{"id":239,"date":"2016-11-09T09:30:34","date_gmt":"2016-11-09T14:30:34","guid":{"rendered":"http:\/\/sites.scranton.edu\/itmatters\/?p=239"},"modified":"2016-11-09T11:50:47","modified_gmt":"2016-11-09T16:50:47","slug":"tool-highlight-malwarebytes","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/itmatters\/2016\/11\/09\/tool-highlight-malwarebytes\/","title":{"rendered":"Tool Highlight: Malwarebytes"},"content":{"rendered":"<p><a href=\"https:\/\/royaldrive.scranton.edu\/Groups\/Planningandinformationsystems\/Desktopandinstructionalresources\/Web\/Malwarebytes\/MalwarebytesInstructionsForUse.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-241\" src=\"http:\/\/sites.scranton.edu\/itmatters\/files\/2016\/11\/malwarebytes-1.jpg\" alt=\"malwarebytes\" width=\"562\" height=\"513\" srcset=\"https:\/\/sites.scranton.edu\/itmatters\/files\/2016\/11\/malwarebytes-1.jpg 768w, https:\/\/sites.scranton.edu\/itmatters\/files\/2016\/11\/malwarebytes-1-300x274.jpg 300w\" sizes=\"auto, (max-width: 562px) 100vw, 562px\" \/><\/a>Malware, short for malicious software, is any\u00a0software used to disrupt computer operation, gather\u00a0sensitive information or gain access to private computer systems. Malware may be stealthy, intended to steal your information or spy on your computer for an extended period without your knowledge.<\/p>\n<p>As part of its commitment to securing the campus computing environment and protecting University assets and data, Information Resources has licensed Malwarebytes Breach Remediation for all University owned PCs.<\/p>\n<p>Please note that Malwarebytes\u00a0does not prevent malware from being installed on your\u00a0computer. Utilizing this tool regularly is part of a set of <a href=\"http:\/\/www.scranton.edu\/pir\/information-security\/cybersecurity.shtml\" target=\"_blank\">safe computing practices<\/a>,\u00a0which\u00a0continues to be most effective way to safeguard computers and data from malicious attacks.<\/p>\n<p><strong>Regularly running Malwarebytes to scan for malware is highly recommended<\/strong>, certainly if you notice that your computer\u2019s performance is sluggish or you suspect that your computer\u2019s security has been compromised.<\/p>\n<p><strong><a href=\"https:\/\/royaldrive.scranton.edu\/Groups\/Planningandinformationsystems\/Desktopandinstructionalresources\/Web\/Malwarebytes\/MalwarebytesInstructionsForUse.pdf\" target=\"_blank\">Review the Malwarebytes instructions to run the program on your University computer<\/a>.<\/strong><\/p>\n<p>The Malwarebytes Breach Remediation Tool is available on all faculty and staff Windows-based computers. IT Services is exploring the feasibility of extending the tool to the Macintosh platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware, short for malicious software, is any\u00a0software used to disrupt computer operation, gather\u00a0sensitive information or gain access to private computer systems. Malware may be stealthy, intended to steal your information or spy on your computer for an extended period without your knowledge. As part of its commitment to securing the campus computing environment and protecting [&hellip;]<\/p>\n","protected":false},"author":258,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,46],"tags":[57,58],"class_list":["post-239","post","type-post","status-publish","format-standard","hentry","category-computer-tools","category-security","tag-malware","tag-virus-scan"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/users\/258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":6,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/239\/revisions"}],"predecessor-version":[{"id":252,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/239\/revisions\/252"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/categories?post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/tags?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}