One of the ongoing problems with browsers is malware. Sometimes messages pop up and indicate your browser has been compromised. These messages often say you should contact technical support. In every situation that I know of, these messages are a scam.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
There are countless variations to this type of browser malware, but usually the browser displays a warning message, sometimes accompanied by constant beeping. This message directs the user to contact a technical support phone number to have the problem removed.
These messages are the result of accidentally visiting a malicious website. In the case of Microsoft's Edge browser, the message won't go away on its own, and it prevents you from closing the window. You can use Task Manager to close the browser, but the message will reappear the next time you open it.
I have yet to see an antimalware utility get rid of one of these fake tech support scam pages, however I have a technique that has worked for me in the past:
When the tech support browser malware message appears, use Task Manager to close Edge. Once it is closed, open the Control Panel and click on Network and Internet, then Network and Sharing Center. Now click on Change adapter settings. The resulting screen will display your network adapter. Right-click the adapter and choose the Disable option from the shortcut menu.
When you receive confirmation that the connection is disabled, open your browser. You should now be able to close the tab that contains the bogus tech support message. After doing so, it's a good idea to clear the browser's cache. Close the browser, then right-click on your Network Connection and choose the Enable option from the shortcut menu. You should now be able to open the browser, and it should take you to your normal homepage.
Learn about malware, viruses, Trojans and more
Get an Edge on browser security
Where does Edge store users' passwords?
Related Q&A from Brien Posey
Edge computing is finding its place in the enterprise to handle data growth. IT may use that same advantage to help address problems in a VDI ...continue reading
A ghost image can be used to copy the contents of one server to another for backup, but the process of creating ghost images may not be as simple as ...continue reading
Backup and recovery trends, such as hybrid cloud data protection, are gaining popularity in the IT industry. Are these three major trends part of ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.