Online Security Series Part 2: Malware & Ransomware | Mac & PC Farnham
SECURITY SERIES - PART 2 OF 5

Malware, Ransomware & Viruses: Understanding Digital Threats

Published: February 2026 | Reading Time: 10 minutes
Series: Online Security for Everyday Users | Author: Sean Kevin Wyndham-Quin, Mac & PC Farnham
Previously in this series: In Part 1, we covered phishing attacks and how to spot fraudulent emails, texts, and calls. Today, we're diving into the invisible threats that can infect your computer.

The Scale of the Problem

560,000 new malware variants detected daily in 2025

£2.3 billion lost to ransomware in UK businesses

37% of UK computers have some form of malware

What is Malware?

Malware (malicious software) is any program designed to harm your computer, steal information, or give criminals control of your system. Think of it as digital disease—just like biological viruses make you sick, computer malware makes your system sick.

The term "malware" is an umbrella that covers many types of malicious software, each with different goals and behaviors.

Types of Malware Explained

🦠 Viruses

What they do: Attach to legitimate files and spread when you share those files with others.

Danger level: Medium to High

Common effect: File corruption, system crashes, data deletion

🔒 Ransomware

What they do: Encrypt your files and demand payment to unlock them.

Danger level: EXTREME

Common effect: Total loss of files, photos, documents unless you pay (and sometimes even if you do)

🕵️ Spyware

What they do: Secretly monitor your activity and steal passwords, banking details, and browsing history.

Danger level: High

Common effect: Identity theft, financial fraud

📢 Adware

What they do: Bombard you with advertisements and track your behavior.

Danger level: Low to Medium

Common effect: Slow computer, privacy invasion, annoying pop-ups

🎭 Trojans

What they do: Disguise themselves as legitimate software to trick you into installing them.

Danger level: High

Common effect: Opens backdoor for hackers, steals data

⌨️ Keyloggers

What they do: Record every keystroke you make.

Danger level: High

Common effect: Stolen passwords, credit card numbers, private messages

⛏️ Cryptominers

What they do: Use your computer's processing power to mine cryptocurrency without your knowledge.

Danger level: Medium

Common effect: Slow system, overheating, high electricity bills

🧟 Rootkits

What they do: Hide deep in your system, giving hackers administrator-level control.

Danger level: EXTREME

Common effect: Complete system compromise, very hard to remove

Deep Dive: Ransomware - The £2.3 Billion Threat

Ransomware has become the most financially damaging type of malware. Let's understand how it works and why it's so devastating.

How Ransomware Attacks Happen

Typical Ransomware Attack Timeline:

Day 1, 9:00 AM: Employee opens email attachment "Invoice_2026.pdf.exe"
Day 1, 9:01 AM: Ransomware activates and starts encrypting files
Day 1, 9:15 AM: All files on computer encrypted, spreading to network drives
Day 1, 9:30 AM: Ransom note appears: "Your files are encrypted. Pay £5,000 in Bitcoin within 72 hours or files will be permanently deleted."
Day 1, 10:00 AM: Entire company network compromised, all work stops
Day 4: If payment not made, ransom doubles to £10,000
Day 7: Files permanently deleted (sometimes—criminals aren't reliable)

What Ransomware Encrypts

  • Documents (Word, Excel, PDF)
  • Photos and videos
  • Databases
  • Email archives
  • Design files (AutoCAD, Photoshop)
  • Accounting software data
  • Customer records
  • Network drives and cloud-synced folders
⚠️ Critical Mistake: Many people think cloud storage (Dropbox, OneDrive, Google Drive) protects them from ransomware. It doesn't! If your files sync to the cloud, the encrypted versions sync too, overwriting your good copies.

Should You Pay the Ransom?

Law enforcement and security experts unanimously say: NO

Why not to pay:

  • No guarantee you'll get files back – 40% of victims who pay never receive decryption keys
  • You become a repeat target – Criminals know you'll pay and will target you again
  • Funds criminal activity – Your payment finances more attacks
  • Malware may remain – Even if you decrypt files, the infection might still be present
  • Legal complications – In some cases, paying ransoms may be illegal (funding terrorism)

Real Ransomware Families in 2026

Ransomware Name Typical Ransom Target
LockBit 4.0 £50,000-£5 million Large businesses, hospitals
ALPHV/BlackCat £100,000-£10 million Corporations, critical infrastructure
Ryuk £50,000-£1 million Healthcare, government
Cerber £500-£5,000 Home users, small businesses
WannaCry (older) £300 Unpatched Windows systems

How Malware Infects Your Computer

1. Email Attachments

Dangerous file types to watch for:
• .exe (executable programs)
• .scr (screen savers - actually programs)
• .zip with password protection (hides from antivirus)
• .docm or .xlsm (Office files with macros)
• .js (JavaScript files)
• .pdf.exe (fake PDF - actually a program)

2. Malicious Downloads

  • Pirated software ("free" Photoshop, Windows, games)
  • Fake system optimizers ("Speed up your PC!")
  • Torrent files
  • Codec packs for video players
  • Browser toolbars and extensions

3. Drive-by Downloads

Simply visiting an infected website can trigger automatic downloads. This happens through:

  • Malicious advertisements (malvertising)
  • Compromised legitimate websites
  • Exploit kits targeting browser vulnerabilities

4. USB Drives and External Media

Never plug in USB drives you find or receive unexpectedly. They can contain malware that auto-runs when connected.

5. Software Vulnerabilities

Outdated software has security holes that malware exploits:

  • Old versions of Windows (XP, 7, 8)
  • Outdated Java or Flash Player
  • Unpatched browsers
  • Old PDF readers

Warning Signs Your Computer Has Malware

  • Sudden slowdown: Computer takes forever to start or programs lag
  • Unexpected pop-ups: Ads appearing even when browser is closed
  • Browser changes: Homepage changed, new toolbars appeared, search redirects
  • Programs closing automatically: Especially antivirus software
  • Files disappearing or corrupted: Documents won't open or show strange extensions
  • Antivirus disabled: You can't turn it back on or it's uninstalled
  • Unknown programs in startup: New programs you don't recognize
  • High CPU or disk usage: Computer always running at 100%
  • Webcam light on: When you're not using it
  • Strange network activity: Internet usage when you're not browsing
  • Friends reporting spam from you: Your email or social media sending messages without your knowledge
  • Fake security warnings: Pop-ups claiming you have viruses (trying to sell fake antivirus)

How to Protect Yourself from Malware

  • Install reputable antivirus software – Windows Defender (built-in) is good; BitDefender, Norton, or Kaspersky are better
  • Keep ALL software updated – Windows Update, Adobe, Java, browsers—everything
  • Never download pirated software – That "free" Photoshop is loaded with malware
  • Be extremely careful with email attachments – Even from people you know (their account might be hacked)
  • Use ad-blockers – uBlock Origin blocks malicious advertisements
  • Enable click-to-play for plugins – Don't let Flash or Java run automatically
  • Use a standard user account – Don't browse the internet as administrator
  • Enable firewall – Both Windows Firewall and your router's firewall
  • Disable macros in Office – Unless you absolutely need them
  • Use Script Blockers – NoScript or uMatrix for advanced users
  • Verify downloads – Only download software from official websites
  • Check file extensions – document.pdf.exe is NOT a PDF file

The Backup Strategy: Your Best Defense Against Ransomware

The single most important protection against ransomware is having backups that malware can't access.

The 3-2-1 Backup Rule

3 copies of your data (original + 2 backups)
2 different types of media (external drive + cloud)
1 copy kept offsite or offline

Good Backup Strategy

  1. External hard drive – Back up weekly, then DISCONNECT the drive (ransomware can encrypt connected drives)
  2. Cloud backup – Services like Backblaze, Carbonite, or OneDrive with versioning enabled
  3. Test your backups – Actually try restoring files to make sure backups work
⚠️ Common Backup Mistakes:
  • Leaving backup drive connected 24/7 (it will be encrypted too)
  • Only using cloud sync like Dropbox (encrypted files sync to cloud)
  • Never testing if backup actually works
  • Backing up only some files (forgetting important folders)
  • Using the same password for backup as for Windows (ransomware can access backups)

What to Do If You're Infected

If You Suspect Malware (Not Ransomware)

  1. Disconnect from internet immediately – Prevents malware from spreading or communicating
  2. Don't restart – Some malware activates on restart
  3. Boot into Safe Mode – Restart, press F8, select Safe Mode with Networking
  4. Run antivirus scan – Full system scan in Safe Mode
  5. Use second opinion scanner – Malwarebytes, HitmanPro (malware might have disabled your main antivirus)
  6. Change passwords from clean device – After removing malware, change all passwords from phone or different computer
  7. Monitor accounts – Watch for suspicious activity in email, banking, social media

If You're Hit by Ransomware

  1. IMMEDIATELY disconnect from network – Unplug ethernet, turn off WiFi
  2. Don't turn off computer – Keep the ransom note visible
  3. Take photos of ransom note – Document everything
  4. Disconnect all external drives – Before they get encrypted
  5. Report to Action Fraud: 0300 123 2040
  6. Contact a professional – Call Mac & PC Farnham: 07769 804065
  7. Check for decryptors – nomoreransom.org has free decryption tools for some ransomware
  8. Do NOT pay the ransom – No guarantee of recovery, and you become a repeat target
  9. Restore from backup – If you have offline backups, this is your best option

Mac Users: Are You Safe?

Common Myth: "Macs don't get viruses"

Reality: While Macs are generally more secure than Windows PCs, they're NOT immune to malware. Mac malware increased by 400% in 2025.

Mac-Specific Threats

  • Adware – MacKeeper, Advanced Mac Cleaner (ironically, these "cleaners" ARE malware)
  • Cryptominers – Using your Mac to mine cryptocurrency
  • Spyware – Stealing iCloud credentials
  • Ransomware – KeRanger, EvilQuest target Macs

Mac Protection

  • Keep macOS updated – Apple releases security patches regularly
  • Only install apps from App Store – Or verified developers
  • Enable Gatekeeper – System Preferences > Security & Privacy
  • Use antivirus – Malwarebytes for Mac, BitDefender, or Intego
  • Don't disable security features – Even if an installer asks you to

Recommended Antivirus Software

Software Best For Price Pros
Windows Defender Basic protection Free (built-in) No extra cost, lightweight, good detection rates
BitDefender Overall best £24.99/year Excellent protection, minimal system impact
Norton 360 Complete suite £34.99/year Includes VPN, password manager, cloud backup
Kaspersky Advanced users £29.99/year Powerful features, excellent detection
Malwarebytes Removal tool £39.99/year Excellent for cleaning infected systems

Action Plan: Protect Yourself This Week

7-Day Malware Protection Challenge:

  1. Day 1: Install or update your antivirus software, run a full system scan
  2. Day 2: Update all software (Windows, browsers, Adobe, Java)
  3. Day 3: Set up your first backup (external drive or cloud service)
  4. Day 4: Install ad-blocker (uBlock Origin) on all browsers
  5. Day 5: Review installed programs, uninstall anything suspicious or unused
  6. Day 6: Test your backup by restoring a file
  7. Day 7: Create a system restore point (Windows) or Time Machine backup (Mac)

Free Malware Removal Tools

  • Malwarebytes Free – Excellent malware scanner and remover
  • HitmanPro – 30-day free trial, second opinion scanner
  • AdwCleaner – Removes adware and unwanted programs
  • ESET Online Scanner – Free one-time scan
  • Kaspersky Virus Removal Tool – Free standalone scanner
  • No More Ransom – Free ransomware decryption tools (nomoreransom.org)

Infected? Need Professional Help?

At Mac & PC Farnham, we specialize in malware removal and system recovery. We can remove even the most stubborn infections and help you set up proper protection.

Same-day service available • 60-day warranty on all work

Call 07769 804065

Or email: skwquin@macpcfarnham.uk

📧 Coming Next Week: Part 3 covers identity theft, online scams, and how to protect your personal information from criminals. Subscribe to receive it in your inbox!

About the Author: Sean Kevin Wyndham-Quin has over 20 years of experience in computer repair and security. At Mac & PC Farnham, he removes malware from dozens of computers every month and helps clients implement robust security measures.

Tags: malware, ransomware, computer virus, spyware, antivirus, computer security, malware removal Farnham, ransomware protection, cybersecurity, online safety