Malware / Spyware / Adware



The more national reporting data that’s collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Reporting a fraudulent incident will also assure that you have accurate documentation in order to aid in your recovery. Please consider reporting your incident to the FBI Internet Crime Complaint Center (IC3).  

Once processed, complaints filed via their website may be referred to federal, state, local, or international law enforcement or regulatory agencies for possible investigation. Any investigation opened on any complaint is initiated at the discretion of the law enforcement and/or regulatory agency receiving the complaint information. Reporting the incident at IC3 will not result in a call back for assistance.

The FAQs about reporting can be found here. Please read the FBI/IC3 privacy policy here.


Business Recovery Solutions

The following resources have been gathered and vetted in order to better serve you. These resources have been chosen to help simplify the process of recovery after a cyber incident has taken place. With these resources you may need to contact organizations outside Results will vary depending on your circumstances.

Malware Information from the FTC

See page 16 of this document for recovery checklist

Start on Page 12 of this document for tips on how to respond to a cyber incident

Recognizing and removing spyware tips from US-CERT

Make sure your anti-virus and anti-spyware work well together  

If your computer has been affected by malware, either consult with a reputable security expert to assist in removing the malware or use a program to help eliminate the infection.

Some legitimate programs are:

F-Secure SAFE

McAfee Stinger

Microsoft Safety Scanner

Sophos Virus Removal Tool


Business Security Solutions

Once the proper organizations have been notified and you are on the road to recovery, it is time to reinforce your cybersecurity. Let’s take action and strengthen your cybersecurity with the following resources and tools.

Recognizing and Avoiding Spyware

Is your business router secure?

Add Two-Factor Authentication to key accounts and follow other security tips at

Protecting against malware tips from US-CERT

Protecting Against Malicious Code

Other Resources