{"id":3412,"date":"2022-06-10T08:00:00","date_gmt":"2022-06-10T15:00:00","guid":{"rendered":"https:\/\/computertechsreno.com\/tips\/?p=3412"},"modified":"2023-12-14T07:05:33","modified_gmt":"2023-12-14T15:05:33","slug":"computer-hacked-phishing-scam","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/computer-hacked-phishing-scam\/","title":{"rendered":"Has Your Computer Been Hacked, or Is It Another Phishing Scam?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam-1024x536.png\" alt=\"Has Your Computer Been Hacked, or Is It Another Phishing Scam?\" class=\"wp-image-3410\" srcset=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam-1024x536.png 1024w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam-500x262.png 500w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam-150x79.png 150w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam-768x402.png 768w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/06\/Has-Your-Computer-Been-Hacked-or-Is-It-Another-Phishing-Scam.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>How many times has this happened to you? You\u2019re on your computer reading, catching up with friends on Facebook, or searching the internet when a pop-up window shows up claiming that your browser has been hacked or blocked.\u00a0<\/p>\n\n\n\n<p>If it&#8217;s your first time seeing such a message splash across your screen, you&#8217;ve been lucky until now. Every day millions of computer users all over the globe see such messages whenever they surf the internet. And no, it doesn&#8217;t mean that your browser has been compromised. It&#8217;s simply <a rel=\"noreferrer noopener\" href=\"https:\/\/us.norton.com\/internetsecurity-online-scams-what-is-phishing.html#:~:text=Pop%2Dup%20phishing%20is%20a,ads%20sometimes%20use%20scare%20tactics.\" target=\"_blank\">pop-up phishing<\/a> designed to scare you into calling the number, which <a rel=\"noreferrer noopener\" href=\"https:\/\/computertechsreno.com\/spend-a-few-minutes-to-check-out-these-scams-so-that-you-dont-become-a-victim\/\" target=\"_blank\">scammers<\/a> use to target unsuspecting victims.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Is Pop-Up Phishing?<\/strong><\/h2>\n\n\n\n<p>Pop-ups are generated by websites to offer users additional information or guidance (such as how to fill in a form, how to apply a discount code, etc.)&nbsp;<\/p>\n\n\n\n<p>With pop-up phishing, you get something malicious disguised as a scare message to get you to act. Pop-up phishing occurs when criminals hijack legitimate websites with malware code, causing the website to spring up these &#8220;your computer has been hacked&#8221; messages whenever a new user visits the website.&nbsp;<\/p>\n\n\n\n<p>Pop-up phishing is usually so effective because of the type of message that &#8220;pops up&#8221; and the content of the message. They typically provide a phony warning to an unsuspecting website visitor, claiming that the visitor&#8217;s computer security has been compromised. The visitor is then asked to either download a necessary tool to remedy the &#8220;security threat,&#8221; such as an antivirus program (often malware in disguise), or contact a phony phone number for &#8220;help.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Does Pop-up Phishing Work?<\/strong><\/h2>\n\n\n\n<p>Fake pop-ups inform users that their computer is under attack or has a technical problem. They direct visitors to call a phone number listed on the pop-up to get a professional that can help resolve the danger, one that never existed in the first place.<\/p>\n\n\n\n<p>Cybercriminals make a lot of money from pop-up phishing scams yearly. They target unsuspecting users worried about their computer&#8217;s security to extort money from them and &#8220;fix problems and resolve threats&#8221; that do not exist.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to identify fake pop-ups<\/strong><\/h2>\n\n\n\n<p>Here are different ways of spotting a fake pop-up:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Spelling Mistakes<\/strong><\/h3>\n\n\n\n<p>One of the simplest ways to spot a fake pop-up is to pay attention. They are often littered with all sorts of spelling mistakes. If there&#8217;s an image on the pop-up, it&#8217;ll likely look unclear or unprofessional.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Compare it to a legitimate pop-up.<\/strong><\/h3>\n\n\n\n<p>Some pop-up phishing notifications claim to be from your internet service provider. Being able to differentiate between a genuine notification from a fake can save you a lot of trouble.&nbsp;<\/p>\n\n\n\n<p>If you haven&#8217;t been paying attention to pop-ups from your antivirus software, you should start doing that now. That way, whenever you come across a fake, you can quickly tell. If you&#8217;re confused and don&#8217;t know the difference, just ignore the pop-up, open your antivirus program, and do a deep scan to see if there&#8217;s anything wrong.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Close your browser<\/strong><\/h3>\n\n\n\n<p>Most fake pop-ups put your browser in full-screen mode, and to make matters more annoying, you may find yourself unable to minimize or close your browser. This is usually a sure sign that it&#8217;s a scam. If this happens, close the browser using the Ctrl+W keyboard keys, task manager, or shut down\/restart your computer.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How To Protect Yourself Against Pop-up Phishing Scams<\/strong><\/h2>\n\n\n\n<p>If a scam pop-up message appears on your screen, here\u2019s what you should do:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoiding calling any number shown on the pop-up<\/li>\n\n\n\n<li>Do not click the pop-up for any reason.<\/li>\n\n\n\n<li>Close your browser using the Ctrl+W keyboard keys, task manager, or shut down\/restart your computer. If you&#8217;re unable to do that, you can press-and-hold your computer&#8217;s power button to shut it down.  <\/li>\n\n\n\n<li>Do not share your payment and personal details with anyone.<\/li>\n\n\n\n<li>Make sure your operating system and browser are up to date.<\/li>\n\n\n\n<li>Before downloading any app or browser plugin, read the reviews from other users. It may just save you from downloading something dangerous.<\/li>\n\n\n\n<li>Never open any attachments in spam emails, or click to &#8220;unsubscribe&#8221; from them.<\/li>\n\n\n\n<li>Only go to trusted sites to download your software and apps.<\/li>\n\n\n\n<li>Do not click on any links in messages, emails, or websites you aren\u2019t familiar with.&nbsp;<\/li>\n\n\n\n<li>Examine the permissions that the app you wish to download is requesting to ensure it is legitimate.<\/li>\n<\/ul>\n\n\n\n<p><strong>For more information on how to stay safe while surfing the internet, <a href=\"https:\/\/computertechsreno.com\/contact\" target=\"_blank\" rel=\"noreferrer noopener\">contact us<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How many times has this happened to you? You\u2019re on your computer reading, catching up with friends on Facebook, or searching the internet when a pop-up window shows up claiming that your browser has been hacked or blocked.\u00a0 If it&#8217;s your first time seeing such a message splash across your screen, you&#8217;ve been lucky until [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3410,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,4],"tags":[],"class_list":["post-3412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=3412"}],"version-history":[{"count":5,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3412\/revisions"}],"predecessor-version":[{"id":3678,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3412\/revisions\/3678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media\/3410"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=3412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=3412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=3412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}