Scareware (aka Rogue virus, Rogue software) is one of the most repeatedly -encountered and persistent threats on the internet today. Scareware is a program that takes over a computer and with thousands of variants, uses social engineering to bait users onto infected websites with a technique called blackhat Search Engine Optimization These programs have been infecting computers worldwide in various tactics. Scareware is not typically harmful, rather it is a program that uses deceptions and scare tactics to create a perception of threats and persuade a user to purchase and enter credit card information or send in a check. Unfortunately, several individuals fall victims to these scams daily.
Once these programs are downloaded onto the user's computer, the software attempts to frighten the user into believing that the computer system is infected with threats that don’t exist, and then drive users to purchase services to clean up the non-existent threats. These programs will continue to send these annoying and intrusive alerts until a payment is made.
Some examples of these scareware programs are as follows:
FBI warnings stating that you downloaded illegal software, etc.
Antivirus programs that look legitimate (e-set, antivirus pro, etc.)
Operating programs (windows)
And lots more…..
Most of these programs attempt to duplicate the names of many legitimate programs, which confuse users into believing that the messages are genuine and results in the users making payments.
How are these programs downloaded and how do they work.
These programs are hidden within other links or files are that clicked or downloaded. When these links are clicked, these programs can automatically download into your systems without the knowledge of the user. Once these programs are downloaded into the computer, they create a fake folder in the systems, including the registry, which then takes over the computer. They will redirect all critical functions of the computer into these fake folders, which can partially or totally disable a computer system, making it completely unusable until the virus is removed. These programs will display pop-ups on your screen and prevent the user from doing anything else.
How to remove these programs
Unfortunately, the removal process for these programs are different for each one. A removal process for one type may not be the same for another. A computer professional should know how to remove this virus completely from your system. DO NOT click on these programs. If you have been infected with this virus, turn off your computer immediately and contact your computer professional for assistance.
For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center, or IC3, a partnership of the FBI and the National White Collar Crime Center. Also see its information on Internet Crime Schemes and its Internet Crime Prevention Tips.
To submit a complaint with the Department of Justice, please click here (http://www.ic3.gov/
If you receive unsolicited e-mail offers or spam, you can forward the messages to the Federal Trade Commission at firstname.lastname@example.org.