Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system Credit: Brett Morrison No single antimalware engine can keep up with all the malware out there. But how about 57 of ’em?In this video, you’ll learn how to download and run Windows Sysinternals Process Explorer to test all currently running executables on your Windows system against VirusTotal’s 57 antivirus engines, which together offer the best accuracy you can ever get (with a small percentage of false positives that are pretty easy to spot).Neither the Sysinternals Process Explorer software nor the VirusTotal service costs a cent. The whole setup process will take you about five minutes, and the scan, which you can execute any time you like, takes less than a minute. Only malware in memory will be detected, but if you’re infected, very likely that malicious process will be running — and this easy method will sniff it out. Now that you’ve found malware, how can you get rid of it? Your best bet is to reformat, reset, or recover your PC to be absolutely sure you have eradicated the malware. But if you don’t want to go that far, you have other options: antivirus software, sysinternal functions, and even the trusty reboot/rescan. Here’s a walkthrough of each option. Related content news Bug in EmbedAI can allow poisoned data to sneak into your LLMs The vulnerability can be used to deceive a user into inadvertently uploading and integrating incorrect data into the application’s language model. By Shweta Sharma May 31, 2024 3 mins Generative AI Vulnerabilities news OpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert Ops OpenAI’s generative AI tools were used to create and post propaganda content on various geo-political and socio-economic issues across social media platforms, the company said. By Gyana Swain May 31, 2024 4 mins Generative AI news Okta alerts customers against new credential-stuffing attacks Hackers are using credential-stuffing to attack endpoints that are used to support the cross-origin authentication feature. By Shweta Sharma May 31, 2024 4 mins Identity and Access Management Vulnerabilities feature 3 reasons users can’t stop making security mistakes — unless you address them Understanding what’s behind employee security mistakes can help CISOs make meaningful adjustments to their security awareness training strategies. By Ariella Brown May 31, 2024 5 mins Data Breach Risk Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe