Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 6 August 2013

What is Rogue Antivirus Software?

Posted on 16:48 by Unknown
It's been a while since I've done a post like this, and I have gotten quite a few new followers who likely have not read the original post about rogue antivirus software. So here it is: A full description.

Rogue antivirus software, often called rogues, are pieces of software which can install themselves onto your computer in many ways.

Way #1: You could be tricked into thinking that an advertisement for a rogue stating that your computer is infected is real. You then go to download the rogue hoping that it will remove the threats. This happens without you even knowing that it is a rogue until it is installed.

Way #2: It could install itself silently when you visit a hijacked website. From here it can lay dormant until activated by an action which is either on your part or the part of the maker of the rogue.

Way #3: The rogue can be downloaded because the file claims to be something that it is not. While this somewhat falls into the definition of Trojans, this is still classified as a rogue.

No matter the way a rogue is placed on your computer, the end result is the same. The rogue pops up and does a simulated scan of your hard drive. It then demands payment for the removal of threats threats that it has found.

A few key points to keep in mind:

1: The scan that it is doing is not real.

2: All "malware" found by the "scan" is non-existent on your computer.

3: Most real antivirus software have a free trial which will remove threats free of charge.

4: You should never pay any amount of money that the rogue demands.

Rogues are usually removed with Rkill and Malwarebytes Anti-Malware, but some rogues may require more advanced tools.

As some rogues include a Trojan component, just because you place a product key in the rogue does not mean that your computer is in the clear. This is why I do not recommend placing a product key in the rogue except in situations where it would make removal a lot less involved.

I consider rouges to be a type of malware that will be gone from the internet someday soon.

In 2006, 19 rogues were released.

In 2007: 28 rogues were released.

In 2008: 195.

2009: 156

And so on.

But this type of malware is on the decline. As of this blog post, there have only been 7 rogues released in the entire year of 2013. And I do feel that this type of malware will be gone completely within a few years.

I attribute this victory to:

Bloggers who blog about rogues. They help educate the public in a way that they can understand.

Antivirus companies, whose engines are now getting smarter at detecting this type of malware before it even gets on the computer.

Readers, who spread the news as need be. If something goes viral enough, the news can reach the news of countless people at a faster speed then the rogues can spread.

Malware Removers, one of the last lines of defense in this regard. These people are highly trained in the art of malware removal. Some charge money for their services, while others offer help free of charge.

Thank you for reading. I invite readers to comment with any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ▼  August (22)
      • How to remove the Homeland Security Ransomware.
      • How to Remove Antivirus Defence (Rogue)
      • How to Remove Titan Antivirus 2013 (Rogue)
      • History of Windows: Windows 3.0.
      • Looking for Love.
      • How to remove Antivirus Security Pro. (Rogue)
      • How to remove the Savepath Deals Adware
      • History of Windows: Windows 2.0
      • How to remove 24x7 Help.
      • How to remove the Guardians of the Peace of Irelan...
      • How to remove My Safe PC 2014 (Rogue)
      • History of Windows: Windows 1.0
      • How to remove the Webcake Deals Adware.
      • How to remove Antiviral Factory 2013 (Rogue)
      • How to make someone think they have malware: Batch...
      • How to Remove PC Defender 360 (Rogue)
      • Google Glass: Another device, another vector for i...
      • What are Bitcoin Miners?
      • Why you should not let Google Chrome store your pa...
      • What is Rogue Antivirus Software?
      • How to remove Live Security Professional. (Rogue)
      • Never leave your computer's date on February the 14th
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile