How to Remove Adware, Pop-up Ads and Redirects from Web Browser

  • By David Lukic
  • Published: Jan 27, 2021
  • Last Updated: Mar 18, 2022

Nothing is more annoying than going to use your computer only to have to deal with pop-ups and browser redirects. When you buy a new computer, it’s fresh and clean and fast. Over time and use without proper protection, your computer can get infected with malware, adware, or even ransomware, and suddenly the speed decreases, you get pop-ups all over the place and annoying ads. Don’t fret; here is what to do to remove adware.

How Your Computer Gets Infected with Adware

Most often, adware and malware are bundled with freeware or other downloads. Typically, paid software is free of those types of things but not always. The problem is when you download a free piece of software, even if the developer is a trusted source, it could be laced with hidden adware or other unwanted programs. Rarely do these programs disclose that along with the software you want, you also get other things like browser toolbars added to your computer.

Usually, you don’t find out until your computer slows down, and you start seeing unwanted pop-ups, or your browser opens pages you don’t want automatically. Sometimes you can get stuck in an endless loop of windows popping open, and despite your efforts to close them, they just keep coming. If you click the links that are on the page, you could be getting your computer browser infected with adware or malware.

Generally, these types of programs target Windows machines rather than Mac computers. However, it is possible for a macOS machine to also be affected.

How to Remove Adware, Malware and Redirects from Your Browser

Follow these steps to delete adware, malware and stop redirects from your browser:

Windows

  1. In Windows, go to the Control Panel and look for Uninstall a program.
  2. You will see the “Programs and Features” screen with all installed software.
  3. Scroll down and look for any programs you do not recognize. Some may sound fishy. Some examples are PDFPoof, BatBitRst, MessengerNow, SearchAd, MyPrintableCoupons, Reading Cursors, ProMediaConverter, PDFOnline-express, See Scenic Elf, Clickware, Easy Speedtest, or WebDiscover.
  4. Click the Uninstall button to remove them. Follow the prompts until complete.
  5. Read the prompts carefully, sometimes the developers try to trick you into canceling the uninstall.
  6. Reboot your computer after you have finished uninstalling.

Mac

  1. On a Mac, open Finder.
  2. On the left-hand side, click Applications.
  3. Look for any programs you don’t recognize.
  4. Drag any programs you don’t want to the Trash.
  5. When you’re done, at the bottom, right-click Trash.
  6. Click Empty Trash.

How to Remove Adware from Chrome

If you use Chrome as your web browser, it includes a tool for finding and removing these types of programs. To use it:

  1. Open Chrome and go to the three-dot menu > Settings.
  2. Click Advanced.
  3. Look for “reset and clean up” and choose “Clean up computer.”
  4. Click Find.
  5. You may be asked to reboot your computer after the removal.

Browser Reset for Chrome

You also need to restore your browser back to factory settings.
  1. In Windows, go to the Settings > Advanced.
  2. Look for Reset Settings.
  3. If you are on a Mac or Chromebook, the menu item is called Restore settings to their original defaults > Reset Settings.
As a precaution, also go into your browser extensions menu and review the add-ons in there. Sometimes adware is added as a toolbar or other unwanted extension.
 
how to get rid of adware

Run a Virus Scan

The final step to cleaning up your computer is running a full virus scan that looks for any remaining hidden malware, adware, or other viruses. One free tool is Malwarebytes, and you can download it and run a full scan for nothing. First, you will have to install the antivirus program and then run a deep scan. That process will find and remove any remaining issues causing pop-ups, ads, or browser redirects.

How to Stay Safe from Adware, Malware and Browser Redirects

The trick to not having to deal with all these computer issues is never getting infected in the first place. Some tips to keep your computer malware free are:
 
  • Only download and install software from trusted sources. Always choose customized set up so you can uncheck any additional programs they want to install.
  • Keep your computer and other devices updated with security patches and the most recent operating system.
  • Keep a good antivirus program installed and run deep scans often.
  • Never click links or open attachments in emails. Always be careful of suspicious-sounding emails.
  • Avoid unsecure websites which might be infected with adware, ransomware, or malware.

The best way to stay safe is to run antivirus/anti-malware scans often, keep your system updated, and use common sense with downloads.

 
About the Author
IDStrong Logo

Related Articles

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, st ... Read More

How Does a VPN Work and How to Choose one

VPN stands for virtual private network. It allows you to hide your public IP address and browse pr ... Read More

Complete Guide to Android Security

The Android platform offers a ton of flexibility and customization for users. However, all that fr ... Read More

Increase Your Google Privacy Settings in 4 Easy Steps

In this time of digital transparency and data breaches, it’s more important than ever to fee ... Read More

Instagram Privacy Policy: What You Should Know?

Instagram is a great place to share your best photos and messages with your followers, but have yo ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close