DiFü-logo
Start Home
Please enter a valid email address
Please enter your password
Lost password?

Create an account and save your progress

Please enter a valid email address
Please enter a password

To issue certificates, we also need your name and date of birth

Please enter your name
Please accept our terms and conditions to proceed
Exam Topic exam

E2 | Malware

Here you will learn about malware, and how to protect yourself from it. You will also find tips on what to do if one of your devices is affected by malware.

  • If you follow the following basic rules, cyber-criminals and hackers won’t stand a chance:

    Malware often only makes it onto our computers with our help, usually through email. It is important to never click on suspicious links in emails, or open any attachments that seem suspicious. As a rule of thumb, consider every file that you did not request/expect, or do not know the contents of, to be suspicious. When in doubt, it may help to call the supposed sender and ask if they really did send the suspicious email.

    Ein Briefumschlag mit einem @-Zeichen als Siegel.
    Zwei Viren.

    You should only download and install programs and apps from providers that you completely trust. If you’re unsure, you can search for the name of the program online, as other users may have already reported it as malware.

    You should not click on advertising banners with offers too good to be true, no matter how tempting they are. If a dubious window suddenly appears on your screen that warns of danger, never click on buttons like “OK” or “Cancel,” but close the window by clicking the X in the upper right corner or through the keyboard shortcut Alt+F4 instead.

    Malware doesn’t just get onto your computer through email, but can also enter through system and software vulnerabilities. This is why it’s especially important to close these gaps by updating your operating system and all programs regularly.

    Virus protection and firewalls are essential when surfing the net. Windows and macOS each have their own on-board tools that protect you from many online dangers. Nowadays, a firewall is usually activated by default. There is also good external security software available. While the best programs cost money, there are also good alternatives available at no cost.

  • It is not always easy to detect when a system is infected with malware. If you are the victim of a blackmail scheme, for example, this will be easy to notice, as scammers often ask for money immediately. But malware often operates in the background and may be difficult to detect. The following clues can help you determine if malware is present:

    This isn’t a dead giveaway that malware is present, as older computers tend to slow down over time, but a clear reduction of speed in a relatively new device might be a clue that your system is compromised.

    This can also happen from time to time, and is not a definitive sign that malware is present. But if the incidents start to pile up, you should definitely take notice.

    This is a clear sign that something might be wrong. The only other explanation for this is that you may have logged into a public device and forgotten to log out.

    In general, when it comes to malware, trust your gut. Computers are machines, and machines act predictably and follow fixed protocols. If they deviate from this standard behavior, you should start to get suspicious.

    The best way to detect malware is to run a comprehensive system scan with protection software, which you can quickly find online. These programs scan your system for malware, which is best to be done regularly. You can find detailed instructions on how to perform a system scan in the help section of your protection software, or on the manufacturer’s website. There are also online scanners that don’t require you to download anything.

  • If malware has found a way to get onto your device despite all the precautions you took, it is important to stay calm. If your company has an IT department, they should be contacted immediately. If you have no one else to assist you, here are some steps you can take on your own:

    Has your virus protection software issued an alarm?

    This is a good sign, because it means that your virus protection software is working. Once the antivirus software has found the culprit, it mainly offers to delete the corresponding files, or to “quarantine” them. The quarantine option is generally better because it allows you to easily restore files in the event of a false alarm.

    What symptoms does the malware exhibit?

    Use another device, such as a smartphone or tablet, to search the web for information relevant to your particular malware problem.

    Disconnect from the internet

    Disconnect your computer from the internet by unplugging the network cable or turning off WiFi. This prevents your computer from spreading malware, or from downloading further malware.

    Are the repair measures not helping?

    If nothing else seems to be working, the last option is to format your system and set it up again. Formatting means all data will be deleted, including photos, videos, personal documents, and programs. In such cases, it is important that you have saved all your important files as a backup. Reformatting is a complicated process, and it is not advisable to try this option on your own unless you have the necessary experience.

    In all cases, the following applies:

    If you’re unsure what to do, seek external help. Kneejerk reactions to a malware attack can often do more harm than good. If you have friends or family in the IT field, you could ask them for advice. If none of your contacts are IT savvy, you can contact consumer advice centers, or the Federal Office for Information Security (BSI).

    The General Data Protection Regulation obligates you to report breaches of employee personal data to the relevant supervisory authority, such as the data protection officer of your state or country. Data breaches include the unauthorized disclosure of data to third parties, or even the loss of data. It is sufficient to provide an initial report with the information that is currently available.