Received a message from FedEx or UPS about a package you didn’t order? Don’t fall for it —clicking that link could put your personal and financial information at risk.
Scareware 101: How to spot this dangerous cyberattack and protect yourself
Spam is unavoidable: It clutters your phone call history and chokes your email inbox. Like spam, scareware is another annoyance that seems to go hand-in-hand with internet access. It’s why you should never click pop-ups that say your system is at risk.
Most cybersecurity experts say scareware has been around since 1990, when Patrick Evans designed a program called NightMare to attack computers. A creepy image of a bloody skull took over victims’ screens — and an echoing shriek assaulted the ears.
The aptly named NightMare set a disturbing precedent. Cybercriminals have since used scareware to wrestle millions of dollars from unsuspecting victims. In this article, you’ll learn how to prevent falling victim to scareware.
Scareware definition: How this cyberattack works
Picture this: You’re surfing the web, minding your own business. Then, a random pop-up says your computer has a virus. It looks legitimate, with a technical design similar to that of Apple or another trustworthy brand.
You fall for the pop-up’s claims since it looks like it came from a reliable source. You immediately feel stressed out. After all, your whole system could be in danger.
Most scareware pop-ups urge you to click it or else.
For example, they’ll say to “click here” to remove the viruses. You might do what the pop-up asks since you don’t want your device infected with malware. Unfortunately, clicking on the link will download viruses onto your device.
That’s right: You had no viruses on your phone or computer. The pop-up was lying. Cybercriminals manipulate your emotions so they can scare you into action.
How you might encounter scareware
Famous scareware attacks came in many different forms. You can encounter these nasty scams on your phone, tablet or computer. This is why you need antivirus protection on all your devices. Here’s how to set up cybersecurity programs on your iPhone or Android.
The smishing scam
Smishing - what you need to know
Cybercriminals are posing as trusted organizations to steal your info. Find out how to protect yourself.