Online scams are more dangerous and persuasive every day. Cybercriminals are finding new ways to gain complete control over their computers and bank accounts, as well as login credentials.
Take John from King George of Virginia, for example. He recently shared his incredible experiences with us. His story is a powerful warning about how quickly things can escalate when responding to suspicious emails.
Here’s what John happened in his own words: “I accidentally responded to a fake Paypal email informing me of a laptop purchase. The message looked authentic. I called the numbers listed. Between accounts and accounts, he told me to run my PC and go to the bank.
John’s quick thinking in shutting down his computer and warning the bank helped him minimize the damage. But not everyone is lucky.
Fake PayPal scam email (Kurt “Cyberguy” Knutsson)
How this fraud works
This type of fraud is known as a remote access scam. It often starts with fake emails that appear to come from trustworthy companies like PayPal. The message claims there is a problem such as a fraudulent claim and encourages the victim to call a phone number or click on the link.
What is Artificial Intelligence (AI)?
When a scammer comes into contact, the victim will lead them to enter the code into the browser or install the program, claiming they will resolve the issue. In reality, this allows for full control of the victim’s computer scammer.
Once inside, scammers often search for sensitive files, access Bank websitesteal your login credentials or install malware to maintain long term access. Even if immediate scams stop, hidden malware can still allow scammers to re-enter the system later.

Hackers at work (Kurt “Cyberguy” Knutsson)
Emergency PayPal email scams you can’t afford to ignore
Important takeaways from John’s experience
John’s Close Call highlights several important lessons.
Fake emails are harder to find than ever: Scammers create emails that look almost the same as the real thing from trustworthy companies like PayPal. Forge your logo, format, and even customer support numbers. Instead of clicking on the link in your email, go directly to the official website or app and always double-check the sender’s email address and confirm your communications.
Remote access scams can escalate quickly: Once the scammer controls the device, it can steal sensitive data, move funds between accounts, and install hidden malware behind it even after the scammer is disconnected. Often, it only takes a few minutes to deal serious damage.
Psychological pressure plays a major role: Scammers rely on creating a sense of urgency and fear. By calling and urging secrets, they will isolate you from help and make you hurry and make bad decisions. Recognizing that you are under pressure is key to breaking the controls of a con man.
Fast actions can make all the difference: By quickly disconnecting his computer and contacting his bank, John restricted access to the scammer’s account. Acting within minutes rather than hours can stop further theft, block unauthorized transactions, and prevent confidential information from being compromised completely.
Click here to get your Fox business on the go

Laptop home screen warning (Kurt “Cyberguy” Knutsson)
Don’t click on that link! How to find and prevent phishing attacks in your inbox
How to protect yourself from remote access scams
With simple yet powerful security steps, you can protect you from the fall of your victim.
1. Do not call the number listed in the suspicious email: Scammers often set up fake phone numbers that sound experts but are designed to manipulate them to hand over controls and information. Always find your confirmed contact information through the company’s official website or app, not the link/number provided in suspicious messages.
2. Be skeptical of unusual instructions: Legitimate companies will not install software or ask you to enter any strange code to protect your account. If something seems abnormal, trust your instincts and stop communicating immediately.
3. Install powerful antivirus software on all devices. Antivirus programs can detect suspicious downloads, block remote access attempts, and prevent hackers from taking over the system. Installing strong antivirus protection on all your devices is the best way to protect yourself from malicious links that try to install malware and access your personal information. This protection can also warn you that it will phish email and ransomware fraud and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.
4. Use identity theft protection: These services monitor financial accounts, credit reports and online activities for signs of fraud and alert you to suspicious transactions. See my tips and best choices on how to protect yourself from identity theft.
5. If you suspect fraud, we will respond immediately. Disconnect your device from the internet, contact your bank or credit card company immediately, and change your password, especially for your bank or email account. closely monitor your account for unauthorized activities and report fraud Federal Trade Commission And just like any company that was spoofed. Acting quickly can prevent further access and limit the damage that scammers can cause.
6. Use Multifactor Authentication (MFA). MFA Adds a critical layer of security beyond your password to block unauthorized logins even when your credentials are stolen. Enable MFA on all accounts, especially banks, email and payment platforms, to stop scammers from avoiding stolen passwords.
7. Update your devices and software immediately: Regular updates Patch security is flawed in that scammers use it to install malware or hijacking systems. Turn on automatic updates whenever possible to ensure you are always protected from newly discovered vulnerabilities.
8. Use the Password Manager with a strong and unique password. Avoid password reuse and use complex passphrases to minimize qualification attacks. The password manager generates and stores passwords without a password, eliminating the risk of weak or recurring credentials. Get my details Find the best expert reviewed password managers of 2025 here.
9. Do not share screen access or give remote control. Scammers use screen sharing tools to steal passwords and manipulate transactions in real time. Legitimate technical support does not require unsolicited screen access. If you put pressure on it, you will immediately close the call.
10. Investing in personal data removal services: These services can be used by fraudsters who automate requests to delete your personal information from data brokers and talent search sites, reducing public details. Although there are no services that promise to delete all data from the internet, deleting a deletion service is great if you want to constantly monitor and automate the process of continuously deleting information from hundreds of sites over a long period of time. Check out our top picks for data deletion services.
Protect yourself from technical support scams
Important takeouts in your cart
John’s story reminds us that online scams are rapidly evolving and becoming more aggressive. By staying skeptical, verifying all suspicious messages and acting promptly if something feels wrong, there can be a difference between being safe and losing sensitive information. Always remember to protect your device, trust your instincts, and be more careful than taking risks to security.
Click here to get the Fox News app
Have you or someone you know been targeted by such a scam? Write us and let us know cyberguy.com/contact.
For more information about my tech tips and security alerts, sign up for our free Cyberguy Report Newsletter cyberguy.com/newsletter.
Please ask Cart questions or tell us what stories you would like us to cover.
Follow your cart on his social channels:
Answers to the most accused Cyber Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.