicking on a malicious security warning screen, a script or control is integrated into the browsing system. The script or control changes the behavior of your browser to suit the needs of the aggressive advertiser.
To prevent this from happening, never click anywhere inside a security warning window that appears with webpages you do not trust. Close these windows by pressing the Alt and F4 keys at the same time.
Back up your data on a separate disk or online
To avoid file loss due to malware or virus infections, regularly back up your files on an external hard drive or online service. For more information, see Backing Up Your Files (Windows 10, 8).
Protect your personal information
Never give out personal information (including e-mail address, home address, phone number, bank account, or credit card number) unless you initiated the contact with the individual or company.
Remember, if you click on an ad that pops up, or a stranger contacts you on the web, you have no way of knowing who owns the website or how honest the person is.
caution:Do not give payment or personal information to callers who identify as HP employees and offer support. HP does not call customers and ask them to pay for support (for virus removal, for example). To learn more about phone scams, including what they are and how to avoid them, see the Microsoft support document Avoiding technical support scams (in English).
Disable suspicious add-ons in your browser
If professionally developed anti-spyware software cannot detect spyware software or add-ons, the spyware software might be new. Temporarily disable suspicious add-ons until you can update the anti-spyware software.
Disable add-ons in Microsoft Edge.
On the taskbar, click the Microsoft Edge icon .Microsoft Edge opens.
Click the More icon , and then select Extensions.
Scroll through the list of add-on programs.
To disable an unwanted add-on, right-click the name of the add-on in the list, and then click Turn off.
Close Microsoft Edge.
Internet Explorer (8 or later)
Disable add-ons in internet Explorer.
From the Windows desktop, open Internet Explorer.
Click Tools or the Tools icon , and then click Manage Add-ons.
Scroll through the list of add-on programs.
To disable an unwanted add-on, click the name of the add-on in the list, and then click Disable.
Click Close to close the Manage Add-ons window, and then close Internet Explorer.
Avoid threats by protecting your e-mail address
Unscrupulous people can violate your privacy if you carelessly share your e-mail information. As criminals use more sophisticated tools, you need to be vigilant in your daily activities. The following list describes methods criminals use to obtain your email address and offers strategies you can use to protect your information.
Chat rooms make it easy for people to harvest your e-mail information.Information like your account name and e-mail address are available for anyone to collect when you are messaging in public chat rooms. Even if the site says "Private Chat Room", remember that there is no such thing as 'private' on the Internet. On these sites, every keystroke you make can be, and probably is being, recorded.
Posting your e-mail address in comments in newsgroups or forums exposes your e-mail address.E-mail harvesters use software to automatically scour newsgroup and forum pages and record postings for e-mail addresses. By compiling your e-mail address and the topics of the forums, the harvester can determine your personal interests and browsing habits and then sell your name to marketing firms.
Posting your e-mail address on forum pages results in more spam.If an e-mail address with the "@" sign is posted on the site, the address is vulnerable. You can adopt the username AT InternetServiceProvider DOT com convention when posting email addresses in public forums to prevent harvesting.
Responding to spam or requesting that your name be removed from a mailing results in more spam.When you respond to one spam e-mail, the spammers add your address to every list. If you request that your name be removed, it is removed from that list, as required by law. However, it probably is added immediately to several other lists or sold to other spammers.
Forwarding a chain letter sends your e-mail to other harvesters.Chain e-mails include the addresses of all senders and receivers hidden inside the code. E-mail harvesters receive chain letters also, and your address can be added to their list.
Protect your identity with multiple e-mail addresses
Protect your identity by using two or more e-mail addresses when you respond to items on the web. Use one address for your friends and business associates, and use a different address for people and companies you do not know as well. Your ISP can provide you with a limited number of e-mail addresses, but there are also many services that allow you to set up multiple free disposable e-mail accounts.
For the free e-mail account, make up a name with random letters and numbers rather than using your actual name.
If the free account gets loaded with spam and other unwanted material, you can close that account or just stop checking it.
Virus, spyware, adware, and browser hijacking definitions
There are many types of security vulnerabilities. Refer to the following list for definitions of common security threats.
note:To keep aware of the latest Windows threats and vulnerabilities, refer to Microsoft Security Bulletins (in English).
A virus is a software program that copies itself into another program, a hidden space on a hard drive, or items that support scripts. Most viruses copy only themselves, while a minority deliver a payload.
A virus variant is a virus that has been altered to take advantage of the original virus program. Virus variants are easily created, resulting in new virus threats that must be monitored constantly by security programs, such as Windows Defender.
A payload is the action performed by malicious software such as a virus or Trojan. Payloads can damage files, deliver Trojan files, corrupt hard drives, display messages, or open other files. A payload activates when the file containing the malicious program opens. Often, a payload remains dormant until a certain condition occurs, such as when the date on the computer reaches a particular day.
Spyware is software that gathers and transmits information without your knowledge. Spyware programs usually track information about websites visited, browser and system information, and your computer IP address (the number that represents a network device on the Internet).
Adware is self-supporting software that displays ads while you are connected to the Internet. Most adware programs track how you browse the Internet and report the information to an interested party.
Browser hijacking software
Aggressive advertising software can "hijack" your browser and make changes without your knowledge. These programs can be annoying and might resemble a virus at first (slow Internet connection and lots of network activity).
Symptoms of browser hijacking software might include changes to your browser homepage, search bars or toolbars; new shortcuts added to your desktop; and advertising pop-ups. When a browser is hijacked, it might also redirect links to other sites that advertise or collect your usage information.
A worm is a type of virus that finds vulnerable computers and copies itself to those systems. The most frequent methods of spreading a worm are from email distribution lists, email signature scripts, and shared folders on a network. Worms might or might not have a damaging payload. The typical payload for a worm makes a computer more susceptible to other viruses and Trojans.
Trojans are misleading software programs downloaded and installed from the web that appear to be safe, but are not. This type of software often comes from visiting a website that pops up a virus warning alert (even though the computer might not be infected). The pop-up suggests you purchase and install software to remove a virus or spyware, when, in actuality, there is no problem until you install the recommended software.
Some Trojans silently open malicious code that can log key presses, redirect web clicks, or even disable firewalls. Beware of programs that have similar names to popular legitimate security software, such as Windows AntiVirus, WinDefender, Norton Antivirus, System Defender, and McAfee LiveSafe.
A hoax is an email claiming there is a threat to the security or functionality of the computer. For example, a hoax email might inform you that a virus is harming the computer when there is actually nothing wrong. Some hoax emails ask the recipient to perform a damaging process, such as deleting an important file. Most hoaxes are spread by people who do not know that the email is a hoax and who are hoping to alert others to a potential security threat or virus.
Phishing is a method for fraudulently obtaining personal information. Phishing can come in the form of an email, or an Internet link on a website or search engine results page that sends the user to a malicious website. When the user visits the website, the Internet browser tries to read malformed code on the page and induces a security hole, or the webpage itself is designed to look similar to another legitimate webpage to collect credit card or other personal information.
Technical support scams
Technical support scams are a type of fraud where a person calls your phone or contacts you via a pop-up or email and pretends to have identified a problem with your computer. Do not give payment or personal information to callers who identify as HP employees and offer support. HP does not call customers and ask them to pay for support (for virus removal, for example). To learn more about phone scams, including what they are and how to avoid them, see the Microsoft support document Avoiding technical support scams (in English).
Ransomware is a form of malware which encrypts files until a ransom is paid to the anonymous criminal who holds the decryption key. Most of the time the only available method to retrieve your files is to pay the ransom amount. It is very important to regularly back-up your data to protect against ransomware.
A security vulnerability is a weakness in a software program that allows unwanted activity inside the Windows operating system.
Ask the community!
Country: United States