Where to Begin

Scareware is one of the most pernicious online threats. For those who have been infected, it is also one of the hardest to forget. Rogue antivirus software and other forms of scareware hold victims hostage: shutting off access to their desktop and most of the Internet, disabling security software and preventing them from removing the malicious program. Behind the scenes, scareware often installs other malicious programs, like Trojan horse and bot software. If you’re unlucky enough to get infected with one of these bad boys, what can you do to remove it?

Scareware is one of the most pernicious online threats. For those who have been infected, it is also one of the hardest to forget. Rogue antivirus software and other forms of scareware hold victims hostage: shutting off access to their desktop and most of the Internet, disabling security software and preventing them from removing the malicious program. Behind the scenes, scareware often installs other malicious programs, like Trojan horse and bot software. If you’re unlucky enough to get infected with one of these bad boys, what can you do to remove it? Threatpost asked leading anti malware researchers for their thoughts and suggestions on recovering from a scareware attack. Here’s what they told us:

NEXT

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.