{"id":57484,"date":"2017-07-12T20:33:54","date_gmt":"2017-07-13T01:33:54","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57484"},"modified":"2017-07-12T20:40:44","modified_gmt":"2017-07-13T01:40:44","slug":"avoid-deceptive-malware-tricks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/","title":{"rendered":"Avoid these Deceptive Malware Tricks"},"content":{"rendered":"<p>Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order to help avoid problems and PC Pitstop also believes in providing our customers with not just a quality anti-malware solution, but training as well.<\/p>\n<p>Let&#8217;s take a look at two deceptive methods that malware sometimes uses to try and trick computer users into becoming victims.<\/p>\n<h1>Trick 1 &#8211; The Icon Change<\/h1>\n<p>Take a look at this screenshot:<br \/>\n<a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_trick-e1499905320187.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-57485\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_trick-e1499905320187.png\" alt=\"Malware posing as a folder by using the folder icon\" width=\"850\" height=\"607\" \/><\/a><br \/>\nHad we not highlighted it, I bet you wouldn&#8217;t have noticed that this folder <em>isn&#8217;t a folder at all, and is in fact an executable malware file!<\/em><\/p>\n<p>This is because this PC does not have the &#8220;Show File Extensions&#8221; option enabled in Folder Options. We will show how to do this at the bottom of this article. The only other clear way to spot this tactic without file extensions enabled is to look for the &#8220;Application&#8221; document type in the locations shown. The problem with this is that a user will double-click the file thinking it&#8217;s actually a folder and then run the malware. With visible file extensions, the user would see a &#8220;.exe&#8221; appended at the end, and no real folder would have this.<\/p>\n<h2>Trick 2 &#8211; Fake File Extension<\/h2>\n<p>This trick is even simpler but it can be quite effective as well. Without Show File Extensions on, a file can still be named &#8220;report.docx&#8221; for example and its icon can be changed to a Microsoft Word Document icon. However, this file can actually still be an executable malware file. In this case, the file will look like a docx and it will even have the icon of a docx, but double-clicking it will launch malware and give it control over the machine. However, showing file extensions will expose this because the file will then show up as &#8220;report.docx.exe&#8221; which is a dead-giveaway that not only is this <em>not a document file<\/em> but it is trying to pose as one and trick you! Please note that <strong>.exe files are not the only type of file that can be malicious<\/strong>. While some are worse than others, the only guaranteed-safe file is a .txt file but <em>this is only the case with Show File Extensions ON!<\/em> Otherwise, it could be a fake .txt file which is actually another format as we introduced above.<\/p>\n<p>These tricks are not new, but coming across them can be rare so the mind is not prepared to do a quick visual check of a new file and can miss such a minute visual difference like this. PC Matic has blocked such attacks many times and in our malware repository, we have seen files such as .docx.wsf which are malicious script files disguised as document files so long as the user cannot see the file extension.<\/p>\n<h1>The Solution<\/h1>\n<p>One way to prevent malware from deceiving you in this way is to have Explorer show you file extensions for every file. To do this:<\/p>\n<p>On Windows 7 and up, hit the Windows key or click the Windows logo icon in the bottom left of the screen, then type &#8220;folder options&#8221; and click the first result which will say either &#8220;Folder Options&#8221; or &#8220;File Explorer Options.&#8221; Now you will have a dialog box with 3 tabs at the top:<\/p>\n<figure id=\"attachment_57487\" aria-describedby=\"caption-attachment-57487\" style=\"width: 1105px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Options.png\"><img decoding=\"async\" class=\" wp-image-57487\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Options.png\" alt=\"Windows 7 Folder Options in Start Menu\" width=\"1105\" height=\"561\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Options.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Options-768x390.png 768w\" sizes=\"(max-width: 1105px) 100vw, 1105px\" \/><\/a><figcaption id=\"caption-attachment-57487\" class=\"wp-caption-text\">Windows 7 Folder options in Start menu<\/figcaption><\/figure>\n<p>Note that in Windows 10, the option will appear in the Start Menu as follows:<\/p>\n<figure id=\"attachment_57489\" aria-describedby=\"caption-attachment-57489\" style=\"width: 1106px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Ops_Win10.png\"><img decoding=\"async\" class=\" wp-image-57489\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Ops_Win10.png\" alt=\"Windows 10 Folder Options\" width=\"1106\" height=\"622\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Ops_Win10.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Ops_Win10-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Folder_Ops_Win10-730x410.png 730w\" sizes=\"(max-width: 1106px) 100vw, 1106px\" \/><\/a><figcaption id=\"caption-attachment-57489\" class=\"wp-caption-text\">As it appears in Windows 10, it&#8217;s called &#8220;File Explorer Options.&#8221; Click it!<\/figcaption><\/figure>\n<p>For Windows XP, an effective way to do this is to go to Start -&gt; Control Panel -&gt; Folder Options.<\/p>\n<p>Click the &#8220;View&#8221; tab, then scroll down the list until you find &#8220;hide file extensions for known file types&#8221;:<\/p>\n<figure id=\"attachment_57488\" aria-describedby=\"caption-attachment-57488\" style=\"width: 379px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NoHideExtensions.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-57488\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NoHideExtensions.png\" alt=\"Show File Extensions\" width=\"379\" height=\"474\" \/><\/a><figcaption id=\"caption-attachment-57488\" class=\"wp-caption-text\">Uncheck hide extensions for known file types<\/figcaption><\/figure>\n<p><strong>Uncheck the box<\/strong>, click Apply and click Ok. Now all of your files will display their file extensions like .exe, .swf, .pdf, .txt, .docx and etc&#8230; If you right click a file and click <strong>rename<\/strong> and then change or delete the file extension, Windows Explorer will no longer recognize that the file is the proper type until you put it back, so just be wary of that. The upside though is now file extensions cannot hide from you and you can easily spot the tricks mentioned above!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order to help avoid problems and PC Pitstop also believes in providing our customers with not just a quality anti-malware solution, but training as well. Let&#8217;s take a look at [&hellip;]<\/p>\n","protected":false},"author":68,"featured_media":54792,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4851],"tags":[4895],"class_list":["post-57484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-research-team","tag-malware-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Avoid these Deceptive Malware Tricks<\/title>\n<meta name=\"description\" content=\"Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoid these Deceptive Malware Tricks\" \/>\n<meta property=\"og:description\" content=\"Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-13T01:33:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-13T01:40:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_tips.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Malware Research\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Malware Research\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/\"},\"author\":{\"name\":\"PC Matic Malware Research\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\"},\"headline\":\"Avoid these Deceptive Malware Tricks\",\"datePublished\":\"2017-07-13T01:33:54+00:00\",\"dateModified\":\"2017-07-13T01:40:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/\"},\"wordCount\":751,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_tips.jpg\",\"keywords\":[\"Malware Research\"],\"articleSection\":[\"Malware Research Team\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/\",\"name\":\"Avoid these Deceptive Malware Tricks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_tips.jpg\",\"datePublished\":\"2017-07-13T01:33:54+00:00\",\"dateModified\":\"2017-07-13T01:40:44+00:00\",\"description\":\"Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_tips.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_tips.jpg\",\"width\":500,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/avoid-deceptive-malware-tricks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoid these Deceptive Malware Tricks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\",\"name\":\"PC Matic Malware Research\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pc-matic-malware-research\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avoid these Deceptive Malware Tricks","description":"Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/","og_locale":"en_US","og_type":"article","og_title":"Avoid these Deceptive Malware Tricks","og_description":"Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order","og_url":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-07-13T01:33:54+00:00","article_modified_time":"2017-07-13T01:40:44+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_tips.jpg","type":"image\/jpeg"}],"author":"PC Matic Malware Research","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Malware Research","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/"},"author":{"name":"PC Matic Malware Research","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c"},"headline":"Avoid these Deceptive Malware Tricks","datePublished":"2017-07-13T01:33:54+00:00","dateModified":"2017-07-13T01:40:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/"},"wordCount":751,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_tips.jpg","keywords":["Malware Research"],"articleSection":["Malware Research Team"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/","url":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/","name":"Avoid these Deceptive Malware Tricks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_tips.jpg","datePublished":"2017-07-13T01:33:54+00:00","dateModified":"2017-07-13T01:40:44+00:00","description":"Of course having PC Matic and PC Matic SuperShield installed will help stop threats in their tracks. Nonetheless, it is important to be educated in order","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_tips.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_tips.jpg","width":500,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/avoid-deceptive-malware-tricks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Avoid these Deceptive Malware Tricks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c","name":"PC Matic Malware Research","url":"https:\/\/www.pcmatic.com\/blog\/author\/pc-matic-malware-research\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57484"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/54792"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}