647.956.6081 / 705.302.7937

Computer Virus Help

It can be really annoying when a computer becomes infected with a  virus or other malware. Get it removed by a pro!


Get help with a virus or malware right away. Fill out the form.

1CS has been verified by HomeStars

See us on HomeStars.com!

Read below for descriptions of the various kinds of computer repair services we offer

What is the Average Cost to remove a Virus or Malware?

Between $75 and $150 + HST.

This is a rough estimate of 1 to 2 hours of services, based on 1CS’s pricing and experience servicing residential customers on a personal computer within the Greater Toronto Area. It is not meant be a guarantee of any kind as malware infections can vary in severity and thus computer virus removal cost can also vary. Once a technician has diagnosed the infection, they can provide another estimate of time based on specifics. 






We Offer Computer Virus Removal  / Malware Removal Services

Get rid of a computer virus using the services of a 1CS Malware Specialist. Watch them detect hidden threats and remove them quickly

Virus/Malware Service Info:


The Difference between Virus and Malware

A computer virus is one form of malware but not the only form. In our experience malware which is entirely in the form of a virus is rare, representing no more than 5% of the malware we treat or approximately 10% of existing malware.

Unforunately, the the term virus is used to refer to any kind of malware incorrectly, by consumers and a large segment of the population. The various forms of malware are important to differentiate and understand to properly defend against .

In computing, a virus is a malicious program deployed for a devious and criminal purpose, tricking or scamming the user to derive financial gain or other benefit for the individual(s) who control it.

Essentially, a virus locates a file on a device and changes it so that the next time the file is opened the virus is triggered. The difficulty with a virus is that it replicates itself and spreads to other files making it hard to contain.

Malware, the larger category to which a virus belongs, includes other forms of malware. A well known exmaple is a Trojan, which is a program that disguises itself as another program but programmed for a different purpose-to get your money or information. Many forms of malware use Trojans to access a computer and install their malicious program.

One of the more common types of Trojans is the anti-virus pop up message which deceipfully states that the user’s device has become contaminated with a virus, and directs the user to press a button to remove the virus from the device. Once the button is pressed, the individual(s) controlling the Trojan can access your computer and install their malware. 

Other forms of malware include adware, maladtervising, spyware, worms, ransomeware and hydrid forms which combine some of the various forms of malware. Some of which have either a different purpose or a different method to it’s deception.




Anti-Virus & Anti-Malware Software

We find that free malware removal software will, in general, likely not remove all of the necessary malware components, and they come with a lot of spam. We recommend purchasing a high quality program from a trusted source.

Customers often ask us what the best malware removal program is, however it depends on the type of malware infection. In general, we recommend ESET for anti-virus protection.

When you purchase anti-virus software to help protect your computer, that anti-virus software is not going to protect against each different form of malware. Anti-virus software can signifcantly reduce the risk of acquiring a virus and some other forms of malware, just not all.

Additionally, cyber criminals are constantly updating their tactics and coming up with new ways to scam. It is difficult for Anti-virus software developers to stay up to date with the latest tricks.

Virus’s can be difficult to clean up. Even the top anti-virus programs struggle with removing a virus correctly and in many/most instances will simply quarantine the infected file or delete it, which is is not the same thing. 

It is important that each user takes steps to prevent the infection and spreading of malware.  Those steps include being cautious about what is clicked on whether that be a link in an email or a strange pop on your desktop.

Do not click on anything in any email from any email address which does not look right or which is not known. Be aware of the anti-virus program you are using and do not click on any pop up messages from any other anti-virus program.

Using the internet has implications. The internet is how most if not all malware makes it’s way to a computer. By clicking on what looks harmless, the user might be giving malware access. Malware has been known to enter a computer system when an image or live video stream is being downloaded. Unfortunately, it is not always clear if clicking on something will download something. Please be careful.


Locating & Removing Malware

If one can find, deep in their computer, what is called a “malicious executable” using for exmaple Process Explorer or Autorun by Microsoft, they can attempt to remove it.

This is not easy, especially for someone who does not do this on a regular basis. 

Generally speaking, the invisible part would be removed from memory and then the rest of the malcious program would be removed, piece by piece.

Our Technicians commonly run in safe mode, rename the invisable part of the program which may remove it, and then run a high quaity anti-virus scanner 3 times to remove any remaining pieces. 

Locating and removing malware program components is hard. One could easily miss part of the program and leave it lurking on your computer. Additionally, one may not know if the malicous program has altered the system and it would be impossible to be certain it had not. 

Common Virus/Malware Solution

When trustworthy removal of malware is not possible, (1) back up the data, (2) reformat the drive, and (3) reinstall the programs and (4) data. Then figure out how the malware got into your system and work to end the action that allowed the malware access. 

Of course, the above refers to the solution if malware has been acquired. However, the preventative measure users can take to mitigate against the risk of malware is an important part of the long term solution.




PC & MAC Virus Infections


Malware Infections


PC Trojan Infections


Spyware Infections


Worms & Related Infections


Anti-Virus Software


Fileless Malware Infections


Adware Infections


Maladvertising (Spam)


Hybrid & Exotic Forms


Ransomeware Consulting


Virus/Malware Info & Training

What to do if a computer is infected with Malware


As soon as a computer is thought to be infected with Malware, the user should take the following precautions:

Do not click on anything


Disconnect from internet immediately

Don’t turn computer off and do not restart it


If you see messages which direct the user to contact someone, the computer might be infected with a type of malware called ransomware. Ransomware can hold a computer and it’s data hostage until the demands of the hackers are met. 


Are You Still Searching For An Experienced Malware Removal Specialist?

1CS Technicians are familiar with the various forms of malware, where malware locates itself and the measures to get rid of it. They can also recommend anti-virus software and good practices for prevention.

Functions our Malware Specialists perform

Our malware removal specialists can help to prevent, detect, remove or otherwise address a virus and other malware infection.

That includes:

-Both pc malware removal and mac malware removal services

– Removing unwanted popups

– Providing and Installing a good anti-virus software to your computer as a first line of defense

– Alerting you to Trojans and the ways they attempt to gain access to your computer

– Adjust computer settings which can potentially leave your device vulnerable to malware

– Scanning your comptuter for hidden and visible malware components

– Removing hidden and visible malware compents where possible

– Backup your data, refomat your drive and reinstall your progrpams, applications and data

– Provide other solutions which remediate a malware infection

-Monitor your computer using a remote monitoring agent

– Regardless of the sitution, we can provide consulting to address whatever the situtation may be

 -Explain how to remove malware including how to remove malware from a mac and how to remove malware from mac safari


Spot Various Forms of Malware

Malicious programs likely gain access to your computer by an event such as clicking on a link from an unknown source or downloading a document, image or video which contains malicious code.

Virus – Once a virus gains access, it still needs to be triggered or executed to begin it’s process, otherwise it sits dormant. Once it is executed, it replicates itself. Once a file becomes infected, it spreads to other files.

Worms – Once a worm gains access, often via email, it does not need to be triggered to start spreading, this is referred to as self-replicating. Once the worm gains access, it starts spreading to other other files and programs without additional user clicks.

Trojans – Are a malicious program disguised as a legitimate program in hopes the user will click on it. They are sent via email or picked up from visiting certain websites. Like a virus, Trojans need to be it executed to begin it’s process, otherwise it sits dormant.

Ransomeware – is Malware from the Trojan category which encrypts user files and locks the users out of it while the user is arranging a payment via bitcoin or other similar untracable currency. Sometimes users do not get their data back after making the ransome payment. 

Spyware – is commonly setup by someone who wants to monitor the activities of someone close. It is also possible that cyber criminals will attempt to use spyware to record keystrokes relating to user names, passwords or other personal information. Fortunately, spyware is usually easy to remove.

Maladvertising – is the use of genuine advertising and advertising networks to clandestinely send malware. Online criminals may pay for a real ad on a website. However, once a user clicks on the ad, malware is installed on their device or the ad redirects the user to a malicious website.

Adware – otherwsie known as a form of spam, subjects the user to unwanted ads including the possibilty of malicious advertising. Sometimes an adware program may re-direct browser searches to web pages that like similar to what you are lookung for but with different products. 

Hybrids – Are a mix between other forms of malware commonly including worms, trogans and seomtimes a virus. The exotic malware may enter a trojan but behave like a worm or a virus. These types are stealthy and try to alter the users operating system to gain control and hide from anti-malware applications. 



Is Your Computer Infected with Malware?

Our Technician’s can let you know if a virus or other malware has situated itself within your computer and suggest one or more remedies. They can also suggest, provide and install anti-virus/anti-malware software suitable to your needs including a demonstration and prevention advice.

When a computer or other device becomes contaminated with a virus or other form of malware, the user might not know it at first. It may take some time before it exposes itself in some form.  Soon enough the user will see their computer acting in a strange way, doing those things it never did before. Unwanted pop-ups, pop-us from programs you do not use, poor performance and ransome requests are some of the signs a computer is infected.

As previously mentioned, some malware can stay well hidden, lerk silently and attempt to steal your passwords, personal information, and cause other problems on the users computer if not stopped. Fortunately, our Technician’s are well versed in finding and resolving them.

Cyber Security for Business

Looking to step it up a level or two and protect your valuable business assets? Let’s face it, most business information is kept on a computer or some other form of information technology. Even a home business should take measures to defend against the inevitable cyber attack.

Talk to us about securing your network, installing a firewall, automating backups, anti-virus software, monitoring your server and workstations for things such as failed login attempts, patched and un-patched vulnerabilities, available updates, and other measures to secure your information assets.

Find out more about our Malware Removal and Prevention Services. 

Home Computer Security | Keep Your Computer And Data Safe

1CS can ensure users are taking measures to protect their device and information. Our Technician’s will explain potential threats and security vulnerabilities and recommend strategies to reduce the risk of an unwanted intrusion.

Computer Security Services Info:

What is Computer Security?

Computer Security is the body of technologies, practices and processes of detecting and blocking intrusions into a computer system. The process safeguards against unauthorized users from taking control of a computer, using its resources for malicious reasons, and those trying to gain access by accident. If this occurs, computer services may be required.

Offline Threats

Offline threats refer to those security threats which are not internet based. Situations like someone accessing a computer in person because they found it, stole it or acquired some other form of unauthorized access. The purpose of the intrusion could be significant or petty in nature. Breaches in security can occur by strangers or those you know. There are a few basic security measures one can in addition to purchasing a security program or encrypting data.

Online Threats

Online threats form a significant part of the total threat facing a computer or other device. Cyber Security refers to online threats.  There are things users can do using both software and hardware to protect against online threats. Knowing where threats come from is important when attempting to avoid them. Anti-virus software can provide a satisfactory level of security when addressing today’s class of malware. One should take measures to protect against unauthorized intruders including those living in close proximity to your wireless signal.

Wireless Networks Weak on Security

Wireless networks are notoriously known as weak on security, making it possible for others within proximity of your wireless network signal to access your computer. Unless you have properly protected your computer, using proven security measures, you are at risk. We would be pleased to assess your existing security measures and make recommendations based on our findings.

Alternatively, if you want something more high-level, including for your business, check out our cloud security and cyber security services.

Basic Computer Security Measures


  1. Setting a password to access the computer
  2. Setting a password to access programs
  3. Setting a password to access files and other data
  4. Storing sensitive data on an external hard drive
  5. Using an anti-virus program
  6. Using an enhanced offline security program
  7. Installing a firewall
  8. Avoid websites used for malicious purposes
  9. Avoid clicking on popups
  10. Avoid giving out personal information when contacted

We can demonstrate how to use the security features which come with Windows, Microsoft products or common security programs. Alternatively, we can facilitate the purchase of enhanced security software if a higher level of security is preferred. Today, however, the bulk of security efforts focus on the internet and cyber threats.


Get Computer Virus Removal & Remediation Services


Or call us at:


Not looking for Computer Virus or Malware Removal Services? Go back to our Computer Services page.