AmazingONLY.com

What Business Owners Need to Know About Fake Antivirus Software

Many business owners consider investing in business antivirus software to protect their machines and their data from corruption and theft. However, attackers have begun launching fake antivirus (AV) products that masquerade as legitimate software. These fake programs show up on both desktop computers and mobile devices. Protect your business by knowing how these programs work and how to avoid them.

How Attackers Deploy Fake AV Software

Imagine that you’re using your Android phone, and you decide to install what looks like a third-party version of Skype that claims that it allows you to make free phone calls. When you download the application, it asks for admin rights to your phone. As soon as you say “yes,” you see a screen that indicates an antivirus app is scanning your device. The app claims that it has found 14 critical pieces of malware on your Android phone.
You’re prompted to purchase the full version of the software, but you tap “Cancel.” When you tap the “Home” button, your Android phone crashes. When you reboot it, guess what? The AV app pops up again. Every time you try to open a different app, you see the fake AV purchase screen instead, and every time you tap “Home,” your smartphone crashes. Essentially, the malware is holding your Android phone for ransom, and it won’t release your device until you purchase the software. It may even use images from your browser history or even pornographic images to trick you into believing that someone is remotely trying to take over your phone.
These fake AV programs have shown up on Windows computers for some time. On a PC, they usually appear as a pop-up window that will not go away until the user either purchases the fake software or finds a way to uninstall the program. However, the appearance of fake AV on Android phones proves that business AV software should be installed on desktop, laptop and mobile computing devices.

How to Avoid Becoming a Victim

Many fake AV programs have started to incorporate a ransomware component. As shown in the preceding example, they may utilize actual images from your browser history to frighten you into purchasing the product. Until you do make the purchase, your device becomes non-functional. When you grant the program Admin rights, it becomes almost impossible to uninstall.
Take these steps to keep programs like this from infiltrating your computers, smartphones and tablets:

Fake AV malware can not only lock up your device but also steal sensitive information like your credit card numbers and bank account login credentials. Talk to a professional or go to your IT department if you accidentally download one of these programs. Above all, never purchase the product just to get rid of the pop-ups.
About the Author: Melissa Cromwell is a content curator specializing in cyber security and data center infrastructure.