What would a popup ad likely do if your computer is compromised?

Question 1 (0.2 points)True or false? An essential component of compromise to a resource is that the situation resultingin the compromise was motivated by malice.Question 1 options:A) TrueB) False

If you think your computer has been hacked, and have Norton installed on your computer, the best option to rule out a threat infection is to perform a full system scan. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that you run a scan using Norton Power Eraser. Norton Power Eraser is a free, downloadable tool that uses aggressive methods to detect threats.

Many Norton offerings come with an additional benefit called the Norton Virus Protection Promise, which includes access to Norton experts who can work with you to diagnose and remove viruses should you run into any problems during your subscription. For more information, read What is Norton Virus Protection Promise?

How do I know that my computer is hacked?

If your computer is hacked, you might notice some of the following symptoms:

  • Frequent pop-up windows, especially the ones that encourage you to visit unusual sites, or download antivirus or other software

  • Changes to your home page

  • Mass emails being sent from your email account

  • Frequent crashes or unusually slow computer performance

  • Unknown programs that startup when you start your computer

  • Programs automatically connecting to the Internet

  • Unusual activities like password changes

  1. Depending on your version of Windows, download one of the following: 
    • On 64-bit Windows: Norton Power Eraser.
    • On 32-bit Windows: Norton Power Eraser.

  2. Press Ctrl + J key, to open the Downloads window in your browser, and double-click the NPE.exe file.

    If the User Account Control window prompts, click Yes or Continue.

  3. Read the license agreement and click Agree.

    If you have already accepted the license agreement, you will not be prompted again.

    Norton Power Eraser checks for and automatically downloads the new version if available.

  4. In the Norton Power Eraser window, select Full System Scan, and click Run Now.

  5. If you want to include the Rootkit scan, click Settings, and under Scan and Log Settings, toggle the option Include Rootkit scan (requires a computer restart) and click Apply.

  6. When you see a prompt to restart the computer, click Restart.

    Wait for the scan to complete. Follow the on-screen instructions.

  1. Download Norton Power Eraser.

  2. Press Ctrl + J key, to open the Downloads window in your browser, and double-click the NPE.exe file.

    If the User Account Control window prompts, click Yes or Continue.

  3. Read the license agreement, and click Accept.

    Norton Power Eraser checks for and prompts to download the new version if available.

  4. In the Norton Power Eraser window, click the Scan for Risks icon.

  5. By default, Norton Power Eraser performs a Rootkit scan and requires a system restart. When you see a prompt to restart the computer, click Restart.

    If you do not want to include the Rootkit scan, go to Settings, and uncheck the option Include Rootkit scan (requires a computer restart).

  6. Wait for the scan to complete. Follow the on-screen instructions.

How do I remove the infection from my computer?

Once you have a virus on your computer, it may attack Norton and prevent it from working properly. In these cases, the virus must be removed manually. Norton offers free, do-it-yourself support options as well as a paid service where we take care of removing threats for you.

You can let our Spyware & Virus Removal Service expert technicians do all the work for you. Our Spyware & Virus Removal Service is handled by highly trained expert technicians who work with you for as long as it takes to locate and neutralize all known threats on your computer.

Contact our Spyware & Virus Removal Service

Best practices

The following are some of the best practices that will keep your computer safe.

  • Keep your Norton product updated with the latest Virus definitions

  • Do not click on any intriguing pop-up advertisements

  • Always scan your email attachments before opening them

  • Always scan the files that you download using file sharing programs

Malicious operators are always searching for new ways to extract money from victims. Experts predict that the cost of cybercrime will grow to $10.5 trillion USD annually by 2025, which means a lot of people getting caught in scammers' nets. As cyberattacks become increasingly common, you should know what to do if your computer does get hacked. Installing Clario's security app is one of the simplest and most effective ways to protect your device.

Try Clario free

Get it for iOS, Android

You might recognize suspicious events when you see them, a general sign that something’s not right and your computer or internet browsing is not operating as it should.

More specifically, you might have been hacked if: 

  • Google searches are redirecting to sites you didn’t intend to visit.
  • There’s been an installation of an app that you’re unfamiliar with. 
  • You’re seeing suspicious pop-up ads, such as fake antivirus warnings. (Please do not click on these, by the way!) 
  • People on your email contact lists receive social media invites that you didn’t send.
  • Your computer slows down or freezes. 
  • You notice rogue, third-party activity ranging from the very small (keyboard strokes, your mouse moving) to the very big (money taken from your online bank or credit card account).

Reasons why you were hacked in the first place

Hackers, like any criminals, are opportunists. Just like a shop window left open or a bag left unattended, some online activities leave you vulnerable to hacks. 

For safer browsing, you should: 

  • Avoid opening suspicious email attachments.
  • Make sure your operating system (OS) is up to date: you’ll be regularly informed of updates on your phone or computer. Don’t put off installing these updates as they help keep your device’s security current.  
  • Use strong passwords, including numbers, letters and punctuation – and not your mother’s maiden name! (We have a guide to creating more secure passwords if you’d like to know more.)

For more on safe browsing, check out our guide to malware

What to do right away after your computer gets hacked

Okay, firstly, don’t panic. Nothing harmful may have happened yet. And secondly, you can probably mitigate anything bad that has happened. 

Here’s what to do…

1. Reset your passwords

This might seem onerous at first – you have a lot of passwords after all! But focus on the key places; social networks (Facebook, Twitter, Instagram), emails, devices (phone, laptop and so on) and anywhere involving credit cards and finance (shopping, banking). 

2. Log out of all online accounts

After you’ve reset passwords, log out. It’s easy to forget that we tend to have our social media (and other online accounts) set to automatically log us in. 

3. Disconnect from the internet

Next, shut down contact to the internet: that means turning off Wi-Fi on your computer and switching phones and tablets to airplane mode. 

4. Remove external hard drives

Remove any external drives. This means USB sticks or external hard drives. Be sure to “eject” them first. (Go to the appropriate folder, then click “eject”).

If you’re certain you’ve been hacked, you might want to remove the computer’s hard drive too. Back up any files you have (you can even save them to the cloud, like Google Drive or email small files to yourself); switch off all power sources; then once the computer is shut down, you can remove the hard drive (the big black rectangle within your laptop). Its location will vary depending on make or model, so consult the manual (hard copy or online) or, if you’re not comfortable doing this, find an IT professional to help.

5. Scan your computer for malware and viruses

This can be done with your own devices’ security software, or with third party security. For more information on running a scan, check out our guide to getting rid of viruses.

6. Wipe your hard drive (if necessary)

If your scan reveals a virus or hack, you can (and probably should) wipe your hard drive, then reinstall your OS. Wiping means to permanently erase, so be aware that whatever you’re deleting will be gone for good unless you back it up.

Do not just manually delete files: they’ll still exist somewhere in your hard drive. Instead, use a downloadable programme to carry out the wipe. Like a virus scan, a wipe will let you know when it’s been carried out completely. 

7. Spread the word

Unfortunately, your hack might have affected people in your contact list: friends and families might have been emailed by a hacker posing as you. If that happens, it’s important to contact those who have been emailed or texted to let them know you weren’t behind the message and you may have been hacked.

And if your hack was the result of clicking on a suspicious email or attachment, it’s a good idea to warn others of the attack. Similar hacks tend to happen in waves, as multiple victims are contacted at a time. 

8. Closely monitor your credit and financial accounts

After the hack, keep an eye on your online expenditures, regularly checking your bank and credit card accounts. 

9. Install security software

Naturally, up-to-date, reputable security software is the best line of defense against a future hack. 

How to avoid being targeted by computer hackers again

Anyone can fall victim to a hack, but there are ways to minimize the risk. 

Step 1: Read up on how to detect online scams

Sadly, hackers are always looking for ways to breach security. It’s a good idea to keep on top of unwelcome trends related to hacking, phishing and other forms of attack. 

Step 2: Maintain strong passwords

Remember to keep strong passwords and to change them regularly. Include a combination of numbers, letters and punctuation and try to use different passwords for your various online accounts. 

Step 3: Don’t leave your devices unattended in public

Even two minutes is time enough for a hacker to gain personal information or sow the seeds for a later hack. 

Step 4: Keep files backed up

It’s good practice to maintain important or sensitive files beyond your computer, ideally in multiple places, USB, external hard drives, cloud storage, or if you’re feeling especially cautious, all of the above. 

Step 5: Ensure your firewall is properly configured

You should have a firewall installed on your computer. A firewall in a building is a sealed wall that prevents the spread of fire. On your computer, it works the same way.

You can configure your firewall to block communication between your computer server and another. This firewall block could filter based on suspicious IP addresses (other specific servers), potentially dangerous phrases, or even a website.