pop-ups (scam) - Free Instructions pop-ups Removal Guide

What is pop-ups? is a browser-based scam that attempts to mislead users with fake Apple messages is a scam that attempts to trick people into downloading software is a site made by scammers to trick users into downloading software. The main principle of scam operation is to scare users into believing that their Mac or iOS device has been compromised and that all personal data is accessible to hackers. The message threatens to reveal front camera photos and browsing history to everyone on the contact list.

Evidently, all the message says it is fabricated, and no hackers have breached your device. The browser tab showing the page should be immediately closed and not interacted with, as you risk installing potentially unwanted or even dangerous software. We also recommend checking the system for adware,[1] as those infected might experience redirects to various phishing websites and be exposed to ads more often.

Type Scam, phishing, redirect, adware
Operation Claims that the device has been hacked and that surveillance is being performed. If the user would not allegedly “fix” the issue in two minutes, personal photos and other private data would allegedly be sent to all contact lists.
Distribution Redirects from other malicious websites, adware
Risks Installation of PUPs or malware, sensitive information disclosure, financial losses
Removal You should not interact with the contents shown by a scam website, check your system for adware or malware infections with SpyHunter 5Combo Cleaner security software
Other tips Use FortectIntego to remediate the system after adware infection. The tool can also be used to clean web browsers automatically

How do you get to

Most people would not deliberately risk their online safety, thus they try to stay away from malicious content as much as possible. However, some users willingly visit high-risk websites despite knowing about the risks they carry. For example, peer-to-peer networks, YouTube video conversion sites, or illegal video streaming platforms are something that people are keen on using because they can acquire access to digital goods for free.

It is a well-known fact that such websites are poorly protected from a security standpoint – they might host malicious advertisements or disguise a malicious downloadable file as some popular app installer. Since users assume the virus detection warning is a false positive,[2] they infect their machines with ransomware[3] or other dangerous malware.

When accessing websites of dubious nature, you also risk being redirected to scam websites such as,,,, and similar. These scams are shown unexpectedly, and users might fall for social engineering tricks used by crooks easier.

Scam message

Fear is a powerful emotion that is commonly abused by scammers online. The main goal is to make users scared about their personal safety or make them believe that their computers have been compromised – or both. Extortion messages have been spreading in the form of emails, as users have been receiving fake threats about their camera pictures being shown to social media friend lists. virusRedirects to and similar websites might be caused by adware

Without a doubt, the message pushed by is fake, and nobody is watching you in the sense that it's explained:

Apple security
Hackers are watching you!
Your Apple iPhone connection has been hacked and someone is watching on you! Please do not close this page. If you don't fix this in two minutes, the hacker will reveal your identity and send your browsing history and front-facing camera photos to everyone in your contacts!
minute seconds
Recovery method:
Step 1: Click the “Connection Protection” button below.
Step 2: You will be redirected to the App Store.
Step 3: Install and run the recommended protection app to recover your Apple iPhone.
Protect your connection

The main goal of cybercriminals is to ensure you download and install promoted software. There are plenty of online scams that use this trick to make people scared so they would download and install applications. This way, crooks receive illegal affiliated revenue while users end up with programs they never needed or wanted. In some cases, the promoted apps might be useless or dangerous, so installing them is highly discouraged.

How to recover from browser-based scams?

First of all, we would like to say once more that you should completely disregard everything said within the scam message – it is shown to any user who happens to visit the page. If you have interacted with the scam, you should immediately take action. For example, if you have downloaded software, you should immediately uninstall it.

If you have disclosed your contact or other personal details, you should remember that scammers might contact you via those known channels and would try to fool you again, potentially making you lose a lot of money, so be wary. If you have not interacted with the scam, we still recommend checking the system for infections, and the easiest way to do this is by scanning it with SpyHunter 5Combo Cleaner, Malwarebytes, or another powerful anti-malware tool.

1. Check for adware

The first thing to do is shut down all the background processes related to adware. You can do that by accessing Activity Monitor. After that's done, you can then look for apps to remove:

  • Open Applications folder
  • Select Utilities
  • Double-click Activity Monitor
  • Here, look for suspicious processes related to adware and use the Force Quit command to shut them down
  • Go back to the Applications folder
  • Find suspicious apps and move them to Trash.

To get rid of the persistence mechanisms from your device, you need to get rid of Login Items and Profiles created by unwanted apps. You can find them as follows:

  • Go to Preferences and pick Accounts
  • Click Login items and delete everything suspicious
  • Next, pick System Preferences > Users & Groups
  • Find Profiles and remove unwanted profiles from the list.

The PLIST files are small config files, also known as “Properly list.” They hold various user settings and hold information about certain applications. In order to remove the virus, you have to find the related PLIST files and remove them.

  • Select Go > Go to Folder.
  • Enter /Library/Application Support and click Go or press Enter.
  • In the Application Support folder, look for any dubious entries and then delete them.
  • Now enter /Library/LaunchAgents and /Library/LaunchDaemons folders the same way and terminate all the related .plist files.Uninstall from Mac 2

2. Clean browser caches

Adware and other potentially unwanted or malicious software are known to track user data with the help of cookies and other technologies. Therefore, if you have found potentially unwanted applications on your device, you should take your time to clean them properly. If you want to do this manually, proceed with the steps below; if you want a quicker solution – we recommend performing a scan with FortectIntego maintenance utility instead.


  1. Click Safari > Preferences…
  2. In the new window, pick Extensions.
  3. Select the unwanted extension and select Uninstall.Remove extensions from Safari

Clear cookies and other website data from Safari:

  1. Click Safari > Clear History…
  2. From the drop-down menu under Clear, pick all history.
  3. Confirm with Clear History.Clear cookies and website data from Safari

Reset Safari if the above-mentioned steps did not help you:

  1. Click Safari > Preferences…
  2. Go to the Advanced tab.
  3. Tick the Show Develop menu in the menu bar.
  4. From the menu bar, click Develop, and then select Empty Caches.Reset Safari

Google Chrome

  1. Open Google Chrome, click on the Menu (three vertical dots at the top-right corner) and select More tools > Extensions.
  2. In the newly opened window, you will see all the installed extensions. Uninstall all the suspicious plugins that might be related to the unwanted program by clicking Remove.Remove extensions from Chrome

Clear cache and web data from Chrome:

  1. Click on Menu and pick Settings.
  2. Under Privacy and security, select Clear browsing data.
  3. Select Browsing history, Cookies and other site data, as well as Cached images and files.
  4. Click Clear data.Clear cache and web data from Chrome

Change your homepage:

  1. Click the menu and choose Settings.
  2. Look for a suspicious site in the On startup section.
  3. Click on Open a specific or set of pages and click on three dots to find the Remove option.

Reset Google Chrome

If the previous methods did not help you, reset Google Chrome to eliminate all the unwanted components:

  1. Click on Menu and select Settings.
  2. In the Settings, scroll down and click Advanced.
  3. Scroll down and locate Reset and clean up section.
  4. Now click Restore settings to their original defaults.
  5. Confirm with Reset settings.Reset Chrome 2

Solution for iOS users

If you are encountering suspicious pop-ups on your iPhone, you can block them via the browser settings.

  • Open Settings and go to Safari
  • Here, look for the following options:
    Block Pop-ups
    Fraudulent Website Warning
  • Enable them by toggling the switch to the right.

Your next task is to make sure that your browser data is cleared so that you wouldn't be rerouted to the same malicious pages or that phishing content wouldn't be shown again.

  • Go to Safari Settings once again and click Advanced
  • Tap the Website Data section
  • Select Remove All Website Data.

You may remove virus damage with a help of FortectIntego. SpyHunter 5Combo Cleaner and Malwarebytes are recommended to detect potentially unwanted programs and viruses with all their files and registry entries that are related to them.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of pop-ups. Follow these steps


Remove from Mozilla Firefox (FF)

Remove dangerous extensions:

  1. Open Mozilla Firefox browser and click on the Menu (three horizontal lines at the top-right of the window).
  2. Select Add-ons.
  3. In here, select unwanted plugin and click Remove. Remove extensions from Firefox

Reset the homepage:

  1. Click three horizontal lines at the top right corner to open the menu.
  2. Choose Options.
  3. Under Home options, enter your preferred site that will open every time you newly open the Mozilla Firefox.

Clear cookies and site data:

  1. Click Menu and pick Settings.
  2. Go to Privacy & Security section.
  3. Scroll down to locate Cookies and Site Data.
  4. Click on Clear Data…
  5. Select Cookies and Site Data, as well as Cached Web Content and press Clear. Clear cookies and site data from Firefox

Reset Mozilla Firefox

If clearing the browser as explained above did not help, reset Mozilla Firefox:

  1. Open Mozilla Firefox browser and click the Menu.
  2. Go to Help and then choose Troubleshooting Information. Reset Firefox 1
  3. Under Give Firefox a tune up section, click on Refresh Firefox…
  4. Once the pop-up shows up, confirm the action by pressing on Refresh Firefox. Reset Firefox 2

Remove from Microsoft Edge

Delete unwanted extensions from MS Edge:

  1. Select Menu (three horizontal dots at the top-right of the browser window) and pick Extensions.
  2. From the list, pick the extension and click on the Gear icon.
  3. Click on Uninstall at the bottom. Remove extensions from Edge

Clear cookies and other browser data:

  1. Click on the Menu (three horizontal dots at the top-right of the browser window) and select Privacy & security.
  2. Under Clear browsing data, pick Choose what to clear.
  3. Select everything (apart from passwords, although you might want to include Media licenses as well, if applicable) and click on Clear. Clear Edge browsing data

Restore new tab and homepage settings:

  1. Click the menu icon and choose Settings.
  2. Then find On startup section.
  3. Click Disable if you found any suspicious domain.

Reset MS Edge if the above steps did not work:

  1. Press on Ctrl + Shift + Esc to open Task Manager.
  2. Click on More details arrow at the bottom of the window.
  3. Select Details tab.
  4. Now scroll down and locate every entry with Microsoft Edge name in it. Right-click on each of them and select End Task to stop MS Edge from running. Reset MS Edge

If this solution failed to help you, you need to use an advanced Edge reset method. Note that you need to backup your data before proceeding.

  1. Find the following folder on your computer: C:\\Users\\%username%\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdge_8wekyb3d8bbwe.
  2. Press Ctrl + A on your keyboard to select all folders.
  3. Right-click on them and pick Delete Advanced MS Edge reset 1
  4. Now right-click on the Start button and pick Windows PowerShell (Admin).
  5. When the new window opens, copy and paste the following command, and then press Enter:

    Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\\AppXManifest.xml” -Verbose Advanced MS Edge reset 2

Instructions for Chromium-based Edge

Delete extensions from MS Edge (Chromium):

  1. Open Edge and click select Settings > Extensions.
  2. Delete unwanted extensions by clicking Remove. Remove extensions from Chromium Edge

Clear cache and site data:

  1. Click on Menu and go to Settings.
  2. Select Privacy, search and services.
  3. Under Clear browsing data, pick Choose what to clear.
  4. Under Time range, pick All time.
  5. Select Clear now. Clear browser data from Chroum Edge

Reset Chromium-based MS Edge:

  1. Click on Menu and select Settings.
  2. On the left side, pick Reset settings.
  3. Select Restore settings to their default values.
  4. Confirm with Reset. Reset Chromium Edge

After uninstalling this potentially unwanted program (PUP) and fixing each of your web browsers, we recommend you to scan your PC system with a reputable anti-spyware. This will help you to get rid of pop-ups registry traces and will also identify related parasites or possible malware infections on your computer. For that you can use our top-rated malware remover: FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes.

How to prevent from getting adware

Protect your privacy – employ a VPN

There are several ways how to make your online time more private – you can access an incognito tab. However, there is no secret that even in this mode, you are tracked for advertising purposes. There is a way to add an extra layer of protection and create a completely anonymous web browsing practice with the help of Private Internet Access VPN. This software reroutes traffic through different servers, thus leaving your IP address and geolocation in disguise. Besides, it is based on a strict no-log policy, meaning that no data will be recorded, leaked, and available for both first and third parties. The combination of a secure web browser and Private Internet Access VPN will let you browse the Internet without a feeling of being spied or targeted by criminals. 

No backups? No problem. Use a data recovery tool

If you wonder how data loss can occur, you should not look any further for answers – human errors, malware attacks, hardware failures, power cuts, natural disasters, or even simple negligence. In some cases, lost files are extremely important, and many straight out panic when such an unfortunate course of events happen. Due to this, you should always ensure that you prepare proper data backups on a regular basis.

If you were caught by surprise and did not have any backups to restore your files from, not everything is lost. Data Recovery Pro is one of the leading file recovery solutions you can find on the market – it is likely to restore even lost emails or data located on an external device.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions