Scareware 101: How to spot this dangerous cyberattack and protect yourself

Spam is unavoidable: It clutters your phone call history and chokes your email inbox. Like spam, scareware is another annoyance that seems to go hand-in-hand with internet access. It’s why you should never click pop-ups that say your system is at risk.

Most cybersecurity experts say scareware has been around since 1990, when Patrick Evans designed a program called NightMare to attack computers. A creepy image of a bloody skull took over victims’ screens — and an echoing shriek assaulted the ears.

The aptly named NightMare set a disturbing precedent. Cybercriminals have since used scareware to wrestle millions of dollars from unsuspecting victims. In this article, you’ll learn how to prevent falling victim to scareware.

Scareware definition: How this cyberattack works

Picture this: You’re surfing the web, minding your own business. Then, a random pop-up says your computer has a virus. It looks legitimate, with a technical design similar to that of Apple or another trustworthy brand.

You fall for the pop-up’s claims since it looks like it came from a reliable source. You immediately feel stressed out. After all, your whole system could be in danger.

Did a pop-up on your iPhone or Android say you have a virus? Be careful before you click anything. It could be one of the top cyber threats of 2022.
Source: Apple

Most scareware pop-ups urge you to click it or else.

For example, they’ll say to “click here” to remove the viruses. You might do what the pop-up asks since you don’t want your device infected with malware. Unfortunately, clicking on the link will download viruses onto your device.

That’s right: You had no viruses on your phone or computer. The pop-up was lying. Cybercriminals manipulate your emotions so they can scare you into action.

How you might encounter scareware

Famous scareware attacks came in many different forms. You can encounter these nasty scams on your phone, tablet or computer. This is why you need antivirus protection on all your devices. Here’s how to set up cybersecurity programs on your iPhone or Android.

Continue reading

U.S. Cyber Trust Mark 101: All about the latest legislation for tech products

Finally, some legislation around tech products! The White House announced its latest labeling and cybersecurity safety program: The U.S. Cyber Trust Mark. 

It’s one wild world out there. Many people don’t realize the high-tech products in their homes could open them to a massive hack attack. This new program aims to help consumers identify safe Internet of Things (IoT) devices for purchase. 

Continue reading

H2-Oh-no: The White House asked governors to draw up plans to tackle cybersecurity threats to our state water systems. Here’s the problem: Many facilities are underfunded and short-staffed, making a sudden coordinated attack a real possibility. I always have a few cases of water in storage, just in case.

6 ways to stop digital stalkers from harassing you

The more time you spend online, your risk of online harassment grows. Being proactive can stop digital stalkers before they track your every move, change your passwords and shatter your sense of security. I’ve heard from people who have been fending off hackers for years — and they describe scary situations.

Continue reading

5 signs your security camera was hacked and steps to prevent it

When setting up a home security system, you must password-protect your Wi-Fi and set up two-factor authentication (2FA). Hackers could take over your home network if you don’t take these precautions.

Safeguards like these can help stop a digital home invasion. Hackers are increasingly breaking into home security cameras, taunting and extorting people. A security oversight on your part could open the floodgates for a criminal to launch a reign of terror on you and your family.

Continue reading

Worried about a link? Use this test before you click it

Before you click a link, how certain are you that it will take you to the webpage you are expecting? It’s nearly impossible to tell by simply looking at the address, especially when modified with a link shortener.

And criminals know that, so they often hide malicious links ingeniously. The address could seem legitimate, but when you look closer, you might spot some character substitutions, revealing a bogus destination.

Continue reading

Best free Windows and Mac security downloads for your computer

We rounded up some of the best ways to protect your computer against viruses, cyberattacks and other threats. We’ve got you covered if you aren’t familiar with how cybersecurity threats work. Tap or click for a quick breakdown of the five most common digital threats you’ll encounter.

Continue reading

Smishing is spreading - How to spot it

You’re putting yourself at risk if you aren’t up-to-date on the biggest scamming schemes. There are a lot of widespread cons that many people don’t know about. Tap or click here for seven new scams to watch out for.

Take smishing, for example. While it isn’t all that new, it’s still not the most well-known term. But it’s a spreading issue that threatens anyone who owns a smartphone, so it’s best to find out what it is now.

Continue reading

6 everyday objects that can threaten your cybersecurity

We have to worry about many forms of cyberattacks, from phishing to spyware. Since we know about these digital threats, we tend to be more careful online. However, you also have to defend against physical cybersecurity threats.

Continue reading

Update Chrome! Patch fixes major bug hackers are exploiting

Google’s Chrome browser is super popular, with nearly 3 billion installations globally. Chrome is relatively safe to use if you’ve set it up correctly. Tap or click here for ways to make it even safer to use.

But you must keep your programs, including web browsers, up to date to fend off newly found cybersecurity threats. Google recently discovered a dangerous zero-day threat to its Chrome browser.

Continue reading

4 ways to know you should change your passwords

You should change your passwords every three months. Wait too long, and hackers might crack the code. However, cybercriminals work quickly, so you need to look for other signs that it’s time to change your passwords.

Continue reading

Hackers are hiding malware in PNG files - Here's what to watch for

More people are wising up to how malware is distributed, leading hackers to try different methods to infect your devices. Popular ways of compromising devices have been through malicious attachments such as Word documents or PDF files.

Continue reading

How lockdown mode protects vulnerable people in your life from hackers

If you have an iPhone 8 or newer, you may want to update to iOS 16 if you haven’t already. Apple’s latest operating system comes with some cool new features, such as the ability to unsend and edit text messages and lock screen customization.

Continue reading

Test your eyes: 99% of people can’t find the hidden words in these tough optical illusions

It’s time to test whether you’re working with an elite brain or not. One of these optical illusions stumps 99% of people, so if you can spot it, you’re in the top 1%. Each hidden word optical illusion is tricky, so prepare for a challenge.

Continue reading

Update your PC! Windows Patch Tuesday fixes 3 zero-days and 75 flaws

Updates can come out so quickly in the tech world that they make your head spin. But there’s one consistent update. Microsoft’s Patch Tuesday update is released on the second Tuesday of every month. The new update for May 2022 came out this week, and it’s pretty essential.

Continue reading

How to use Have I Been Pwned? to see if your info is floating around the web

Data breaches are almost always catastrophic events for privacy and security. Not only can millions of people end up with their personal data exposed, but these breaches can also spiral even further out of control once hackers start testing leaked passwords and email addresses on other platforms.

Continue reading

Home security comparison: DIY options vs. traditional home security

With so many cybersecurity threats out there you might be focused on protecting your digital life. Even though that’s important, only paying attention to online threats is a huge mistake.

That’s because burglars are still out there in full force looking to invade your home and rip you off. This means having a home security system that you can trust watching your back 24/7 is extremely important.

Continue reading