If your web browser is constantly being redirected to the Protectionnotice.com site, then it is possible that you have adware installed on your computer.
What is Protectionnotice.com?
Protectionnotice.com is a browser-based scam that tries to trick you into thinking that a Norton Security quick scan has detected 5 viruses and you need to renew your antivirus subscription to remove them. It does this to scare you into buying an antivirus license so that that the scammers can earn a commission from the sale.
When the Protectionnotice.com scam is displayed in your browser it will the below text:
Your Norton Security subscription may have expired
Your subscription of Norton 360 Total Protection for Windows may expire on April 18, 2020.After the expiration date, your computer may become susceptible to many different virus threats.
If your PC is unprotected, it can be exposed to viruses and other malware…
As you can imagine, the Protectionnotice.com alerts are nothing more than fake error messages and anything it states is just a scam. If you have been redirected to the Protectionnotice.com site, we recommend to close this page and do not enter any personal information.
Why am I seeing the Protectionnotice.com pop-up ads?
You are seeing the Protectionnotice.com pop-up ads because your device is infected with malware, malicious push notifications, or a site you have visited has redirected your browser.
Less than reputable sites can display malicious ads that redirect your browser to the Protectionnotice.com pop-up ads to generate advertising revenue. If this happens, you can close the page and install an ad blocker like AdGuard to block the malicious ads. However, if you are continuously seeing pop-ups like the Protectionnotice.com pop-up ads, then your computer might be infected with a malicious program and you need to scan your device for adware and remove it.
Here are a few typical signs that you have a malicious program installed on your computer:
- Advertisements appear in places they shouldn’t be.
- Your web browser’s homepage has mysteriously changed without your permission.
- Web pages that you typically visit are not displaying properly.
- Website links redirect to sites different from what you expected.
- Browser popups appear which recommend fake updates or other software.
- Other unwanted programs might get installed without your knowledge.
To check your computer for the Protectionnotice.com pop-up ads and remove it for free, please use the guide below.
How to remove Protectionnotice.com pop-up ads (Virus Removal Guide)
This malware removal guide may appear overwhelming due to the number of steps and numerous programs that are being used. We have only written it this way to provide clear, detailed, and easy to understand instructions that anyone can use to remove malware for free.
Please perform all the steps in the correct order. If you have any questions or doubts at any point, stop and ask for our assistance.
- STEP 1: Uninstall the malicious programs from Windows
- STEP 2: Use Malwarebytes Free to remove Protectionnotice.com adware
- STEP 3: Use HitmanPro to scan for malware and unwanted programs
- STEP 4: Double-check for malicious programs with AdwCleaner
- STEP 5: Reset the browser settings to remove Protectionnotice.com ads
STEP 1: Uninstall the malicious programs from Windows
In this first step, we will check if any malicious programs are installed on your computer. Sometimes browser hijackers or adware programs can have usable Uninstall entries that can be used to remove these programs.
Windows 10
-
Open the “Settings” menu.
Click Start button on the taskbar, then select “Settings” (gear icon).
-
Click on “Apps”, then on “Apps and Features”.
When the “Windows Settings” window opens, click on “Apps“. By default, it should open “Apps and Features” but if it doesn’t, select it from the list on the left.
-
Find the malicious program and uninstall it.
The “Apps and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find the malicious program, then click to highlight it, then click the “Uninstall” button.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
Here are some known malicious programs: PDFPoof, BatBitRst, MessengerNow, SearchAd, MyPrintableCoupons, Reading Cursors, ProMediaConverter, PDFOnline-express, See Scenic Elf, Clickware, Easy Speedtest, or WebDiscover.
The malicious program may have a different name on your computer. If you cannot find any malicious programs on your computer, you can continue with the second step from this guide.
-
Follow the on-screen prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the program.
Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
Windows 8
-
Go to “Program and Features”.
Right-click on the Start button in the taskbar, then select “Programs and Features”. This will take you directly to your list of installed programs.
-
Find the malicious program and uninstall it.
The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find the malicious program, then click to highlight it, then click the “Uninstall” button that appears on the top toolbar.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
Here are some known malicious programs: PDFPoof, BatBitRst, MessengerNow, SearchAd, MyPrintableCoupons, Reading Cursors, ProMediaConverter, PDFOnline-express, See Scenic Elf, Clickware, Easy Speedtest, or WebDiscover.
The malicious program may have a different name on your computer. If you cannot find any malicious programs on your computer, you can continue with the next step from this guide.
-
Follow the on-screen prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall the program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
Windows 7
-
Open the “Control Panel”.
Click on the “Start” button, then click on “Control Panel“.
-
Click on “Uninstall a Program”.
When the “Control Panel” appears, click on “Uninstall a Program” from the Programs category.
-
Find the malicious program and uninstall it.
The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find the malicious program, then click to highlight it, then click the “Uninstall” button that appears on the top toolbar.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
Here are some known malicious programs: PDFPoof, BatBitRst, MessengerNow, SearchAd, MyPrintableCoupons, Reading Cursors, ProMediaConverter, PDFOnline-express, See Scenic Elf, Clickware, Easy Speedtest, or WebDiscover.
The malicious program may have a different name on your computer. If you cannot find any malicious programs on your computer, you can continue with the next step from this guide.
-
Follow the on-screen prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall the program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
STEP 2: Use Malwarebytes Free to remove Protectionnotice.com adware
Malwarebytes Free is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware.
It is important to note that Malwarebytes Free will run alongside antivirus software without conflicts.
-
Download Malwarebytes Free.
You can download Malwarebytes by clicking the link below.
MALWAREBYTES DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the MBSetup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with an User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the Malwarebytes installation.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes setup wizard which will guide you through the installation process. The Malwarebytes installer will first ask you on what type of computer are you installing this program, click either Personal Computer or Work Computer.
On the next screen, click “Install” to install Malwarebytes on your computer.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Use Malwarebytes Free”.
After installing Malwarebytes, you’ll be prompted to select between the Free and the Premium version. The Malwarebytes Premium edition includes preventative tools like real-time scanning and ransomware protection, however, we will use the Free version to clean up the computer.
Click on “Use Malwarebytes Free“.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malicious programs that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files and registry keys that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
When the malware removal process is complete, you can close Malwarebytes and continue with the rest of the instructions.
STEP 3: Use HitmanPro to scan for malware and unwanted programs
HitmanPro is a second opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to their clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.
Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is actually no limit in scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one time 30-days trial to enable the cleanup.
-
Download HitmanPro.
You can download HitmanPro by clicking the link below.
HITMANPRO DOWNLOAD LINK
(The above link will open a new web page from where you can download HitmanPro) -
Install HitmanPro.
When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your PC. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with an User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
-
Follow the on-screen prompts.
When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.
-
Wait for the HitmanPro scan to complete.
HitmanPro will now begin to scan your computer for malicious programs. This process will take a few minutes.
-
Click on “Next”.
When HitmanPro has finished the scan, it will display a list of all the malware that the program has found. Click on the “Next” button to remove the malicious programs.
-
Click on “Activate free license”.
Click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your PC.
When the process is complete, you can close HitmanPro and continue with the rest of the instructions.
STEP 4: Double-check for malicious programs with AdwCleaner
AdwCleaner is a free popular on-demand scanner which can detect and remove malware that even the most well-known anti-virus and anti-malware applications fail to find.
While the Malwarebytes and HitmanPro scans are more than enough, we’re recommending AdwCleaner to users who still have malware related issues or just want to make sure their computer is 100% clean.
-
Download AdwCleaner.
You can download AdwCleaner by clicking the link below.
ADWCLEANER DOWNLOAD LINK
(The above link will open a new web page from where you can download AdwCleaner) -
Double-click on the setup file.
Double-click on the file named “adwcleaner_x.x.x.exe” to start AdwCleaner. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with a User Account Control dialog asking you if you want to run this file. If this happens, you should click “Yes” to continue with the installation.
-
Click on “Scan Now”.
When AdwCleaner will start, click on the “Scan Now” button to perform a system scan.
-
Wait for the AdwCleaner scan to complete.
AdwCleaner will now scan your PC for malicious files. This process can take a few minutes.
-
Click on “Clean & Repair”.
When AdwCleaner has finished it will display a list of all the malware that the program found. Click on the “Clean & Repair” button to remove the malicious files from your computer.
-
Click on “Clean & Restart Now”
When the malware removal process is complete, AdwCleaner may need to restart your device. Click on the “Clean & Restart Now” button to finish the removal process.
When the process is complete, you can close Adwcleaner and continue with the rest of the instructions.
STEP 5: Reset the browser settings to remove Protectionnotice.com ads
If your computer is still being redirected to the Protectionnotice.com pop-up ads, we will need to reset the web browser settings to their original defaults. This step should be performed only if your issues have not been solved by the previous steps.
Google Chrome
Remove Protectionnotice.com scam from Google Chrome
To remove Protectionnotice.com pop-up ads from Chrome we will reset the browser settings to its default. Resetting your browser settings will reset the unwanted changes caused by installing other programs. However, your saved bookmarks and passwords will not be cleared or changed.
-
Click the menu icon, then click on “Settings”.
In the top right corner, click on Chrome’s main menu button, represented by three vertical dots. When the drop-down menu appears, click on “Settings“.
-
Click “Advanced”.
Chrome’s “Settings” should now be displayed in a new tab or window, depending on your configuration. Next, scroll to the bottom of the page and click on the “Advanced” link.
-
Click “Reset settings to their original defaults”.
Scroll down until the “Reset and clean up” section is visible, as shown in the example below. Click on “Reset settings to their original defaults“.
-
Click “Reset Settings”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue on with the reset process. To complete the restoration process, click on the “Reset Settings” button.
Mozilla Firefox
Remove Protectionnotice.com scam from Firefox
To remove Protectionnotice.com pop-up ads from Firefox we will reset the browser settings to its default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.
-
Click the menu icon, then click on “Help”.
Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
-
Click “Troubleshooting Information”.
From the Help menu, click on “Troubleshooting Information“.
-
Click on “Refresh Firefox”
Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
-
Confirm.
To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
-
Click “Finish”.
Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on “Finish“.
Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.
Microsoft Edge
Remove Protectionnotice.com scam from Microsoft Edge
To remove Protectionnotice.com pop-up ads from Microsoft Edge we will reset the browser settings to its default. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history and saved passwords will not be cleared.
-
Open the “Settings” menu.
In the top right corner, click on Microsoft Edge’s main menu button, represented by three horizontal dots. When the drop-down menu appears, click on “Settings“.”.
-
Click on “Reset Settings”.
On the left side of the window, click on “Reset Settings”.
-
Click on “Restore settings to their default values”.
In the main window, click on “Restore settings to their default values”.
-
Click “Reset”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue on with the reset process. To complete the restoration process, click on the “Reset” button.
Internet Explorer
Remove Protectionnotice.com scam from Internet Explorer
To remove Protectionnotice.com pop-up ads from Internet Explorer we will reset the browser settings to its default. You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your computer.
-
Go to “Internet Options”.
Open Internet Explorer, click on the gear icon in the upper right part of your browser, then select “Internet Options“.
-
Select the “Advanced” tab, then click “Reset”
In the “Internet Options” dialog box, select the “Advanced” tab, then click on the “Reset” button.
-
Click on “Reset”.
In the “Reset Internet Explorer settings” section, select the “Delete personal settings” checkbox, then click on the “Reset” button.
-
Click on “Close”.
When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box.
Close your browser and then you can open Internet Explorer again.
Your computer should now be free of the Protectionnotice.com browser hijacker. If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.