How to Stop Annoying Browser Pop-Ups and Redirects

The only thing worse than a slow network is a browser that decides to hijack itself. You click a link, and suddenly you are in a redirect loop, jumping between five garbage sites, hearing a siren, and seeing a banner telling you you’ve won a free iPhone. I hate these because they are rarely blocked by your standard software. Why? Because the nasties either fooled you into giving them permission or they installed a subtle extension that runs the show. Forget the “Recommended Settings” buttons. They are useless. I’m going to show you the four places these parasites hide and how to eradicate them.

Why Your Standard Ad Blocker Fails

Most basic ad-blockers, including the one built into Chrome, target standard display ads delivered by Google or third-party ad networks. But the redirect loops and screaming desktop notifications you get are usually triggered by two other vectors that are far more insidious. They are exploiting trust mechanisms built into the browser:

  • The Notification Permission: You visit a weather site, and it asks, “Can we show you notifications?” You click “Allow.” Now, that site can spam your operating system desktop with fake virus alerts, even when the browser is closed.
  • The Malicious Extension: The worst culprits are the extensions you installed yourself—the “free VPN,” the “speed test,” or the “PDF converter.” They don’t inject ads; they change the internal JavaScript that dictates where links lead.

You can’t block what you already invited in. You have to go into the settings and manually revoke the privileges you stupidly granted.

The How-To: Eliminating the Infection

1. The Nuclear Extension Purge

This is where 90% of the problem is hiding. Extensions are the perfect persistence tool for browser hijackers.

  1. Type chrome://extensions (or edge://extensions) into the address bar and hit Enter. Do not click the little puzzle piece icon, because some malware hides itself from that menu.
  2. Immediately enable Developer Mode in the top right.
  3. Look for any extension you don’t use daily, especially anything labeled a “theme,” “shopping assistant,” or “speed booster.”
  4. If you didn’t install it yourself, or if it has an opaque name like “Default Helper Tool,” Remove it immediately.
  5. If you use a legitimate extension like uBlock Origin, I recommend toggling it off and on again, just to refresh its internal database.

I learned this the hard way that one time a few years back when a tiny file compression extension was hijacking all my search results. That was a wasted two hours.

2. Revoking Notification Permissions

The desktop notification spam is annoying, but it is also easily fixable because the browser keeps a definitive list of everyone you let harass you. You need to disable the system entirely.

  1. Type chrome://settings/content/notifications into the address bar.
  2. Scroll down to the “Allow” section. This is the list of sites that are allowed to show pop-ups on your desktop, even when the browser is minimized.
  3. Look for any news site, streaming site, or anything that resembles a fake virus warning (“Best Antivirus Alerts,” “Driver Update Central”).
  4. Click the vertical three dots next to the entry and select Block or Remove. I recommend setting the global toggle at the very top of the page to Don’t allow sites to send notifications to eliminate this problem forever.

3. Clearing the Stubborn Cache

Sometimes, the redirect loop is cached JavaScript. You need to nuke the specific cached files without deleting your entire login history.

  1. Press Ctrl + Shift + Delete (Windows/Linux) or Cmd + Shift + Delete (Mac).
  2. Change the “Time Range” dropdown to All time.
  3. Crucially, ensure you only check Cookies and other site data and Cached images and files. Leave “Passwords,” “History,” and “Settings” unchecked.
  4. Click Clear data. This forces the browser to re-fetch the website logic from scratch, often killing the looping script.

4. Checking the Shortcut for Hijackers

If your browser opens to a strange search engine (like “SearchFind24”) even after you reset your homepage, the shortcut itself is compromised. This is a classic “dirty” persistence trick that bypasses browser settings.

  1. Right-click the browser icon on your desktop or Start Menu.
  2. Select Properties.
  3. Look at the Target field. It should end with something clean like ...\chrome.exe".
  4. If you see a URL appended after the closing quote (e.g., ...\chrome.exe" https://www.scamsearch.com), delete the appended text. The extra URL forces the browser to open that page first.

Usual problems

The “Restore Pages” Loop

When you force-quit a malicious browser, Chrome or Edge often helpfully asks, “Would you like to restore your previous session?” If you click Restore, you just reload the malicious pages, and the redirect loop starts all over again. The moment you kill the process via Task Manager, open the browser clean, and when that prompt appears, click Do not restore.

DNS Cache Corruption

Sometimes a redirect happens before the browser even loads because the DNS server cached a bad address. If clearing your browser data fails, try flushing the DNS cache. Open Command Prompt as Administrator and type ipconfig /flushdns. This forces your machine to ask the DNS server for the correct, uncorrupted IP address next time.

The “Pop-up” vs. New Tab Confusion

Browser settings only block true pop-up windows (the small windows that don’t have an address bar). The majority of modern redirects open a new tab because it is impossible for the browser to block opening new tabs without crippling its function. The only way to stop this is to stop clicking things on the original page. If you are getting new tabs, the problem is usually a sneaky extension or a bad link handler on the site itself.

The only thing these scammers rely on is your impatience; kill the notification permissions, purge the extensions, and never click “Allow” when the browser asks to send you notifications.