{"id":373,"date":"2018-08-20T12:50:25","date_gmt":"2018-08-20T12:50:25","guid":{"rendered":"https:\/\/i4t.ca\/?p=373"},"modified":"2018-12-07T16:07:30","modified_gmt":"2018-12-07T16:07:30","slug":"dont-become-another-victim-of-scareware-rogue-security-systems","status":"publish","type":"post","link":"https:\/\/i4t.ca\/en\/dont-become-another-victim-of-scareware-rogue-security-systems\/","title":{"rendered":"Don't Become another Victim of Scareware (Rogue Security Systems)"},"content":{"rendered":"<div id=\"dslc-theme-content\"><div id=\"dslc-theme-content-inner\"><p style=\"text-align: justify;\">We have all encountered this at one time or another, you\u2019re following a link to a website from a search engine and then you get that message that chills you to the bone \u201c Detected security on your computer, your computer has been infected with spyware which gather\u2019s information throught your computer (spelling mistakes and all\u2026) \u2026. Fix Now\u201d<\/p>\n<p style=\"text-align: justify;\">Scareware, ransomware or rogue scanner software or fraudware tricks people into purchasing and installing it on to their computer\u2019s hard drive. The scam creates the deception that by double-clicking and installing the product through screens designed to frighten users into thinking that their computer is being attacked by dangerous viruses, malware, or ransomware and that the only solution is to download the antivirus software. If you\u2019re lucky the software just doesn\u2019t work as promised and you\u2019ve lost the money that you paid for it. Other times users have mistakenly believed that they\u2019re protecting their devices from but are actually voluntarily installing even more malicious software.<\/p>\n<p style=\"text-align: justify;\">What should you do if you come across scareware? If you recognize that it\u2019s a fake, you should shut down the browser completely and safely (Ctrl + Alt + Delete and close the browser through the task manager). Then by rebooting the computer a web browser that isn\u2019t as susceptible to malware such as Firefox, Chrome, or Safari, the problem should be solved.<\/p>\n<p style=\"text-align: justify;\">However in some cases the user panics and to click on the \u201cX\u201d icon to close the popup window and the malware and\/or a virus is downloaded. The user\u2019s data is stolen, and a series of popups appear that crash the computer. Clicking the \u201cX\u201d icon to close a rogue window designed to deceive you is the same thing as clicking the actual popup button.<\/p>\n<p style=\"text-align: justify;\">Here are some helpful tips to keep you from becoming another victim.<\/p>\n<p style=\"text-align: justify;\">\u2022 If you\u2019re surfing online you have to have updated antivirus software installed with a strong firewall to ward off potential attacks<br \/>\n\u2022 Never open an email attachment unless it comes from a trusted source. Internet Explorer has been known to be extremely vulnerable to malware due to its failure to keep up with new features&nbsp; and functionality. There is even a global hacking group is that is targeting Windows hardware with malware.<br \/>\n\u2022 Just say no and don\u2019t download freeware or shareware unless you trust its source. These programs typically come with spyware and\/or adware.<br \/>\n\u2022 Don\u2019t click on popups advertising antivirus or security software. Antivirus companies don\u2019t use these techniques to get customers.<\/p>\n<p style=\"text-align: justify;\">If you have clicked on the window, and now your computer is infected, the best thing to do is to shut it down and take it to a professional and get your hard-drive cleaned. The next thing that you should do is disconnect from the Internet or Local Area Network (LAN) and start Windows in Safe Mode.<\/p>\n<p style=\"text-align: justify;\">You can run an antivirus scan to locate the malware and then remove it. Restart your computer once the malware has been removed. There\u2019s nothing worse for your piece of mind and the overall performance of your system than an infected computer.<\/p>\n<p style=\"text-align: justify;\">Summary: By following these tips you can avoid malicious software, scareware, ransomware, rogue scanner software or fraudware tricks people into purchasing and installing it on to their computer\u2019s hard drives.<\/p>\n<p style=\"text-align: justify;\">#malicious software, #scareware, #ransomware, #rogue scanner software, #fraudware<\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>We have all encountered this at one time or another, you\u2019re following a link to a website from a search engine and then you get that message that chills you&nbsp;[&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":532,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-services","clearfix"],"_links":{"self":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/posts\/373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/comments?post=373"}],"version-history":[{"count":0,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/posts\/373\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/media\/532"}],"wp:attachment":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/media?parent=373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/categories?post=373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/tags?post=373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}