Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

This kind of unwanted software usually populates on the user’s device after the fact, only making itself known once the user has installed their desired software, and accepted the terms of service. If you look closely at what you’re downloading, you might see a checkbox that says “Install (some unknown software or toolbar).” The employee in-the-know might choose to uncheck the box, but there are others who are so eager to get to their new software, that they forsake reading over the terms and services altogether, not caring what they’re agreeing to. This is how crapware tends to spread.

Furthermore, many of these programs are created with the intention of turning a profit. When these pieces of software are bundled with others, and unknowingly downloaded, the developer can claim as much as $150 per install. The worst part about this is that the developers aren’t doing anything wrong. Since the user is “agreeing” to download the program, there’s nothing that can be done. While this might be a questionable practice, there’s no denying that it’s quite lucrative, all at the expense of the user.

ZDNet reports that Google issues over 60 million warnings every week that keep users from installing dangerous software. Google claims that it issues at least three times more unwanted software warnings than malware warnings, which makes this a concerning problem indeed. ZDNet cites a study designed to get to the bottom of these software “bundles” and better understand them, where it was “found that 59 percent of bundles are flagged by at least one antivirus engine as potentially unwanted, and that some packages are built not to install when the presence of antivirus has been detected.”

In fact, some of the adware installed might be designed to display what appear to be scam alerts, warning users to call a number to resolve a problem that’s not even an issue. You might see this when you’re using Google Chrome and a “system alert” pops up, demanding that you take action before it’s too late. These types of scams are somewhat similar to ransomware, as they take advantage of raw, unhinged fear to get a desired outcome.

How does your business protect itself from viruses, malware, spyware, adware, and other types of online threats? You need to take a multi-faceted approach to network security if you want to keep your business safe. This includes a content filter, spam blocker, firewall, and antivirus solution, which are all optimized to keep potential threats out of your infrastructure. These are collectively referred to as a Unified Threat Management (UTM) solution.

To learn more, reach out to A PC Geek at (469) 567-0181.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 26 May 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication Business Management VoIP Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Office Disaster Recovery Apps Alert Android Chrome Small Business Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Mobility Big Data Managed Service Provider Microsoft Office Social WiFi Facebook Application Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Analytics Law Enforcement History Gmail Search Office Tips Saving Time Browser Password Work/Life Balance Data Management Streaming Media Money Maintenance Education Hard Drives User Error Fraud communications Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Encryption Apple Recovery Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Wireless Firewall Net Neutrality iPhone Collaboration Laptop Budget Online Currency Content Filtering Business Intelligence Wi-Fi Transportation Shortcut Point of Sale Internet Exlporer Flexibility PowerPoint Biometrics Cost Management Social Engineering Retail Telephony Customer Service BDR Entertainment Virtual Reality Google Drive Mobile Office DDoS VPN Office 365 Benefits IT Solutions App Cybercrime Risk Management Personal Information Managing Stress IT Consultant Fax Server Private Cloud Outlook Wireless Technology Data Loss Printer Server Update Managed IT Services Wearable Technology Marketing Proactive IT Administration Compliance Programming Access Presentation Meetings Display Hacker Hosted Solution Science Legal Inbound Marketing Running Cable Phishing Keyboard Emails Audit End of Support Politics Twitter OneNote Robot Networking Hiring/Firing Advertising Scalability Near Field Communication Website Experience RAM OneDrive Data storage Human Resources Ebay Bring Your Own Device PDF Paperless Office Uninterrupted Power Supply How To Blogging Music CPU Workplace Amazon Computer Accessories Text Messaging Miscelllaneous Internet of Things Bloatware IT consulting Books Slow Applications Smart Phones Distributed Denial of Service Mouse Artificial Intelligence HIPAA Sports Black Market Windows 8 Electronic Medical Records Travel Touchpad Branding eWaste Network Congestion Regulations HaaS Instant Messaging ISP WIndows 7 Vendor Management Safety Operating Sysytem 3D Printing Television Storage Battery Files Two-factor Authentication Computing Emergency Bluetooth Trending Cameras Automobile Data Theft Chromecast Customer Relationship Management Prodcuctivity User Cleaning SharePoint Excel Worker Commute CloudSync Online Backup Administrator Best Available Save Time Reputation Teamwork Video Games

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...