Top 10 Facebook Scams Spreading Now and How to Avoid Them

Facebook has over 2.8 billion monthly active users, making it the largest social media platform in the world. Unfortunately, with such a massive user base, scammers often target Facebook users with a variety of scams designed to steal personal information and money. Staying aware of the top Facebook scams can help you avoid falling victim to them.

This comprehensive guide will provide an overview of the 10 most common Facebook scams, explain in detail how these scams work, and provide tips on how to protect yourself. With knowledge and vigilance, you can help prevent these Facebook scams from succeeding.

1. Fake Friend Requests

Scam Overview

The fake friend request scam involves receiving friend requests from strangers, often using photos of attractive people. Accepting these requests gives scammers access to your profile information and friends list.

Scammers use fake accounts to appear more trustworthy. They often claim you have a mutual friend in common and may message complimenting your posts to further build rapport. Once connected, scammers use your personal information and connections to spread spam posts or malware links.

In some cases, scammers impersonate the identity of someone you may actually know to more easily gain access. With your personal details and connections in hand, scammers can exploit this information in various ways, like hacking accounts or committing identity theft.

Staying wary of friend requests from people you don’t know well, even if you appear to have mutual friends, can help you avoid this scam. Don’t accept requests just to be polite if you aren’t certain the person behind it is authentic.

How the Scam Works

The fake friend request scam often starts with an incoming friend request from a stranger on Facebook. To appear more legitimate, the scammer may use a profile picture of an attractive man or woman.

The scammer often claims you have mutual friends in common, naming one or two connections you actually have. This convinces some users to mistakenly assume the request is valid and accept it.

In the friend request message, the scammer may compliment your profile or make generic small talk. This further builds a façade of familiarity. Once connected as friends, the scammer has access to your profile information and full friends list.

With these details, scammers use your identity and connections in various fraudulent ways. For example, they may post malware or phishing links on your page that get shared with your friends. They can also message your connections with scams by posing as you.

In more sophisticated cases, scammers may impersonate someone you know to ensure you accept their request. Using hacked accounts or social engineering, they can replicate details about mutual friends or experiences only you would know. This convinces users the identity is valid, granting the scammer access.

Whether using a fake identity or impersonating someone real, these scams aim to take advantage of your connections once connected. Staying wary of all friend requests from unverified strangers can help you avoid inadvertently enabling these scams.

What to Do if You Connected with a Scammer

If you fear you may have accepted a friend request from a scammer, take these steps:

  • Review your mutual friends in common. Contact any connections listed to verify if they actually know this person. If not, they are likely fake.
  • Look for recent posts or conversations with the account. Scammers often have few posts or generic comments if any at all.
  • Check when the account was created. Fake accounts are often new, having been created recently.
  • Observe the account activity going forward. If you see suspicious posts or messages, that’s a red flag.
  • Report the account if you confirm it’s fake. Block them to prevent future contact.
  • Change your privacy settings to limit what friends of friends can access. This prevents scammers from exploiting mutuals.
  • Monitor your accounts closely for any suspicious activity going forward and report it immediately. Enabling Two-Factor Authentication adds an extra layer of security as well.
  • Warn your friends and connections about the scam to prevent the scammer from targeting more people. Share any details to help them recognize fake requests.

Staying vigilant when accepting new friend requests can help avoid letting scammers gain access. If you do connect with one, take swift action to report, block and mitigate the damage done.

2. Like-Farming Pages

Scam Overview

Like-farming scams involve pages promising rewards or prizes in exchange for liking, sharing, and engaging with their content. By getting users to interact with posts, scammers boost their page rankings and reach. However, the promised rewards rarely materialize.

These pages rely on sensational claims to entice engagement. For example, they may promise cash prizes to random active users or claim you can win the latest iPhone model. Once you engage, however, you either never receive the promised rewards or must complete numerous additional steps that require you to spend money.

While not directly harmful, these like-farming pages often spread spammy content and exist solely to profit from your engagement. Identifying their outlandish claims and understanding their manipulative tactics can help avoid supporting these scam pages.

How the Scam Works

Like-farming pages typically incentivize likes, shares, and comments by promoting exciting giveaways or contests. For example, a page may claim:

“The 100,000th person to like this post will win a FREE iPhone X!”

These claims hook users into engaging to try and win. However, once you like the page or follow its instructions, you never receive the promised prize.

Some like-farming pages craft more elaborate scams to manipulate users. A page may claim you won a free reward, but you must first complete a number of steps to claim it.

These steps usually require visiting external sites, subscribing to services, or taking paid surveys. Users complete these actions hoping to claim the prize that brought them there in the first place. However, even after finishing all steps, you still never receive the reward.

While not directly stealing money or information, these like-farming scams prey on users’ desire for rewards to get them engaging with and spreading low-quality, clickbait content. Avoiding pages making promises that seem too good to be true can help you steer clear of their manipulative tactics.

What to Do if You Connect with a Like-Farming Page

If you engaged with a Facebook page you now believe to be a like-farming scam, here are some precautions to take:

  • Unlike and unfollow the page to stop supporting their manipulative tactics.
  • Report the page to Facebook detailing how they misled users. This can help get scam pages shut down.
  • Block the page from your account to prevent any future contact.
  • Check your account settings. Limit what information the general public can see to prevent details from falling into the wrong hands.
  • Beware of any external sites the page led you to visit. Avoid entering any sensitive information to steer clear of further scams.
  • Use security and privacy Facebook settings to manage who can see your activity and connections going forward.
  • Enable Two-Factor Authentication as an extra login security measure.

Staying wary of giveaways and prizes promoted on Facebook that seem too good to be true can help you recognize and avoid like-farming scams. Report any suspicious pages to keep other users from falling victim.

3. Fake News and Hoaxes

Scam Overview

Fake news and hoaxes on Facebook refer to false stories or claims spread while posing as legitimate news. Scammers and dubious websites publish sensationalized or completely fabricated content to profit from engagement and clicks.

These stories intentionally mislead readers, often to serve a particular agenda. Fake political news spreading misinformation is one common example. Hoaxes about celebrities and viral clickbait are other varieties.

If you accidentally share or engage with a fake story, your interactions can increase its spread. Staying skeptical of questionable headlines and sources can help avoid enabling misinformation. Fact-checking sites can confirm whether stories are real or fake.

How the Scam Works

Fake news and hoaxes use attention-grabbing headlines crafted to stoke anger, shock, or other high-emotion reactions that drive shares. For example, a completely fictional article may claim:

“Shocking: [Celebrity] Claims [Outrageous Statement] About [Controversial Issue]”

Once intrigued by the headline, users click and read the article, inadvertently increasing traffic and ad revenue for the scammers behind it. The content often lacks any verifiable sources or facts.

In more harmful cases, fake political news spreads false claims about candidates during elections or twists issues to promote specific agendas. Some fake news intentionally incites outrage and harassment towards individuals.

Rather than doing basic fact checks, scammers rely on pieces going viral through social media shares. If you help spread their content, even just out of curiosity, it helps achieve their goals. Avoiding suspect headlines can prevent enabling misinformation.

What to Do if You Shared Fake News

If you shared an article on Facebook you later realized was fake or a hoax, here are some important steps to take:

  • Delete your post sharing the fake content. This helps stop its spread.
  • Comment on your post to clarify the content is fake before deleting it. This notifies your connections.
  • Report the fake news article to Facebook. This can help suppress its reach.
  • Check your privacy settings. Limit old posts being visible to prevent spreading debunked information.
  • When in doubt about suspicious news, look for trusted fact-checking sites to verify stories before sharing them.
  • Consider issuing a new post apologizing for spreading fake news and encouraging smarter sharing. We all make mistakes.
  • Learn to identify warning signs of fake news, like sensationalized headlines, dubious sources, and lack of author details.

Staying proactive by identifying and admitting mistakes can be empowering. We all fall for fake news sometimes, but collectively combating misinformation can make a real difference.

4. Facebook Charity Scams

Scam Overview

Facebook charity scams involve fake fundraisers claiming to raise money for sick individuals or good causes. Scammers create compelling stories to exploit people’s generosity. However, donated funds actually just go to the scammers.

These pages mimic the names and branding of real charities. Using stock photos and fabricated details, scammers pose as individuals suddenly faced with medical crises or other emergencies in need of community support.

But despite promising donations will help victims in need, there is no one actually receiving the funds in reality. Avoiding posts that pressure you to donate without first verifying their authenticity can protect against this scam.

How the Scam Works

Facebook charity scams create elaborate backstories and financial goals seemingly to help people in dire need. For example, a page may claim to be raising emergency medical funds for a child’s operation.

Using a stock photo of a child and a fabricated story, scammers pose as the victim’s family. They provide detailed accounts of diagnoses, symptoms, and costs. Some even list specific doctors and hospitals to appear more credible.

The page urges users to make small donations, like $5, claiming they urgently need help reaching a goals of tens of thousands of dollars for life-saving treatment. Kind-hearted users give money believing it will make a difference.

However, the sick child and backstory are completely fictional. No medical treatments or emergency relief will be funded by donations. The money only benefits the scammers behind the fake fundraiser.

When encountering viral social media fundraisers, especially involving individuals you don’t know, it’s always smart to do some digging to ensure the campaign and cause are real before contributing any money.

What to Do if You Donated to a Scam Fundraiser

If you donated to what you now believe was a fake Facebook fundraiser, here are some important actions to take:

  • Report the fundraiser to Facebook as a scam and include details on how they misled you. This can get fraudulent fundraisers shut down.
  • Contact your bank and challenge the charges if you donated by debit/credit card. Report it as fraudulent.
  • Spread awareness to friends to reinforce the importance of verifying fundraisers before donating. Share your experience to prevent others being tricked too.
  • Look up the name image of anyone depicted to see if the photos are actually stock images of models. Reverse image searches can help expose this.
  • When in doubt, seek out the individuals or organizations campaigning for donations on other platforms to confirm identities.
  • For tax purposes, save any receipts or confirmation emails for donations you later learn were fraudulent.

Though disheartening to lose money, exposing these charity scammers can at least prevent further harm. Donating responsibly remains important, but always verify legitimacy first.

5. Facebook Live Scams

Scam Overview

Facebook Live scams involve fake live videos that trick viewers into completing paid offers or sharing personal information to receive promised rewards. Scammers impersonate celebrities or companies to appear legitimate.

For example, scammers may pretend to show a live product launch or festival performance. The video entices viewers to click questionable links to register for prizes or receive free merchandise. However, providing personal details or completing suspicious offers only leads to identity theft or shopping scams.

Understanding these live videos are pre-recorded and that promised rewards don’t exist can help you avoid compromising your information or money in this scam.

How the Scam Works

Facebook Live scammers impersonate recognizable brands, artists, or public figures to appear credible. Using green screens or stolen footage, they mimic a live announcement or performance.

For example, scammers may pretend to stream an unreleased album preview from a popular musician. Or they may act as a celebrity promising free backstage passes to viewers who register on a particular website.

Thinking the offers are real and exclusive, viewers click the links in the video description. But they then lead to shady websites laden with surveys, subscriptions, or malware downloads.

Despite completing these steps as instructed, users receive nothing in return. The live videos are pre-recorded and all promises of freebies are completely fabricated. Sharing any personal information only puts you at risk for further scams.

Learning to identify the deception involved with these fake live videos and offers helps avoid falling into the trap. Real brands and celebrities announce giveaways directly through their official pages and channels.

What to Do if You Connected with a Fake Facebook Live Scam

If you engaged with a Facebook Live scam and shared any sensitive information, take these actions right away:

  • Report the video and any associated pages or websites to Facebook as a scam. Provide details on how the offers were misleading or suspicious.
  • If you entered payment information, contact your bank/card provider immediately to report fraudulent charges or block any future charges.
  • If you suspect your device is infected with malware due to the scam, run a scan with Malwarebytes to detect and remove any threats.
  • Change any website or account passwords you entered while interacting with questionable third-party sites. Enable Two-Factor Authentication for added security.
  • Monitor your accounts and credit reports closely for signs of fraudulent activity stemming from shared information. Place security freezes if identity theft appears likely.
  • Avoid further interaction with the scammers and any dubious third-party sites to limit exposure of your information. Block related pages/profiles.

Staying vigilant for signs of fake videos and false offers can prevent much bigger headaches. Report any Facebook Live scams you spot to protect other users as well.

6. Third-Party Advertising Scams

Scam Overview

Third-party Facebook advertising scams involve advertisers posting links to shady websites or online offers. While Facebook screens ads, some scams slip through promoting products/services using deceptive claims or prices.

For example, a disingenuous weight-loss product may promote unrealistic results using doctored before-and-after images. Or an ad selling merchandise may claim unbeatable prices despite linking to low-quality counterfeit goods.

While Facebook tries preventing scam ads from reaching users, some still appear in timelines and the sidebar. Staying wary of outlandish claims and understanding your consumer rights can help avoid falling victim to predatory advertising.

How the Scam Works

Facebook allows businesses to advertise to targeted demographics. While most ads come from legitimate brands, some untrustworthy advertisers still slip through.

Scam advertisers aim to drive traffic to external sites where they can sell shady products or services using deceptive marketing. For example:

  • Weight-loss advertisements showing dramatic before-and-after pictures implying unrealistic results from their products. In reality, the photos depict different people entirely.
  • Luxury product ads offering deeply discounted designer items. But clicking the links leads to counterfeit replicas or lower-quality merchandise than advertised.
  • Financial ads promoting get-rich-quick investment opportunities or loans with hidden fees scamming users once on the site.

These advertisements often use eye-catching imagery, viral trends, or exaggerated claims specifically designed to entice clicks from users. The eventual sites then leverage manipulative tactics to get users making purchases or handing over sensitive information.

Simply ignoring suspicious ads is the best way to avoid entanglements. Also report any clearly misleading ones to Facebook. This trains their systems stopping such ads from reaching people and protects other users.

What to Do if You Connect with a Scam Advertiser

If an advertisement led you to a website selling deceptive products or services, take these precautions:

  • Leave the site immediately without making any purchases or entering personal information. This limits your exposure.
  • Report the ad to Facebook
  • Block the advertiser to prevent their ads from appearing in your feed again.
  • If you did purchase a product, look up the company to find contact information to request refunds or cancel recurring orders.
  • For credit card payments, report the charges as fraudulent to your card provider. Many have protections against deceptive marketing.
  • Carefully check bank and card statements going forward for any suspicious activity indicating stolen payment information.
  • If the advertiser had you enter any personal information like an email address, beware of potential phishing attempts via spam messages. Avoid opening anything suspicious.
  • Run a scan with Malwarebytes to check for malware if you downloaded anything from scam sites. Immediately change passwords for any accounts created.
  • Learn to identify common red flags of scam ads like unbelievable claims, pressure to act quickly, or contact forms as the only way to reach the company.

While Facebook removes most scam ads, some inevitably get through. Reporting suspicious advertisers helps improve protections for you and everyone on the platform. Staying vigilant against social media ads making claims that seem too good to be true can prevent many headaches.

7. QR Code Generators

Scam Overview

QR code generators let users easily create QR codes to link to websites, payments, WiFi networks, and more. However, some free generator sites embed malware that gets downloaded onto your device when scanning codes they create.

Rather than take you to legitimate sites, these boobytrapped QR codes install harmful malware, steal login credentials, or compromise payment information. Fake QR generators are often advertised on Facebook to rope in unsuspecting visitors.

Sticking to reputable QR code tools curated by app stores and avoiding shady third-party generators can help you steer clear of this potentially damaging scam.

How the Scam Works

QR code generators act as hassle-free tools to create scannable codes, useful in a variety of situations. But some advertised online and on social media hide insidious malware that infects your device once scanned.

After generating your custom QR code using the site, you naturally assume it’s safe to then scan with your phone’s camera. However, doing so triggers a download of embedded malware, unbeknownst to you.

This malware can steal personal data, compromise accounts, brick devices, and enable other types of cybercrime. Criminals then leverage your information and compromised device for financial gain through identity theft, resale on dark web markets, and extortion plots.

Unsuspecting Facebook users see posts sponsoring “Free QR Code Generators!” and believe they’re getting helpful utilities. But failing to check site reputations and domain quality signals first can lead to damning consequences.

Sticking with trusted generators tied to legitimate apps and services ensures scannable codes won’t trigger unexpected malware. For the best safety, use tools recommended directly within your device’s app stores.

What to Do if You Used a Scam Generator

If you created QR codes using a suspicious third-party generator, take these steps to mitigate potential malware damage:

  • Scan your device with trusted antivirus software to detect and remove any malicious programs downloaded. Perform full system sweeps to check all your files and system tools.
  • Change all passwords for online accounts, especially banking, email, and social media. Enable Two-Factor Authentication everywhere possible for added security.
  • Contact your bank and credit card companies if you believe financial information was compromised. Closely monitor your statements for any signs of fraud.
  • Back up your personal data and perform a factory reset on your device if antivirus scans reveal extensive malicious threats. This fully cleans out malware.
  • Avoid using your compromised accounts or device for sensitive actions like online purchases until malware is eliminated and passwords reset.
  • Check privacy settings on all social media accounts. Revoke access permission to any unfamiliar third-party apps.
  • If you suspect your device is infected with malware due to the scam, run a scan with Malwarebytes to detect and remove any threats.

Avoiding questionable code generators and links advertised online prevents invented hassles. Using reputable QR tools recommended on app stores can give you codes convenient and safe.

8. PayPal Invoice Scams

Scam Overview

Scammers send fake PayPal invoices via Facebook Messenger demanding payment for unauthorized purchases you never made. They often threaten account suspension if you don’t pay promptly. These invoices actually have no relation to PayPal and paying gives scammers direct access to your financial information.

Knowing PayPal communicates billing statements through your account dashboard or email can help recognize when an invoice is fraudulent. Simply ignoring all invoices sent randomly over Facebook avoids falling victim.

How the Scam Works

You receive an unexpected Facebook message from a random account containing a PayPal invoice claiming you owe money. The invoice looks official, containing your name, supposed transaction details, the amount due, and a paying link.

A message accompanying the invoice urges you to pay the amount promptly or risk account suspension. Scammers often stress real-looking deadlines to incite fear and pressure.

However, clicking the embedded payment link simply exposes your financial data directly to scammers. PayPal never actually sent this payment request – it’s entirely fabricated. But scammers profit either way from stolen account and credit card details.

Giving any validity to invoices for unrecognized purchases sent randomly over Facebook gives scammers the opportunity to exploit you. Remember, any real PayPal billing notices always arrive through official account messages or your registered email.

What to Do if You Get a Fake Invoice

If you receive a suspicious invoice demanding PayPal payment over Facebook, steer clear with these precautionary steps:

  • Disregard the invoice completely and do not click any links. Mark it as spam or block the sending account.
  • Login directly to your PayPal account to view recent billing statements. Contact customer support if anything appears unauthorized or ambiguous.
  • Do not communicate with the scammer any further. Replying confirms you’re a real target.
  • Beef up security by changing your PayPal password and enabling Two-Factor Authentication. Monitor closely for any other unusual activity.
  • If you mistakenly did pay the invoice, report the charges as fraudulent to your bank/card provider immediately. Notify PayPal as well.
  • Adjust your social media privacy settings and limit messages to trusted connections only. Scammers have a harder time making contact.
  • If you suspect your device is infected with malware due to the scam, run a scan with Malwarebytes to detect and remove any threats.

Remember, real payment processors don’t handle billing and statements over social media. Maintaining strong payment account security while ignoring all unsolicited invoices keeps your financial information protected.

9. Job Offer Scams

Scam Overview

Some Facebook job posts promise profitable opportunities but actually aim to scam applicants out of money and personal information. Scammers impersonate real companies, often promising work-from-home roles needing only a small initial “training” fee to apply.

Targets who question the suspicious upfront costs then face threats of legal action or immigration issues. Once applicants pay the fee, the “employers” disappear or endlessly delay work start dates while demanding more money for other needs.

Avoiding job posts requiring payments, ID photos, or banking access is key to sidestepping these predatory scams. Real employers never demand fees from applicants.

How the Scam Works

Scammers advertise remote gigs at respected companies, often in technical support or secretarial roles. They promise high wages with minimal effort. For example:

“Seeking Work-From-Home Customer Service Agents. $60K annual pay. Limited positions available!”

When applicants inquire, the “employer” responds explaining need for training and security clearances before work starts. First, a small upfront fee of $50-100 must be paid, via wire transfer, gift card, or cryptocurrency.

Once applicants pay, the scammers demand more money for other fake needs, like background checks, anti-phishing software, or equipment. If victims stop payments, they incur threats of lawsuits or arrest.

Any ID photos, banking details, or personal information applicants provide aids identity theft. The “jobs” never materialize as promised. Losses can add up if victims maintain hope the role is legitimate.

Scrutinizing job posts advertising easy remote work for reputable companies that require payments beforehand helps avoid scammers profiteering off false opportunities.

What to Do if You Paid a Fee

If you wired money or paid a “training” fee for a Facebook job only to be scammed, promptly take these actions to limit damages:

  • Cut off all further communication with the “employer.” Attempting to reason or negotiate only increases risk of threats.
  • Report the scammers’ fake profiles and job posts to Facebook to hopefully have them removed.
  • Contact your bank to report fraudulent transactions and have charges reversed where possible. Provide any details on who received wire transfers.
  • Monitor your credit cards and bank accounts closely for any signs of unauthorized charges indicating a breach from shared payment information.
  • Change any account passwords you shared with scammers. Carefully check security settings for unfamiliar linked accounts or apps and revoke access.
  • Freeze your credit reports to protect against potential identity theft risks from turned over personal information.
  • File police reports to aid investigations into these job scams and get documentation to provide banks and credit bureaus.
  • If you suspect your device is infected with malware due to the scam, run a scan with Malwarebytes to detect and remove any threats.

Avoiding giving money or personal details to sketchy employers avoids headaches. Report job scams to protect other job seekers from falling victim too.

10. Malware Links

Scam Overview

Scammers distribute malware links on Facebook poised as interesting content or software. Clicking these links triggers downloads of viruses, spyware, ransomware, or other malicious programs that damage devices and compromise data.

Malware links get shared intentionally by attackers or unwittingly by friends who stumbled upon malicious sites. Links disguised using URL shorteners or buried in caption copy often sneak past Facebook’s security filters.

Refraining from interacting with random links altogether and using updated antivirus protections can help keep devices and data safe from these malware hazards. Enabling Facebook protection warnings provides another line of defense against suspicious links.

How the Scam Works

Posts containing malware links are designed enticing users to click by promising funny videos, exclusive content, or free software. For example:

“This Viral Video Is Too Funny! Click Here To Watch”

“Install the Latest App Update Here”

“Click to See Leaked Photos!”

Users trusting the links come from legitimate sources click through. However, doing so silently installs malicious programs on your device typically without any indication.

Once installed, criminals can access your data, spy on your device usage, encrypt files for ransom, and otherwise monitor and control your device. You may only suspect something is wrong upon noticing impaired performance, glitchy operation, or other overt malware activity.

Avoiding clicking on random or sketchy links altogether, no matter how interested or curious you may feel, offers the best protection against inadvertent malware. Also run reputable antivirus to detect and halt any malicious programs.

What to Do if You Click a Malware Link

If you suspect your device became infected with malware after visiting a suspicious Facebook link, take these steps right away:

  • If you suspect your device is infected with malware due to the scam, run a scan with Malwarebytes to detect and remove any threats.
  • Change all account passwords immediately, especially for email, financial services, and social media. Enable Two-Factor Authentication everywhere possible.
  • Monitor accounts closely for unauthorized access or suspicious activity indicating info compromised by malware. Report issues promptly.
  • Back up personal data and reset your device to factory settings if antivirus scans reveal extensive threats. This fully eliminates malware persistence.
  • Avoid accessing sensitive accounts or info on the infected device until cleaned to prevent exploits. Use accounts online only from other safe devices temporarily.

Stay vigilant against viral links advertised across social media to sidestep devastating malware outcomes. Seeking help promptly after potential infections limits the fallout.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Windows.

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the MBSetup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Download

    You may be presented with a User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the Malwarebytes installation.

    Click Yes to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes setup wizard which will guide you through the installation process. The Malwarebytes installer will first ask you what type of computer are you installing this program on, click either Personal Computer or Work Computer.
    Malwarebytes setup: Click on Personal Computer

    On the next screen, click “Install” to install Malwarebytes on your computer.

    Click on Install to install Malwarebytes

    When your Malwarebytes installation completes, the program opens the Welcome to Malwarebytes screen.

  4. Click on “Scan”.

    Malwarebytes is now installed on your computer, to start a scan click on the “Scan” button. Malwarebytes will automatically update the antivirus database and start scanning your computer for malicious programs.

    Click on Scan button

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.

    Malwarebytes scanning for malware

  6. Click on “Quarantine”.

    When the Malwarebytes scan is finished scanning it will show a screen that displays any malware, adware, or potentially unwanted programs that it has detected. To remove the adware and other malicious programs that Malwarebytes has found, click on the “Quarantine” button.

    Review the malicious programs and click on Quarantine to remove malware

  7. Restart computer.

    Malwarebytes will now remove all the malicious files and registry keys that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes requesting to restart computer to complete the malware removal process

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Conclusion

Social media scams continue growing in sophistication, making educating yourself on common techniques essential. Avoiding dubious links, offers, fundraisers, ads, and requests through Facebook greatly reduces your chances of being manipulated or exploited.

Apply smart security habits, like using strong unique passwords, scanning for malware, enabling Two-Factor Authentication everywhere, and monitoring closely for unauthorized access. Report any scams you encounter to help curb their spread.

Remaining wary of content designed to provoke high-emotion reactions or offered exclusively through Facebook helps recognize many scams faster. Seeking official information from reputable sources remains the most reliable method to avoid falling victim.

With scam awareness and vigilance around your personal data and money, Facebook can remain an entertaining platform to connect without putting your security at risk.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment