When browsing the web you might be targeted by online scams
that claim that your computer’s security software is out of date. They will
usually offer a free scan if you download their program. This program serves
two purposes, to plant spyware on your system and to tell you that it has found
a lot of problems that need fixing. The next step comes when you start seeing
pop-up ads for cheap virus removal programs, which you should install
immediately, as your computer is in danger of shutting down forever. Remember
that free download?
That spyware can do just that, take over your system and
make it do whatever the scammers want. So you download a second fix for a
problem that wasn’t there in the first place. You pay to remove the Trojan
horse and it may well leave, but not before taking your vital information and
handing it to crooks. They are masters of disguising their Trojans as
legitimate security prompts. These might look exactly like they originated from
your computer, but are actually sent through the internet, when you are
connected. Online scams like this depend on your clicks and downloads to
achieve their purpose.
The prompts will come in many forms and will look legitimate
but will all be fakes. Ads promising to “clean your system,” “get rid of viruses,”
or “ensure browsing privacy” should all be avoided. The only way to truly do
any of these things is to reinstall the system. If you receive alerts about
“spyware found” or “pirated files detected,” it means that your computer has
already been compromised, a few more clicks and the cons will have what they
need to pull off their online scams.
If you are get offer for free software, you should really
consider why it is free? Does the manufacturer want to access your files? Or
maybe they want to advertise to you while you run their program? Perhaps they
actually want to create some problems that you will pay to fix later? Many
online scams start with these free offers. So before you download anything
check the source and search for any reports of illicit activity by other users.
Online scams that use fraudulent security applications are
very profitable and thus well organized. The cons spend time designing the
Trojan horses and other spyware that will mimic your system or a legitimate
vendor’s product extremely well. They will often issue receipts for any
purchases you make and may even run a customer service line for a while to
answer questions and concerns. They will post fake reviews of their products
all over the internet and buy advertising space on well-known and trusted
websites.
Remember looks can be deceiving. It is good practice not to
buy anything that wasn’t on your shopping list. In other words not to fall for
gimmicks and promotions, but make your purchases based on what you actually
need. This applies to the internet as well. If you intended to read the news,
but are prompted to clean your hard drive instead, why would you do it? Because
it is free? Try to recall the last truly free thing you got. Did it come from a
stranger? Probably not.