How to Remove Adware, Pop-up Ads and Redirects from Web Browser

  • By David Lukic
  • Published: Jan 27, 2021
  • Last Updated: Mar 18, 2022

Nothing is more annoying than going to use your computer only to have to deal with pop-ups and browser redirects. When you buy a new computer, it’s fresh and clean and fast. Over time and use without proper protection, your computer can get infected with malware, adware, or even ransomware, and suddenly the speed decreases, you get pop-ups all over the place and annoying ads. Don’t fret; here is what to do to remove adware.

How Your Computer Gets Infected with Adware

Most often, adware and malware are bundled with freeware or other downloads. Typically, paid software is free of those types of things but not always. The problem is when you download a free piece of software, even if the developer is a trusted source, it could be laced with hidden adware or other unwanted programs. Rarely do these programs disclose that along with the software you want, you also get other things like browser toolbars added to your computer.

Usually, you don’t find out until your computer slows down, and you start seeing unwanted pop-ups, or your browser opens pages you don’t want automatically. Sometimes you can get stuck in an endless loop of windows popping open, and despite your efforts to close them, they just keep coming. If you click the links that are on the page, you could be getting your computer browser infected with adware or malware.

Generally, these types of programs target Windows machines rather than Mac computers. However, it is possible for a macOS machine to also be affected.

How to Remove Adware, Malware and Redirects from Your Browser

Follow these steps to delete adware, malware and stop redirects from your browser:

Windows

  1. In Windows, go to the Control Panel and look for Uninstall a program.
  2. You will see the “Programs and Features” screen with all installed software.
  3. Scroll down and look for any programs you do not recognize. Some may sound fishy. Some examples are PDFPoof, BatBitRst, MessengerNow, SearchAd, MyPrintableCoupons, Reading Cursors, ProMediaConverter, PDFOnline-express, See Scenic Elf, Clickware, Easy Speedtest, or WebDiscover.
  4. Click the Uninstall button to remove them. Follow the prompts until complete.
  5. Read the prompts carefully, sometimes the developers try to trick you into canceling the uninstall.
  6. Reboot your computer after you have finished uninstalling.

Mac

  1. On a Mac, open Finder.
  2. On the left-hand side, click Applications.
  3. Look for any programs you don’t recognize.
  4. Drag any programs you don’t want to the Trash.
  5. When you’re done, at the bottom, right-click Trash.
  6. Click Empty Trash.

How to Remove Adware from Chrome

If you use Chrome as your web browser, it includes a tool for finding and removing these types of programs. To use it:

  1. Open Chrome and go to the three-dot menu > Settings.
  2. Click Advanced.
  3. Look for “reset and clean up” and choose “Clean up computer.”
  4. Click Find.
  5. You may be asked to reboot your computer after the removal.

Browser Reset for Chrome

You also need to restore your browser back to factory settings.
  1. In Windows, go to the Settings > Advanced.
  2. Look for Reset Settings.
  3. If you are on a Mac or Chromebook, the menu item is called Restore settings to their original defaults > Reset Settings.
As a precaution, also go into your browser extensions menu and review the add-ons in there. Sometimes adware is added as a toolbar or other unwanted extension.
 
how to get rid of adware

Run a Virus Scan

The final step to cleaning up your computer is running a full virus scan that looks for any remaining hidden malware, adware, or other viruses. One free tool is Malwarebytes, and you can download it and run a full scan for nothing. First, you will have to install the antivirus program and then run a deep scan. That process will find and remove any remaining issues causing pop-ups, ads, or browser redirects.

How to Stay Safe from Adware, Malware and Browser Redirects

The trick to not having to deal with all these computer issues is never getting infected in the first place. Some tips to keep your computer malware free are:
 
  • Only download and install software from trusted sources. Always choose customized set up so you can uncheck any additional programs they want to install.
  • Keep your computer and other devices updated with security patches and the most recent operating system.
  • Keep a good antivirus program installed and run deep scans often.
  • Never click links or open attachments in emails. Always be careful of suspicious-sounding emails.
  • Avoid unsecure websites which might be infected with adware, ransomware, or malware.

The best way to stay safe is to run antivirus/anti-malware scans often, keep your system updated, and use common sense with downloads.

 
About the Author
IDStrong Logo

Related Articles

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, st ... Read More

How Does a VPN Work and How to Choose one

VPN stands for virtual private network. It allows you to hide your public IP address and browse pr ... Read More

Complete Guide to Android Security

The Android platform offers a ton of flexibility and customization for users. However, all that fr ... Read More

Increase Your Google Privacy Settings in 4 Easy Steps

In this time of digital transparency and data breaches, it’s more important than ever to fee ... Read More

Instagram Privacy Policy: What You Should Know?

Instagram is a great place to share your best photos and messages with your followers, but have yo ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close