How did rogue security software get on my computer?
Rogue security software designers create legitimate-looking pop-up windows that advertise security update software. These windows might appear on your screen while you surf the Web. The “updates” or “alerts” in the pop-up windows call for you to take some sort of action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or spyware. When you click, the rogue security software downloads to your computer.
What does rogue security software do?
Rogue security software might report a virus, even though your computer is actually clean. The software might also fail to report viruses when your computer is infected. Inversely, sometimes, when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect. Some rogue security software might also:
Lure you into a fraudulent transaction.
Use social engineering to steal your personal information.
Install malware that can go undetected as it steals your data.
Launch pop-up windows with false or misleading alerts.
Slow your computer or corrupt files.
Disable Windows updates or disable updates to legitimate antivirus software.
Prevent you from visiting anti-virus vendor Web sites.
Rogue security software might also attempt to spoof the Microsoft Updates process.
To help protect yourself from rogue security software:
Install a firewall and keep it turned on.
Use automatic updating to keep your operating system and software up to date.
Install anti-virus and anti-spyware software such as Microsoft Security Essentials and keep it updated.
Use caution when you click links in e-mail or on social networking Web sites.
Use a standard user account instead of an administrator account.
Familiarize yourself with common phishing scams.
Rogue Remover software
If you think you might have rogue security software on your computer, scan your computer using Microsoft Security Essentials or your anti-virus software. Use one of these Rogue Removers: Additional reading: