SlideShare a Scribd company logo
1 of 11
• Fake ads
• Browsing too deep in search engine results
• Impersonating websites
• Social media scams
• “Scareware” pop-up windows
• E-mail attachments/scams
• YouTube Scams
• Outdated AV (Antivirus) software/Windows Updates
Malware – (short for malicious software) is software, script, or code designed to
disrupt computer operation, gather sensitive information, or gain unauthorized access
to computer systems.
Beware of fake ads! There are a multitude of these ads that trick you into doing something
not related to what you originally intended to do.
This ad wants you to run a scan for
“Windows errors” before you continue.
These ads want to trick you to download
their product instead of the one you
originally intended.
There are also fake ads on Google! While searching CCleaner, a free product, an
ad comes up on the right-hand side that wants you to pay $30 for it’s product.
Oh, they’re not just on Google
search, they’re everywhere!
When you search a subject, do you go on-and-on through pages of search results to find
answers? Well, that may not be a good thing! The deeper you go, the more you’ll find
pages un-related to your initial result, making a higher risk of accessing an infected
website. They are easy to detect as most of the time they do not make sense and it’s title
and description is entirely unrelated to your initial search. Use common sense!
Here’s some deep search results for
“Lactose Intolerance”
Note: Nothing about this result
makes any sense! Should you
click on it? NO
“By Newton who discovered that an apple
will had read The Exile but.”
Keep a look-out for websites that impersonate legitimate websites. They are fraudulent.
Normally it’s easy to notice the poor grammar, certificate warnings, and broken links.
Most common ways of stumbling on an impersonating website is falling for a scam, either
on Facebook or in an e-mail. It’s also common to find them in a deep search listing.
Here’s a common scam that impersonates
Southwest Airlines, generously giving out free
tickets. By entering your e-mail you’ll quickly
realize there’s no free tickets but an inbox full of
spam e-mail instead. Sweet!
TIP: Always pay attention to the URL in the
address bar! If it doesn’t relate to domain of the
website, in this case, southwestairlines.com, it’s
highly likely that it’s an impersonation!
Everyone uses social media today, even your grandma, making it a play ground for scammers.
These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
1. Don’t trust a post, message, or invite just because it comes from a friend. Their
account could have been compromised, or they were tricked into clicking on a scam.
2. Your like and share are a valuable personal recommendation to your friends and
family. Please use them cautiously. Do a search to check out whether if something is
valid before sharing it.
3. Be very suspicious of offers for free stuff, especially ones that start with you having
to like or share something.
4. Don’t follow links that accompany some hysterical or generic text such as “OMG!!
CAN YOU BELIEVE THIS?”
5. Avoid links that promise some current event “scoop” such as “Whale on a house” or
“Osama Bin Laden death video”
6. There is no application that allows you to see who has been viewing your page.
Never click on a link to an app that promises that functionality. You’ll regret it.
7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of
a child in a hospital bed.
The most common way that a virus gets installed onto a system is by scaring you that
something is wrong with your computer, tricking you to download or buy its product to “fix it”.
Popular ways to avoid this:
Nothing can detect that you have a
virus on your system EXCEPT for the
antivirus software running on your
computer! If anything else does, it
should be avoided by all costs!
If you ever encounter this “Scareware”, do not interact with the window. Even
clicking the “X”! Just by doing that, it is coded to silently install it’s malware on
your computer. To avoid this, shut down your computer instead.
Do not scan your computer for
registry errors. It will not improve
system performance or make it
faster. This is a very popular tactic
to install malware on your
computer by the large volume of
fake software available.
Quick tip: Windows Security Center is not an antivirus and will not
tell you that there are errors with your computer or a malware
infection. It is actually a management tool of your computer’s
security software. If you get a “virus” notification from it, don’t
interact and do a virus scan immediately with your antivirus!
This is a very popular, yet annoying tactic for oversea agencies to install malware on your
computer or commit fraud.
However, it’s easy to avoid. If an e-mail
comes in with no subject and a single
link, it’s spam. If an e-mail comes in
with poor grammar that you have
an inheritance from a Nigerian prince,
it’s a scam. Simply delete and forget!
But what if it comes from a friend?
How do you know if it’s legitimate?
Call them and ask!
It’s common to click on a video on YouTube claiming to be a full movie or your favorite show
but only plays a still image, asking you to refer to the link in the description to see the full
thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of
spam and your computer is full of malware. A lose/lose situation!
How to avoid this?
Don’t search for free movies or full TV episodes
on YouTube! You simply won’t find them! Not
only is it illegal without discretion for them to be
uploaded, it’s also against YouTube’s ToS. They
are usually removed as soon as they are
uploaded.
It doesn’t just happen with searching for
movies, it can also be breaking news stories or
just about anything that will get a lot attention.
Always look at the ratings before you click on
the video. Normally the fake videos are rated
very low.

More Related Content

What's hot

Final paper
Final paperFinal paper
Final paper
JDonpfd3
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
jessica97
 
Internet safety
Internet safetyInternet safety
Internet safety
BOAMEDIA
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
Ernest Staats
 

What's hot (11)

Safety&Ethics
Safety&EthicsSafety&Ethics
Safety&Ethics
 
Final paper
Final paperFinal paper
Final paper
 
Spam!
Spam!Spam!
Spam!
 
How to remove fanli90.cn
How to remove fanli90.cnHow to remove fanli90.cn
How to remove fanli90.cn
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents
 
Justice for Mms sex scandal victims
Justice for Mms sex scandal victimsJustice for Mms sex scandal victims
Justice for Mms sex scandal victims
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 

Viewers also liked

El software y el hardware bb
El software y el  hardware bbEl software y el  hardware bb
El software y el hardware bb
Jhonatan Henao
 
DigitalRiverBrandsReport
DigitalRiverBrandsReportDigitalRiverBrandsReport
DigitalRiverBrandsReport
Kate Roe
 
Managing change in today's ever changing world of work
Managing change in today's ever changing world of workManaging change in today's ever changing world of work
Managing change in today's ever changing world of work
Caleb Stick
 

Viewers also liked (20)

Patrick Seguin Experience
Patrick Seguin ExperiencePatrick Seguin Experience
Patrick Seguin Experience
 
MoDev East 2012 Presentation on Product Modernization
MoDev East 2012 Presentation on Product ModernizationMoDev East 2012 Presentation on Product Modernization
MoDev East 2012 Presentation on Product Modernization
 
Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law Enforcement
 
Content is King
Content is KingContent is King
Content is King
 
El software y el hardware bb
El software y el  hardware bbEl software y el  hardware bb
El software y el hardware bb
 
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
 
DigitalRiverBrandsReport
DigitalRiverBrandsReportDigitalRiverBrandsReport
DigitalRiverBrandsReport
 
Prototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUXPrototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUX
 
Humor u rebt u
Humor u rebt uHumor u rebt u
Humor u rebt u
 
A Prototyping Case Study at NoVA UX
A Prototyping Case Study at NoVA UX A Prototyping Case Study at NoVA UX
A Prototyping Case Study at NoVA UX
 
Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520
 
Automated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian BaleaAutomated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian Balea
 
All-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITAll-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & IT
 
Cv 201503 eng_short
Cv 201503 eng_shortCv 201503 eng_short
Cv 201503 eng_short
 
Images of Mary
Images of MaryImages of Mary
Images of Mary
 
Psychological Issues and the law
Psychological Issues and the lawPsychological Issues and the law
Psychological Issues and the law
 
Managing change in today's ever changing world of work
Managing change in today's ever changing world of workManaging change in today's ever changing world of work
Managing change in today's ever changing world of work
 
Three Things a New Product Team Needs - Jessica Hall's Presentation at the Bu...
Three Things a New Product Team Needs - Jessica Hall's Presentation at the Bu...Three Things a New Product Team Needs - Jessica Hall's Presentation at the Bu...
Three Things a New Product Team Needs - Jessica Hall's Presentation at the Bu...
 
DevOps for Windows Admins
DevOps for Windows Admins DevOps for Windows Admins
DevOps for Windows Admins
 
Introducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUIntroducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVU
 

Similar to How to Avoid Getting Malware on your Computer

Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Celia Bandelier
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
Ray Brannon
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
Ray Brannon
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
Ray Brannon
 
Internet issues
Internet issuesInternet issues
Internet issues
CJ900
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
Ray Brannon
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 

Similar to How to Avoid Getting Malware on your Computer (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
School presentation
School presentationSchool presentation
School presentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

How to Avoid Getting Malware on your Computer

  • 1.
  • 2. • Fake ads • Browsing too deep in search engine results • Impersonating websites • Social media scams • “Scareware” pop-up windows • E-mail attachments/scams • YouTube Scams • Outdated AV (Antivirus) software/Windows Updates
  • 3. Malware – (short for malicious software) is software, script, or code designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
  • 4. Beware of fake ads! There are a multitude of these ads that trick you into doing something not related to what you originally intended to do. This ad wants you to run a scan for “Windows errors” before you continue. These ads want to trick you to download their product instead of the one you originally intended. There are also fake ads on Google! While searching CCleaner, a free product, an ad comes up on the right-hand side that wants you to pay $30 for it’s product. Oh, they’re not just on Google search, they’re everywhere!
  • 5. When you search a subject, do you go on-and-on through pages of search results to find answers? Well, that may not be a good thing! The deeper you go, the more you’ll find pages un-related to your initial result, making a higher risk of accessing an infected website. They are easy to detect as most of the time they do not make sense and it’s title and description is entirely unrelated to your initial search. Use common sense! Here’s some deep search results for “Lactose Intolerance” Note: Nothing about this result makes any sense! Should you click on it? NO “By Newton who discovered that an apple will had read The Exile but.”
  • 6. Keep a look-out for websites that impersonate legitimate websites. They are fraudulent. Normally it’s easy to notice the poor grammar, certificate warnings, and broken links. Most common ways of stumbling on an impersonating website is falling for a scam, either on Facebook or in an e-mail. It’s also common to find them in a deep search listing. Here’s a common scam that impersonates Southwest Airlines, generously giving out free tickets. By entering your e-mail you’ll quickly realize there’s no free tickets but an inbox full of spam e-mail instead. Sweet! TIP: Always pay attention to the URL in the address bar! If it doesn’t relate to domain of the website, in this case, southwestairlines.com, it’s highly likely that it’s an impersonation!
  • 7. Everyone uses social media today, even your grandma, making it a play ground for scammers. These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
  • 8. 1. Don’t trust a post, message, or invite just because it comes from a friend. Their account could have been compromised, or they were tricked into clicking on a scam. 2. Your like and share are a valuable personal recommendation to your friends and family. Please use them cautiously. Do a search to check out whether if something is valid before sharing it. 3. Be very suspicious of offers for free stuff, especially ones that start with you having to like or share something. 4. Don’t follow links that accompany some hysterical or generic text such as “OMG!! CAN YOU BELIEVE THIS?” 5. Avoid links that promise some current event “scoop” such as “Whale on a house” or “Osama Bin Laden death video” 6. There is no application that allows you to see who has been viewing your page. Never click on a link to an app that promises that functionality. You’ll regret it. 7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of a child in a hospital bed.
  • 9. The most common way that a virus gets installed onto a system is by scaring you that something is wrong with your computer, tricking you to download or buy its product to “fix it”. Popular ways to avoid this: Nothing can detect that you have a virus on your system EXCEPT for the antivirus software running on your computer! If anything else does, it should be avoided by all costs! If you ever encounter this “Scareware”, do not interact with the window. Even clicking the “X”! Just by doing that, it is coded to silently install it’s malware on your computer. To avoid this, shut down your computer instead. Do not scan your computer for registry errors. It will not improve system performance or make it faster. This is a very popular tactic to install malware on your computer by the large volume of fake software available. Quick tip: Windows Security Center is not an antivirus and will not tell you that there are errors with your computer or a malware infection. It is actually a management tool of your computer’s security software. If you get a “virus” notification from it, don’t interact and do a virus scan immediately with your antivirus!
  • 10. This is a very popular, yet annoying tactic for oversea agencies to install malware on your computer or commit fraud. However, it’s easy to avoid. If an e-mail comes in with no subject and a single link, it’s spam. If an e-mail comes in with poor grammar that you have an inheritance from a Nigerian prince, it’s a scam. Simply delete and forget! But what if it comes from a friend? How do you know if it’s legitimate? Call them and ask!
  • 11. It’s common to click on a video on YouTube claiming to be a full movie or your favorite show but only plays a still image, asking you to refer to the link in the description to see the full thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of spam and your computer is full of malware. A lose/lose situation! How to avoid this? Don’t search for free movies or full TV episodes on YouTube! You simply won’t find them! Not only is it illegal without discretion for them to be uploaded, it’s also against YouTube’s ToS. They are usually removed as soon as they are uploaded. It doesn’t just happen with searching for movies, it can also be breaking news stories or just about anything that will get a lot attention. Always look at the ratings before you click on the video. Normally the fake videos are rated very low.