We Fix Macs & Remove apple virus and malware

Apple Macintosh Mac Book Pro & imac Repair

DON’T PANIC!  But be aware that the Internet is riddled with potential threats to the security infrastructure  and well-being of your Mac or iOS device being either residential or business makes no difference. No computer system is completely immune from possible attack,ransom and extoration, but Apple’s OS X (being Unix-based) is less vulnerable than most, particularly the latest versions from Lion onwards.

We can remove those pesky mac book, apple & IOS virus & malware creating pop-ups and url redirects

Wise Paupack Computer repair has been repairing broken and slow sluggish mac book pros, imacs and various other apple brand computers, laptops & all-in-one Pc’s. We are able to remove apple mac virus and malware even root kits and ransomware. We offer house calls and remote tech support for any of the 50 states within the united states of America. Often times mac users can become infected with hard to remove virus such as.

MacKeeper Virus & Malware

OSX/Leap Macbook Imac Virus Trojan worm

This nasty virus spreads itself to all your friends within the ichat apple messaging software.

OSX/MacSweeper Malware Scan Repair & Fx

Built to mimic the real mac sweeper and trick unknowing users into downloading a rogue cleaning tool that slowely takes over your entire macbook pro or imac.

the above macbook pro virus would scan and pretended to find problems on users’ systems, then prompted them to pay to fix the problems (aka scareware). Soon after, a nearly identical piece of scareware called Imunizator started making the rounds. Imunizator would claim to find privacy holes in your computer:



OSX/Krowi Virus Removal & Repair

was packaged in free publicly shared, pirated versions of iWork ’09 and Adobe Photoshop for Mac. It connected computer users to a remote server and waited for commands from a remote control center. In 2010 another backdoor, OSX/Hellrts, appeared in pirated versions of iPhoto. Both pieces of malware planted backdoors into users’ Mac computers, allowing attackers to enter without having to type a password:


OSX/OpinionSpy, a variant of Windows spyware from 2008 and the first major piece of spyware discovered on OS X. Users unwittingly installed this spyware by entering their username/password into a prompt disguised as a marketing surveyor. OpinionSpy collected IM conversations, email addresses, browsing history, usernames and passwords, and bank account details:


OSX/MacDefender, and similar pieces of malware called OSX/MacProtector and OSX/MacSecurity. MacDefender was especially crafty, releasing new versions as quickly as Apple released patches. The MacDefender phishing attack used poisoned Google Image search results, and was very difficult for Mac users to remove because it attaches itself to a computer’s launch menu and has no dock icon:

OSX/Flashback, discovered in September 2011 by Intego, has 14 variants as of Thursday. The malware uses Java vulnerabilities to enter a user’s computer when he or she clicks into a malicious link. It harvests usernames, passwords, and other data used to authorize banking transactions. The first version was packaged in a malicious Adobe Flash installer, while the latest version looks like a Software Update prompt (note: Software Update will never ask you for your password “to make changes).

How To avoid getting infections on your mac book pro or imac apple computer and laptop

Do not be tricked by ‘scareware’, such as pop-ups on your browser, that tempts computer users to download fake anti-virus software that may itself be malware. These programs will either be a pop-up or flashy banner with sirens making annoying noise and even opening so many pop-ups causing most un-experienced computer users to not even be able to close the pop-up unless they install the faxe cleaner or malware bloated software.

Once installed, the software allows hackers full admin access to data or force people to make a payment to register the fake product.  Examples include MacKeeper and iAntivirus, but there are others. Also, beware of MacSweeper and MACDefender* (also goes under the name of MacProtector, MacGuard, MacSecurity or MacShield): These are malware that mislead & trick users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases will also mess up your system.

Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.


Do not install MacKeeper or iAnti-Virus: as these programs will cause serious problems within your apple computer or laptop.


MacSweeper is a scam ripoff fake software with malware and trojan virus.

MacKeeper is a fake mac computer tool infecting apple computers and laptops do not install or use this software.

iAnti-Virus for mac book pro, imac and apple computers is a scam software that will infect and corrupt your apple computer files.

*Malicious software dubbed MACDefender  takes aim at users of the Mac OS X operating system by automatically downloading a file through JavaScript. But users must also agree to install the software, leaving the potential threat limited.



The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.


If you allow a Trojan to be installed, the user’s DNS records can be modified, redirecting incoming internet traffic through the attacker’s servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim’s  (that’s you!)  DNS records stay modified on a minute-by-minute basis.


Mac users should always obtain their copy of Adobe Flash Player directly from Adobe’s official website and to disable the “Open ‘safe’ files after downloading” option in Safari Preferences/General to avoid automatically running files downloaded from the Internet. Also, do not turn on Java in Safari Preferences/Security. Few websites use Java. Javascript is something entirely different and should be left active.


(Adobe is aware of malware posing as its Flash Player and warns users to ignore any updates that didn’t originate on its own servers. “Do not download Flash Player from a site other than adobe.com,” said David Lenoe, Adobe’s product security program manager, in an entry on Adobe Product Security Incident Response Team’s PSIRT blog. “This goes for any piece of software (Reader, Windows Media Player, QuickTime, etc). If you get a notice to update, it’s a good idea to go directly to the site of the software vendor and download the update directly from the source. If the download is from an unfamiliar URL or an IP address, you should be suspicious.”)

Last, but by no means least, using Open DNS is the simplest way of preventing infection in the first place. Open DNS also protects against phishing attacks, re-directs, speeds up your internet connection – see below.

Java can present serious security threats: Users with Intel Macs running Snow Leopard OS 10.6 or later versions of OS X should ensure that they have downloaded and installed all the recent Java updates from Apple, which are designed to prevent infection and also remove any infection already present.

From the introduction of Lion onwards, new Macs  do not have either Flash Player nor Java installed.







Adding Open DNS codes to your Network Preferences should give good results in terms of added security (phishing attacks, re-direction etc) as well as speed-up of your internet connection:


Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked ‘DNS Servers’ add the following two numbers:


(You can also enter them if you click on Advanced and then DNS)


Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:




There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!



1. Avoid going to suspect and untrusted Web sites, especially p’orn’ography sites.


2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites, i.e. the developers’ own web sites or the Apple App Store.  If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.


3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.


4. Consider using Mac OS X’s built-in Firewalls and other security features.


5.  Avoid Peer-to-peer sharing applications. Download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks may apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking (see below):  http://news.bbc.co.uk/1/hi/technology/8420233.stm

It has been estimated that one in six links posted on Facebook pages are connected to malicious software.http://www.bbc.co.uk/news/technology-12967254

6. Check for security updates from Apple using Software Update and install them!

YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:


There is the potential for having your entire email contact list stolen for use for spamming:




And if you are using iPhone Apps you are also at risk of losing all privacy:


http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/


The advent of HTML5  may also be a future threat to internet privacy:




NOTE: Apple’s operating systems since Snow Leopard silently update the malware protection built into Mac OS X to protect against a backdoor Trojan Horse that can allow hackers to gain remote control over your treasured iMac or MacBook.





“Phishing” (also known as “carding” or “spoofing”) refers to email that attempts to fraudulently acquire personal information from you, such as your account password or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it’s not.

As a general rule, never send credit card information, account passwords, or extensive personal information in an email unless you verify that the recipient is who they claim to be. Many companies have policies that state they will never solicit such information from customers by email, and that includes your bank, credit card company, and Apple.

If you do receive email that you’re not sure is valid, here are some tips that can help you determine its legitimacy:

Learn how to identify fraudulent “phishing” email:


How to report phishing scams to Apple:

via email to:  reportphishing@apple.com

If you discover that emails are being received by your entire address list which you didn’t send, it is possible that you have been infected by a Botnet.  Simply put, a bot – which is short for robot – is an automated computer program that allows outside sources to control computers remotely without the users’ knowledge. A botnet is a network of hundreds or thousands of computers infected with botnet malware that communicates covertly with a command-and-control (CnC) server run by a type of cybercriminal called a botmaster. Unbeknownst to the individual users, their computers are linked in a rogue network which the botmaster can utilize for a variety of nefarious purposes.

Detailed information here:

http://mac-internet-security-software-review.toptenreviews.com/how-do-i-know-if- my-computer-is-a-botnet-zombie-.html


Another source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace: more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.


The data being leaked is typically used to get at web-based services such as Google Calendar.

The open nature of the Android platform is both a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground: http://www.bbc.co.uk/news/technology-12633923

Several pieces of malware have also been found on iPhones, however only devices that had been “jailbroken” to bypass Apple’s security were affected. The company’s process of pre-vetting all new applications is believed to have spared its devices from a major attack.



Some Windows PCs can be infected with viruses during the manufacturing process in the factories – in other words they can actually be purchased with viruses bundled with the operating system! Several new computers have been found carrying malware installed in the factory, suggests a Microsoft study. One virus called Nitol found by Microsoft steals personal details to help criminals plunder online bank accounts. Microsoft won permission from a US court to tackle the network of hijacked PCs made from Nitol-infected computers.



This does not happen with Apple computers!




In reality of course, there is no such thing as total internet privacy: US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails:  http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security


If you have a Facebook account, Facebook is surveilling every single moment you spend there. Moreover, much more importantly, every web page you touch that has a Facebook “like” button on it which, whether you click the button or not, will report your reading of that page to Facebook.

If the newspaper you read every day has Facebook “like” buttons or similar services’ buttons on those pages, then Facebook or the other service watches you read the newspaper: it knows which stories you read and how long you spent on them.

Every time you tweet a URL, Twitter is shortening the URL for you. But it is also arranging that anybody who clicks on that URL will be monitored by Twitter as they read. You are not only helping people know what’s on the web, but also helping Twitter read over everybody’s shoulder everything you recommend.

And now ‘smart TVs’ are also adding to your loss of privacy:  “Smart TVs” are bringing PC-style spyware and banner ads to the living room, collecting detailed logs of data that include every time the channel is changed and the names of every media file watched. In the case of sets from LG, data is being sent to the factory unencrypted, even after users attempt to turn the data collection off. Source:  http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and. html


Either way you are not alone if you have become the victim of any of the above IOS, mac book pro/air & imacs virus, malware, root-kit, scare ware, ransomware or other malicious Trojan you can contact wise paupack computer repair by phone or email 570-766-8299 or Service@wisepaupackcomputerrepair.com     After contacting us we can either schedule for a FREE pickup if you live within Pike or Wayne county PA.Or if you are outside our service area we can connect remotely and offer guidence via phone and tech support to remove even the nastiest virus on your apple devices.



We travel to the following towns for computer tech support house calls and pick-up for servicing at my computer repair facility in Lake Ariel, PA. Travel Service Locations Lake Ariel,South Canaan,Hamlin,Archbald,Jessup,Sterling,Elmhurst,Scranton,Peckville,Waymart,Lakeville,Olyphant,Moscow,Newfoundland,Paupack,Jermyn,Carbondale,Tafton,Prompton,South Sterling,White Mills,Greentown,Chinchilla,Hawley,Moosic,Gouldsboro

Zip Codes we offer repair services to 18436,18459,18427,18403,18434,18463,18416,18512,18452,18472,18438,18447,18448,18444,18519,18510,18445,18509,18451,18508,18505,18433,18407,18464,18456,18460,18473,18540,18501,18502,18577,18515,18503,18426,18410,18428,18507,18504,18424


18436,PA,Wayne,Lake Ariel
18459,PA,Wayne,South Canaan
18460,PA,Wayne,South Sterling,
18473,PA,Wayne,White Mills,


Write a Comment

Your email address will not be published. Required fields are marked *