Scam Alerts

"Your Computer Is Infected!" — How to Tell Real Security Warnings From Fake Ones

The screen goes red. An alarm sound blares from your speakers. A pop-up fills your browser with urgent text:

adhen prasetiyo
adhen prasetiyo
Digital illustration representing fake security warning
Digital illustration representing fake security warning

"Your Computer Is Infected!" — How to Tell Real Security Warnings From Fake Ones

The screen goes red. An alarm sound blares from your speakers. A pop-up fills your browser with urgent text:

"WARNING: Your computer has been infected with (3) viruses! Your personal data, banking information, and passwords are at IMMEDIATE risk. Call Microsoft Support immediately at 1-888-XXX-XXXX to prevent data loss. DO NOT CLOSE THIS WINDOW."

Your heart rate spikes. Your hand reaches for the phone. Everything about this warning screams urgency. It looks official. It sounds terrifying. It demands action right now.

And it is completely, entirely fake.

You are looking at scareware — one of the oldest, most profitable, and most psychologically effective scam categories on the internet. The warning is not from Microsoft. Your computer is not infected. The phone number connects to a call center whose operators will convince you to pay hundreds of dollars for a "fix" to a problem that does not exist, and might install actual malware on your machine in the process.

The scareware industry generates billions of dollars annually by exploiting a simple information asymmetry: most people cannot tell the difference between a real security warning and a fake one. This article closes that gap.

How Fake Security Warnings Work

Fake security warnings reach you through several channels, each designed to create maximum panic with minimum time for rational thought.

Browser pop-ups. The most common delivery method. You visit a website — sometimes a legitimate one serving malicious ads — and a JavaScript pop-up or full-page overlay appears with dramatic warning messages. The page may play audio alerts, display fake scanning animations, and even lock your browser so that clicking "X" or pressing the back button does not close the page.

These pop-ups are just web pages. They are not system alerts. They do not have access to your computer. They cannot scan your files. They cannot detect viruses. They are HTML, CSS, and JavaScript creating a convincing visual performance designed to make you believe your computer is compromised.

Push notification abuse. Modern browsers support push notifications from websites. If you have ever clicked "Allow" on a notification prompt from a site you do not recognize, that site can now send you notifications that appear in your system notification area — the same place legitimate alerts from your operating system appear. Scareware operators abuse this to send notifications that say "Your PC is at risk" or "Virus detected" that look like system-level warnings but are actually browser notifications from a random website.

Malicious browser extensions. Some fake security tools install as browser extensions, then periodically display warning pop-ups, fake scan results, and upgrade prompts. The extension creates the problem (the scary warnings) and offers the solution (a paid subscription to make them stop).

Tech support cold calls. Some scareware operations skip the browser entirely and call you directly. The caller claims to be from Microsoft, Apple, or your internet service provider. They say they have detected suspicious activity on your account or device and need to help you resolve it. They ask you to install remote access software so they can "diagnose" the problem.

Malicious search results. Searching for error messages or computer problems sometimes returns results for fake support pages that display scareware warnings or direct you to call scam phone numbers.

What Real Security Warnings Actually Look Like

Legitimate security warnings from your operating system and security software have specific characteristics that differ fundamentally from scareware.

Real warnings do not come from web browsers. If a warning appears inside your browser window, it is from a website, not from your operating system or antivirus software. Your actual antivirus runs as a system application and displays alerts through the operating system's notification system or its own dedicated window — not inside Chrome or Firefox.

Real warnings do not include phone numbers. Microsoft, Apple, Google, and legitimate antivirus companies do not include phone numbers in their security alerts. They do not ask you to call anyone. If a warning includes a phone number and tells you to call immediately, it is fake. Every single time.

Real warnings use specific, technical language. A legitimate antivirus alert says something like "Trojan:Win32/Emotet.RPH detected in C:\Users\Downloads\invoice.exe — File quarantined." It identifies a specific threat by name, provides the file path, and tells you what action was taken. Fake warnings use vague, fear-inducing language: "Your computer is infected with (3) viruses!" without specifying what the viruses are or where they were found.

Real warnings do not use alarm sounds. Legitimate security software does not play sirens, beeping, or robotic voice recordings. If your computer suddenly starts making alarm sounds while a warning appears in your browser, the sounds are coming from the webpage, not from your system.

Real warnings do not lock your screen. A legitimate security alert from your antivirus does not prevent you from closing it, switching to other applications, or using your computer normally. If a warning prevents you from doing anything until you call a number or click a specific button, it is fake.

Real warnings do not demand immediate payment. Your antivirus does not ask you to pay money to remove a detected threat (that is what your existing subscription or free protection already does). If a warning says you need to pay to remove viruses, it is scareware.

The Tech Support Scam Playbook

Understanding how tech support scams operate from start to finish helps you recognize them at any stage.

Stage 1: Initial contact. You encounter a fake warning (browser pop-up, notification, or cold call) that creates urgency. The message claims your computer is compromised and directs you to contact "support."

Stage 2: Establishing authority. The person on the other end identifies themselves as a technician from Microsoft, Apple, Norton, or a similar trusted brand. They speak professionally. They may provide a fake employee ID number. They establish credibility through jargon and confidence.

Stage 3: Remote access. The technician asks you to install a remote access application — commonly AnyDesk, TeamViewer, or similar tools. These are legitimate applications used by genuine IT support teams. But in this context, they give the scammer complete control of your computer.

Stage 4: The fake diagnosis. With remote access, the scammer opens system tools that look alarming to non-technical users. They might open Event Viewer and point to normal warning entries as evidence of "hacking." They might open Task Manager and claim that unknown processes are malware. They might run the "netstat" command and claim that the listed connections are hackers accessing your system. All of these are normal system activities being misrepresented.

Stage 5: The sale. Having convinced you that your computer is riddled with threats, the technician offers to fix everything for a fee — typically $199 to $499 for "one-time cleanup" or $299 to $999 for "annual protection." Payment is usually requested via credit card, gift cards, or cryptocurrency.

Stage 6: The double dip. Some scam operations install actual malware or backdoors during the "repair" session, ensuring that genuine problems occur later. The victim calls back for more "help," generating repeat revenue.

How to Handle a Suspected Fake Warning

If you encounter a security warning and are unsure whether it is real, follow this decision tree.

Is the warning inside your browser? If yes, it is fake. Close the browser. If the browser will not close normally, use Task Manager (Ctrl+Alt+Delete on Windows, Command+Option+Escape on Mac) to force-close it.

Does the warning include a phone number? If yes, it is fake. Do not call the number under any circumstances.

Does the warning play sounds? If yes, it is almost certainly fake. Mute your speakers and assess calmly.

Did someone call you about a problem you did not report? If yes, it is fake. Microsoft, Apple, and your ISP do not proactively call customers about security issues. Hang up.

Is the warning from your installed antivirus software? If you recognize the application as one you installed yourself, and it appears in the application's normal interface (not in a browser), the warning may be legitimate. Check the antivirus application directly rather than clicking on the notification.

If you have already engaged with a potential scammer — installed remote access software, provided payment information, or given someone access to your computer — take these steps immediately:

Disconnect your computer from the internet by unplugging the ethernet cable or disabling Wi-Fi. Uninstall any remote access software the scammer had you install. Change passwords for all sensitive accounts (email, banking, social media) using a different device. Contact your bank or credit card company to report the fraudulent charge and request a reversal. Run a full scan with your legitimate antivirus software. If the scammer had extensive access, consider having a professional examine your machine or performing a full operating system reinstall.

Browser Notification Cleanup

If you are receiving persistent scareware notifications, you likely granted notification permission to a malicious website at some point. Here is how to revoke it.

Chrome: Settings → Privacy and Security → Site Settings → Notifications. Find the suspicious site and click Remove or Block.

Firefox: Settings → Privacy & Security → Permissions → Notifications → Settings. Remove any sites you do not recognize.

Edge: Settings → Cookies and Site Permissions → Notifications. Review and remove suspicious entries.

Safari: Safari → Settings → Websites → Notifications. Deny or remove sites you do not recognize.

Clearing these permissions stops the fake notifications immediately, because the website loses the ability to push messages to your browser.

Why These Scams Keep Working

Scareware and tech support scams exploit a specific fear: that something is wrong with your computer and you do not have the technical knowledge to handle it yourself. This fear is rational. Most people are not computer experts. When something appears to be broken, calling for help is a reasonable response.

The scammers weaponize this reasonable behavior by creating fake emergencies that demand immediate response. The urgency prevents research. The authority claim prevents skepticism. The technical jargon prevents independent evaluation. By the time the victim has space to think clearly, money has already changed hands.

The defense is not technical expertise. You do not need to understand how malware works to protect yourself. You need exactly three rules:

Legitimate security warnings never come from web browsers. Legitimate security warnings never include phone numbers to call. Legitimate security companies never call you first.

Memorize those three rules. Share them with your parents, your grandparents, your less tech-savvy friends. Print them and stick them next to the monitor if necessary.

The warning on your screen is screaming for your attention. The loudest voice in the room is usually the one trying to sell you something. Real security alerts do their job quietly. Fake ones need you to panic.

Do not panic. Close the tab. Walk away. Your computer is fine.

Teaching Others: The People Who Need This Most

The demographics most vulnerable to scareware and tech support scams are people over 60 and people with limited technical experience. These are often the same people who are least likely to read cybersecurity articles online.

If you have read this far, you probably are not the primary target. But you almost certainly know someone who is — a parent, a grandparent, an uncle, a neighbor. The most valuable thing you can do with this information is share it with them in a way they can absorb.

Have the conversation proactively, not after they have already been scammed. Frame it without condescension: "I learned something interesting about fake computer warnings — apparently there are scams that make your browser look like your computer has a virus, and they try to get you to call a fake support number. If you ever see something like that, just close the browser and call me instead."

Offer to be their first call. "If your computer ever shows a scary warning, or if someone calls claiming to be from Microsoft, just hang up and text me. I will help you figure out if it is real." Becoming the trusted resource that replaces the scam phone number is the most effective defense you can offer someone you care about.

Consider helping them configure their browser to block notification requests by default. Go into their Chrome, Firefox, or Edge settings and set notifications to "Don't allow sites to send notifications." This single setting prevents the entire push notification scareware vector.

Install a reputable ad blocker on their browser. Services like uBlock Origin dramatically reduce exposure to malicious advertisements that serve scareware pop-ups. A two-minute installation can prevent years of potential problems.

The tech support scam industry thrives on isolation. Victims are alone with their fear and their phone. Breaking that isolation — making sure vulnerable people have someone they trust to call first — is the most human and most effective defense against the most human of cyberattacks.

Enjoyed this article?

Share it with your network

Copied!
adhen prasetiyo

Written by

adhen prasetiyo

Adhen Prasetiyo is an independent security researcher and the editor of BioProfileMe. He writes about cybersecurity, online scams, privacy risks, account security, and practical digital safety for everyday users.