{"id":1279,"date":"2009-12-15T15:53:56","date_gmt":"2009-12-15T14:53:56","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1279"},"modified":"2009-12-15T15:53:56","modified_gmt":"2009-12-15T14:53:56","slug":"rogue-security-vendors-show-that-crime-pays","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/","title":{"rendered":"Rogue Security Vendors Show that Crime Pays"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg\"><\/p>\n<p>We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security software, but turns out to either do nothing (but collect the money you paid for it) or installs spyware or other malware. (See the articles <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-scareware-targets-mac\/\">here<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/scareware-tries-to-trick-mac-users-into-buying-worthless-software\/\">here<\/a>, as well as a discussion of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-economics-of-scareware\/\">the economics of scareware<\/a>.)<\/p>\n<p>The Internet Crime Complaint Center has issued an <a href=\"http:\/\/www.ic3.gov\/media\/2009\/091211.aspx\">intelligence note<\/a> warning users that rogue scareware poses serious threats to computer users. Many of these programs begin by displaying pop-up ads that tell you that your computer is compromised:<\/p>\n<blockquote><p>\nAn ongoing threat exists for computer users who, while browsing the Internet, began receiving pop-up security warnings that state their computers are infected with numerous viruses.\n<\/p><\/blockquote>\n<p>In addition to the cost that users pay for software that they think will rid them of (non-existant) security threats, <\/p>\n<blockquote><p>\nDownloading the software could result in viruses, Trojans and\/or keyloggers being installed on the user&#8217;s computer. The repercussions of downloading the malicious software could prove further financial loss to the victim due to computer repair, as well as, cost to the user and\/or financial institutions due to identity theft.\n<\/p><\/blockquote>\n<p>What&#8217;s most interesting in this alert, is that this turns out to be very big business. The FBI reports that scareware has already cost some $150 million to victims of these scams.<\/p>\n<p>We\u2019ve said it here before, but it\u2019s worth repeating: computer security is too serious an issue to trust companies who just happen to pop up in your search results. Trust a brand, like Intego, with more than ten years of experience, and who is a specialist in Mac security software. Intego VirusBarrier X5 also ensures that you don&#8217;t get tricked by blocking all known Mac scareware. So keep your Mac safe, but make sure you choose the right software to do so.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security software, but turns out to either do nothing (but collect the money you paid for it) or installs spyware or other malware. (See the articles here and here, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[114],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rogue Security Vendors Show that Crime Pays - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-12-15T14:53:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/\",\"name\":\"Rogue Security Vendors Show that Crime Pays - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#primaryimage\"},\"datePublished\":\"2009-12-15T14:53:56+00:00\",\"dateModified\":\"2009-12-15T14:53:56+00:00\",\"description\":\"We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rogue Security Vendors Show that Crime Pays\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Rogue Security Vendors Show that Crime Pays\",\"datePublished\":\"2009-12-15T14:53:56+00:00\",\"dateModified\":\"2009-12-15T14:53:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#webpage\"},\"wordCount\":322,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg\",\"keywords\":[\"Rogue Software\"],\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/","og_locale":"en_US","og_type":"article","og_title":"Rogue Security Vendors Show that Crime Pays - The Mac Security Blog","og_description":"We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-12-15T14:53:56+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/","name":"Rogue Security Vendors Show that Crime Pays - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#primaryimage"},"datePublished":"2009-12-15T14:53:56+00:00","dateModified":"2009-12-15T14:53:56+00:00","description":"We have talked here in the past about rogue security software: this has nothing to do with Sarah Palin, but is software that pretends to be security","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Rogue Security Vendors Show that Crime Pays"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Rogue Security Vendors Show that Crime Pays","datePublished":"2009-12-15T14:53:56+00:00","dateModified":"2009-12-15T14:53:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#webpage"},"wordCount":322,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rogue-security-vendors-show-that-crime-pays\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/ic3.jpg","keywords":["Rogue Software"],"articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1279"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1279"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1279\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}