FacebookTwitterLinkedIn

Disregard "We have detected a potential risk of unsecured connection"

Also Known As: We have detected a potential risk of unsecured connection pop-up
Type: Mac Virus
Damage level: Medium

What is the "We have detected a potential risk of unsecured connection" fake alert?

"We have detected a potential risk of unsecured connection" is a scam promoted on various deceptive sites. This scheme targets Apple device users.

It makes false claims about users' Internet connection not being secure - in order to trick them into downloading/installing and/or purchasing untrustworthy software products. Typically, scams of this type endorse fake anti-viruses, adware, browser hijackers, and other PUAs (Potentially Unwanted Applications).

These schemes may even proliferate malware, e.g., trojans, ransomware, cryptocurrency miners, etc. Visitors to scam websites seldom access them intentionally; most get redirected to the pages by intrusive advertisements or installed PUAs.

We have detected a potential risk of unsecured connection scam

When a webpage running the "We have detected a potential risk of unsecured connection" scam is accessed, it displays a pop-up window. Text presented in it states that the site has detected that users' connection is unsecured, which is a potential risk.

It must be emphasized that no webpage can actually detect threats/issues present on visitors' systems; hence, any that may such claims are scams. The pop-up then instructs users to follow the instructions provided in the next page - to protect their Apple devices. The second page displays a pop-up window.

The message in it - informs users that a new update has been released for the endorsed VPN software. Without it installed, the device might be vulnerable to data theft, i.e., at risk of having banking and other private information stolen.

To avoid these issues, the scheme urges users to download/install the promoted app. Consenting redirects to a different webpage, which requests users to provide their telephone numbers.

This will supposedly be used to send a one-time SMS that contains a link, through which users will be able to download/install the VPN.

The message also states that standard messaging rates may apply. It is strongly recommended against trusting the "We have detected a potential risk of unsecured connection" scam, as that can result in system infections, severe privacy issues, financial losses, and even identity theft.

Online schemes often promote various PUAs. Unwanted software appears legitimate and offers "useful" features, which are rarely operational. Fake anti-virus tools are prime examples of this kind of PUAs.

They require activation (i.e., purchase) to perform the promised functionalities, yet even after activation - the functions remain nonoperational. Furthermore, PUAs can have unmentioned, heinous abilities.

Some of these apps force-open misleading, deceptive, and malicious websites (e.g., ones running "We have detected a potential risk of unsecured connection"). Adware-types run intrusive advertisement campaigns. The delivered ads diminish the browsing experience and pose a threat to device/user safety.

Once clicked on, intrusive adverts redirect to dangerous sites, and some can stealthily download/install software. Browser hijackers are another kind of PUAs; they operate by making alterations to browser settings and restricting/denying access to them - in order to promote fake search engines.

The promoted web searchers usually cannot provide search results, so they redirect to Yahoo, Bing, Google, and other legitimate search engines.

What is more, most PUAs can track data. Information of interest includes: browsing and search engine histories, IP addresses, geolocations, and even personally identifiable details. The collected data is then monetized by being shared with and/or sold to third-parties (potentially, cyber criminals).

Therefore, it is highly recommended to remove all suspicious applications and browser extensions/plug-ins immediately upon detection.

The "We have detected a potential risk of unsecured connection" scheme also has phishing scam elements. It requests users to provide their telephone numbers, which can then be charged with SMS and/or phone call fees.

Alternatively, scammers can sell the data (e.g., numbers) to third-parties, like advertisers, cyber criminals, etc. The numbers can be used to further other scams as well. It is noteworthy that successfully scammed victims are often targeted repeatedly.

Threat Summary:
Name We have detected a potential risk of unsecured connection pop-up
Threat Type Phishing, Scam, Mac malware, Mac virus
Fake Claim Scam claims users' Internet connection is unsafe.
Related Domains vpnsecurityalert[.]com
Detection Names (vpnsecurityalert[.]com) Spamhaus (Phishing), Certego (Spam), Fortinet (Spam), Full List (VirusTotal)
Serving IP Address (vpnsecurityalert[.]com) 192.64.117.32
Promoted Unwanted Application Various dubious applications
Symptoms Your Mac becomes slower than normal, you see unwanted pop-up ads, you are redirected to dubious websites.
Distribution methods Deceptive pop-up ads, free software installers (bundling), fake Flash Player installers, torrent file downloads.
Damage Internet browser tracking (potential privacy issues), display of unwanted ads, redirects to dubious websites, loss of private information.
Malware Removal (Mac)

To eliminate possible malware infections, scan your Mac with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
▼ Download Combo Cleaner for Mac
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

"Hackers are watching you!", "VPN Update", "Device Infected After Visiting An Adult Website", and "Your system is heavily damaged by Two viruses!" are some examples of scams similar to "We have detected a potential risk of unsecured connection".

There are thousands of deceptive webpages on the Internet. Popular scam models include (but are not limited to): warnings that the device is infected or at risk, alerts that a piece of software is outdated or missing, fake prize giveaways and raffles, unbelievable deals and offers, and so on.

Regardless of what such schemes claim, offer, request, or demand, the end-goal is always the same - to generate profit for their designers. Due to how widespread scams are, it is important to exercise caution when browsing.

How did potentially unwanted applications install on my computer?

PUAs can have "official" download webpages, which can be promoted deceptive/scam sites. These applications can also be downloaded/installed together with other programs. This false marketing method of packing regular software with unwanted or malicious additions - is termed "bundling".

Rushed download/installation processes (e.g., ignored terms, skipped steps, etc.) increase the risk of unintentionally allowing bundled content into the device. When clicked on, intrusive advertisements can execute scripts to download/install PUAs without user permission.

How to avoid installation of potentially unwanted applications?

It is recommended to research software before download/installation and/or purchase. Additionally, all downloads must be performed from official and verified sources.

Untrustworthy download channels, e.g., unofficial and free file-hosting websites, Peer-to-Peer sharing networks, and other third-party downloaders - commonly offer harmful and/or bundled content. Download and installation processes must be approached with care.

That entails - reading terms, studying possible options, using the "Custom/Advanced" settings and declining to download/install supplementary apps, tools, functions, etc.

Intrusive adverts appear ordinary and innocuous; however, they redirect to various unreliable and questionable sites (e.g., gambling, pornography, adult-dating, and so forth).

In case of encounters with ads and/or redirects of this type, the system must be inspected and all dubious applications and browser extensions//plug-ins detected - removed from it without delay.

If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for macOS to automatically eliminate them.

Text presented in the first pop-up window displayed by the "We have detected a potential risk of unsecured connection" scam:

Attention!
We have detected a potential risk of unsecured connection. Tap OK and follow the instructions to protect your Apple devices.

 

Close

Screenshot of "We have detected a potential risk of unsecured connection" scam's second webpage:

We have detected a potential risk of unsecured connection scam second page

Appearance of the mobile variant's second webpage:

We have detected a potential risk of unsecured connection scam second page (mobile version)

Text presented in this webpage:

HideoutVPN update released!
Browsing on your device is probably not protected with HideoutVPN and might be vulnerable for stealing personal data through unsecured connection.

 

You should install and activate it or your privacy and banking information on your Apple device can be stolen by cybercriminals.
0 minute 15 seconds

 

Cancel    Install

Screenshot of "We have detected a potential risk of unsecured connection" scam's third webpage:

We have detected a potential risk of unsecured connection scam third page

Appearance of the mobile variant's third webpage:

We have detected a potential risk of unsecured connection scam third page (mobile version)

Text presented in this webpage:

Welcome to VPNHideout!
You will receive a one-time SMS to download the app

 

Phone number:
Send me the app

 

By providing your phone number, you agree to receive a one-time automated text message with a link to get the app. Standard messaging rates may apply.

To enable pop-up blocking, fraudulent website warnings, and remove web browsing data in mobile Apple devices, follow these steps:

First, go to "Settings", and then scroll down to find and tap "Safari".

remove pop-ups and clear cache step 1

Check if the "Block Pop-ups" and "Fraudulent Website Warning" toggles are enabled. If not, enable them immediately. Then, scroll down and tap "Advanced".

disable pop-ups and clear cache step 2

Tap "Website Data" and then "Remove All Website Data".

disable pop-ups and clear cache step 3

Instant automatic Mac malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of Mac malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner for Mac By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Quick menu:

How to identify a pop-up scam?

Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.

While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.

Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:

  • Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
  • Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
  • Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
  • Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
  • Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.

Example of a pop-up scam:

Example of a pop-up scam

How do pop-up scams work?

Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.

Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.

How to remove fake pop-ups?

In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.

In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.

How to prevent fake pop-ups?

To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.

To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for macOS.

What to do if you fell for a pop-up scam?

This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.

  • If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
  • If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
  • If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for macOS) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
  • Help other Internet users: report Internet scams to Federal Trade Commission.

▼ Show Discussion

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

QR Code
We have detected a potential risk of unsecured connection pop-up QR code
Scan this QR code to have an easy access removal guide of We have detected a potential risk of unsecured connection pop-up on your mobile device.
We Recommend:

Get rid of Mac malware infections today:

▼ REMOVE IT NOW
Download Combo Cleaner for Mac

Platform: macOS

Editors' Rating for Combo Cleaner:
Editors ratingOutstanding!

[Back to Top]

To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.