One of the ongoing problems with browsers is malware. Sometimes messages pop up and indicate your browser has been compromised. These messages often say you should contact technical support. In every situation that I know of, these messages are a scam.
There are countless variations to this type of browser malware, but usually the browser displays a warning message, sometimes accompanied by constant beeping. This message directs the user to contact a technical support phone number to have the problem removed.
These messages are the result of accidentally visiting a malicious website. In the case of Microsoft's Edge browser, the message won't go away on its own, and it prevents you from closing the window. You can use Task Manager to close the browser, but the message will reappear the next time you open it.
I have yet to see an antimalware utility get rid of one of these fake tech support scam pages, however I have a technique that has worked for me in the past:
When the tech support browser malware message appears, use Task Manager to close Edge. Once it is closed, open the Control Panel and click on Network and Internet, then Network and Sharing Center. Now click on Change adapter settings. The resulting screen will display your network adapter. Right-click the adapter and choose the Disable option from the shortcut menu.
When you receive confirmation that the connection is disabled, open your browser. You should now be able to close the tab that contains the bogus tech support message. After doing so, it's a good idea to clear the browser's cache. Close the browser, then right-click on your Network Connection and choose the Enable option from the shortcut menu. You should now be able to open the browser, and it should take you to your normal homepage.
Learn about malware, viruses, Trojans and more
Get an Edge on browser security
Where does Edge store users' passwords?
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.