Defense Center is a rogue anti-spyware program from the same family as Protection Center malware. It reports false system security threats and displays fake security warnings to scare you into thinking that your computer is infected with spyware, adware and other viruses. DefenseCenter is a typical scareware, that’s why it will ask you to pay for a full version of the program to remove the infections which don’t even exist. Defense Center is promoted through the use of Trojans and other malicious software. Usually, it comes from fake online scanners and misleading video websites. The rogue program has to be manually installed, so to make its way to the system it pretends to be a video codec or flash player update. Basically, the scammers do all their best to trick you into installing their bogus software.
Once installed and running, Defense Center will simulate a system scan and display a list of infections that can be only removed with a full version of the program. Then it will constantly display fake security alerts and pop-ups claiming that your computer is infected with spyware that may stole your passwords and credit card information. What is more, the rogue program will disable Task Manager, Registry Editor and other system tools. It will also block legitimate anti-spyware programs, that’s why you may have to reboot your computer in safe mode and run an automatic removal tool from there or remove Defense Center files manually.
Some of the fake Defense Center alerts read:
If you find that your computer is infected with Defense Center then use removal instructions below to remove Defense Center from your PC as soon as possible. Don’t purchase it! If you have already purchased this rogue program then contact your credit card company and dispute the charges.
Special Defense Center removal steps
1. Restart your computer. As your computer restarts but before Windows launches, tap “F8” key constantly. Use the arrow keys to highlight the “Safe Mode with Networking” option as shown in the image below, and then press ENTER.
2. Download an automatic removal tool from this page and run a full system scan. Or download it form alternative location.