By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Scammers Want Our Data, Yet CNET Finds Many of Us Aren't Protecting Our Devices
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Scammers Want Our Data, Yet CNET Finds Many of Us Aren't Protecting Our Devices
News

Scammers Want Our Data, Yet CNET Finds Many of Us Aren't Protecting Our Devices

News Room
Last updated: 2026/04/06 at 11:18 AM
News Room Published 6 April 2026
Share
Scammers Want Our Data, Yet CNET Finds Many of Us Aren't Protecting Our Devices
SHARE

Scammers will never pass up an opportunity to use malware to steal your data. While we’re using the internet for nearly everything from banking to social media, they’re creating thousands of new viruses daily to target the activities you engage in the most.
   
Maybe we’ve gotten too comfortable online, checking for the usual red flags like suspicious links and misspellings. And we’ve trusted antivirus software to shield us from those sneaky attempts to install malicious software that can gather our personal information in seconds. ‘s latest findings show that, despite advancements in antivirus software and other cybersecurity tools, scammers are still finding ways to bypass our trusted antivirus software. 

Over half (54%) of US adults with personal laptops have encountered potential malware on these devices in the past year. It may surprise you to learn which malware threat is leading and what laptop owners do when they encounter potential malware. 

What you do when you come across a malicious link, email or app download is what matters most. Ignoring a pop-up or clicking a link out of curiosity can lead to a virus, identity theft and even fraud. 

We can help you navigate these instances. Here are ‘s latest survey findings, and how far ‘s experts say antivirus software can really protect you from phishing headaches and hassles.

  • 78% of US adults currently own a personal laptop. More than half of the laptop brands US adults own are HP (32%) and Apple (26%) brands.
  • Over half (54%) of laptop owners have encountered potential malware on their personal laptop over the past 12 months.
  • 88% who reported seeing potential malware in the past 12 months took action against it, while 12% did nothing.
  • 68% of laptop owners who took action either deleted the file or closed the suspicious website or pop-up.
  • 37% of laptop owners have received phishing emails in the past 12 months.

Laptop owners have encountered phishing emails the most

My mom just got a new laptop and told me she doesn’t need antivirus protection. She’s not entirely wrong. ‘s antivirus experts, Moe Long and Attila Tomaschek, say you don’t necessarily need another antivirus program if your device already has built-in antivirus protection — as most computers today do.

Windows 11 includes Microsoft Defender antivirus protection. Mac users have XProtect to check for malware, while the Malware Removal tool catches anything XProtect may have missed. And the Gatekeeper feature stops you from opening apps and software that aren’t trusted. But viruses, phishing and malware attempts are still lurking, as ‘s study shows.

found that over the past year, US adults who own a laptop have encountered or interacted with phishing emails most often (37%), followed by urgent pop-ups (24%), unusual payment requests (17%), and branded spoofing (17%). 

-antivirus-survey-malware-types.png


Enlarge Image

-antivirus-survey-malware-types.png
Tharon Green/

Cybercriminals are using artificial intelligence to make scams more believable — even through impersonation. And they’re coming up with new tactics much faster than in the 1990s, when we all took our desktops to the Geek Squad for help after a scammer’s successful malware attack. 

But here’s the most important distinction to know: Antivirus software may not be able to help identify phishing and malware attempts that are constantly evolving. It can help prevent malicious software from attacking your device and personal data, so long as that malware is in its database of known threats. But you’ll need to use your best judgment to avoid clicking those suspicious links first. 

88% of US adults took action after seeing potential malware

found that 88% of US adults who own laptops took action after coming across potential malware over the past year. That’s encouraging news for Long and Tomaschek. 

“You don’t really want to mess around with malware, especially the way a lot of modern malware is designed to get your data instead of crashing your computer or something like that,” Long says. 

Here’s a closer look at how laptop owners take action. 

-antivirus-survey-malware-responses.png


Enlarge Image

-antivirus-survey-malware-responses.png
Tharon Green/

Over half (60%) of US adults either manually deleted the file or closed a website or pop-up, and 35% immediately ran an antivirus or anti-malware scan. However, Long says some of these actions are effective and helpful, while others aren’t. 

If there’s a malicious pop-up, and you close it without clicking a link, you may not have to worry about malware or a virus, Long says. If you download a malicious file, you might be able to delete it before it does any harm. But if you download an executable file, like a software application that infects your device when it’s run, you could actually be installing malware on your computer along with what you think is just an application. 

Some actions are definitely worth taking, like immediately running an antivirus or anti-malware scan after encountering malware (35%), says Long. 

But other actions aren’t, like installing a VPN, which 8% of US laptop owners do, according to . 

Long says that a VPN is a privacy tool, and it has very few security benefits. If you’re using a VPN on a public Wi-Fi network that’s under attack, a VPN can mitigate the risk of the attack reaching your device. But for the most part, VPNs are just another part of your cybersecurity toolkit, but for privacy, not online security, says Tomaschek.

The best course of action if you believe your computer is infected with malware is to perform a factory reset to wipe your hard drive clean, leaving nothing behind from the current state. You’ll also need to make sure you don’t restore from a backup where you had that malware infecting your machine, Long says. Keep in mind that it won’t erase any information that attackers may have retrieved. 

There are other measures you can take to try resolving a potential malware infection without a factory reset. Long recommends disconnecting your device from the internet to prevent it from infecting other devices on your network. Then, try using advanced malware scanners, like Microsoft Defender’s offline scanner, to try to find and resolve any threats. But be careful — infected files could harm other devices if you transfer them.

There’s not a one-size-fits-all solution to dealing with malware, but if you think your device is infected with malware, factory resetting it completely can be a good option, although it’s important to note that even a full factory reset may not be able to remove some malicious software, such as malware that’s embedded in difficult-to-reach locations, such as a rootkit.

If you click a link in a phishing email or pop-up, it’s best to act right away to minimize damage — though that’s not guaranteed. Your device may have malware installed if it isn’t working normally, you’re getting pop-ups or seeing programs that you didn’t install. 

However, the signs of malware or phishing aren’t always clear, so it’s best to use a malware scanner, like Malwarebytes, to see if malicious software was installed on your device. If so, your antivirus program can give you steps to remove it. Afterward, Long advises downloading another malware scanner to double-check and try to make sure the malware is completely removed.

On the other hand, 12% of laptop owners don’t take any action at all, which is concerning.
   
“People may not take action because they may believe it’s a false positive, but you should still verify that it’s not malware, and if it is, you should definitely take action,” Long says. A malware scanner is still a good first step for scanning your computer’s memory, files and programs for viruses.

If you suspect that you’re a victim of a scam, report it on the Federal Trade Commission’s website.

Watch this: How to Recover After Giving a Scammer Your Personal Information

03:17

‘Cybersecurity now is a multitool approach’

Antivirus software won’t protect you from a data breach, your data being on the dark web or identity theft. 

“Cybersecurity now is a multitool approach,” Long says. “There are a number of different apps that people will want to have in addition to antivirus protection to make sure that they are staying secure and private.” 

Tomaschek recommends educating yourself about the different types of scams and viruses to stay aware of which ones are on the rise. The Federal Trade Commission has news about the latest scams and lets you report them. 

It’s also important to learn how to identify phishing and malware attempts on both your phone and computer. Look for red flags like misspellings, odd email addresses or links from domains you’ve never seen before. If you’re still unsure, contact the company directly through a different channel. Long also recommends other common internet safety practices, like using strong passwords and downloading software or apps only from verified sources, like Apple’s App Store or an official company website. 

It’s also best to make sure your computer has the latest software update, which may include security upgrades. Next, arm yourself with a wide range of tools for better online security and privacy. It may all sound like a lot, but ‘s experts have a few recommendations to help narrow down your search for the right cybersecurity tools. Here’s a list: 

The best tools for online security and privacy

Antivirus software The right antivirus software can help spot malware downloaded onto your computer. recommends Bitdefender for its budget-friendly plan options, which offer strong antivirus features, including active scans that use minimal computer resources in the background. And it has a comprehensive list of digital security tools.
Identity theft protection Signing up for an identity theft protection service can alert you if your personal data is found on the dark web or in a data breach, so that you can take action. recommends Aura as the best identity theft protection service overall for its plans, easy-to-use interface and three-credit bureau monitoring.
Password manager The right password manager helps you generate complex passwords and safely store them from hackers. recommends Bitwarden for password management because it has a pretty good free plan that syncs across multiple devices.
VPN You’ll need a VPN to mask your IP address and encrypt your internet traffic when using public Wi-Fi or whenever you want to boost your online privacy. ExpressVPN is ‘s top pick for its easy-to-use interface and speed, which are must-haves if you’re using a VPN for streaming. ExpressVPN has servers in all 50 states. However, it’s one of the more expensive options.

Methodology 

All figures, unless otherwise stated, are from YouGov Plc. The total sample size was 2,539 adults, of whom 1,989 own a personal laptop. Fieldwork was undertaken March 18-20, 2026. The survey was carried out online. The figures have been weighted and are representative of all US adults (aged 18-plus). 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Galaxy S26 Ultra just hit its best price yet, and you don’t even need a trade-in Galaxy S26 Ultra just hit its best price yet, and you don’t even need a trade-in
Next Article NetBSD 11.0 Nears Release With RC3 Released For Testing NetBSD 11.0 Nears Release With RC3 Released For Testing
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Tech Moves: Microsoft names corporate VP; Amazon exec departs for Google; Zoom names CPO
Tech Moves: Microsoft names corporate VP; Amazon exec departs for Google; Zoom names CPO
Computing
iOS 26.5 Public Beta: Is End-to-End Encrypted RCS Messaging Finally Coming to iPhone?
iOS 26.5 Public Beta: Is End-to-End Encrypted RCS Messaging Finally Coming to iPhone?
News
FreeBSD Aims To Better Track Laptop Hardware That Works Or Doesn’t For Their OS
FreeBSD Aims To Better Track Laptop Hardware That Works Or Doesn’t For Their OS
Computing
Your Smart Home Is a Target for Hackers. Lock It Down With These Quick Tips
Your Smart Home Is a Target for Hackers. Lock It Down With These Quick Tips
News

You Might also Like

iOS 26.5 Public Beta: Is End-to-End Encrypted RCS Messaging Finally Coming to iPhone?
News

iOS 26.5 Public Beta: Is End-to-End Encrypted RCS Messaging Finally Coming to iPhone?

4 Min Read
Your Smart Home Is a Target for Hackers. Lock It Down With These Quick Tips
News

Your Smart Home Is a Target for Hackers. Lock It Down With These Quick Tips

13 Min Read
Apple may have scraped YouTube videos without permission for AI training
News

Apple may have scraped YouTube videos without permission for AI training

1 Min Read
Microsoft: Copilot AI is for ‘entertainment purposes only,’ not ‘important advice’
News

Microsoft: Copilot AI is for ‘entertainment purposes only,’ not ‘important advice’

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?