24x7 Live US Operators Available Every Day

+1 (904) 825-6708

+1 (800) 899-5350

Contact Us


Colo5 Jacksonville, Fl -  2009 Server Install Photo Gallery


Level 3 Atlanta, Ga. 2006 Server Install  Photo Gallery

New E-Scams & Warnings
CryptoLocker Ransomware Information Guide and FAQ
United States Computer Emergency
Readiness Team  US-CERT TIPS

What are rootkits and botnets?

* Recognizing Fake Antiviruses
* What is a social engineering
* Preventing and Responding to
  Identity Theft
* Cyber Security Tips
* Home Network Security
* Dealing With Cyberbullies
* The Internet Crime Complaint
  Center (IC3)  www.ic3.gov
* Internet Crime Prevention Tips
* Internet Crime Schemes
* Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus

'One Ring' Wireless Phone Scam

The FCC has recently learned of a new phone scam targeting wireless consumers.



ST10-001: Recognizing Fake Antiviruses

Monday, October 11, 2010 11:52 AM

Original release date: October 11, 2010 | Last revised: February 06, 2013

What is fake antivirus?

Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security warnings to be displayed to the computer user.

How can my computer become infected with fake antivirus? Criminals distribute this type of malware using search engines, emails, social networking sites, internet advertisements and other malware. They leverage advanced social engineering methodologies and popular technologies to maximize number of infected computers.

How will I know if I am infected? The presence of pop-ups displaying unusual security warnings and asking for credit card or personal information is the most obvious method of identifying a fake antivirus infection.

What can I do to protect myself?

  • Be cautious when visiting web links or opening attachments from unknown senders. See Using Caution with Email Attachments for more information.
  • Keep software patched and updated. See Understanding Patches for more information on the importance of software patching.
  • To purchase or renew software subscriptions, visit the vendor sites directly.
  • Monitor your credit cards for unauthorized activity.
  • To report Internet crime or fraud, contact the Internet Crime Complaint Center (http://www.ic3.gov).

Author: Mindi McDowell