Tech support scammers are modern-day scammers who prey on our deepest technological fears and vulnerabilities. I recently received the following email from Tammy, who lives in Flagler Beach, Florida.
“We think Microsoft Windows has been hacked. After we called the Microsoft phone number, we were told loudly not to touch the computer and turned off the computer. What should we do? Is that???”
We are very sorry to hear that you are experiencing this issue. Tammy’s experience is a classic example of a widespread tech support scam that targets unsuspecting users. Please note that Microsoft will never proactively contact you to provide unsolicited PC support or technical support. These criminals have evolved tactics to easily trick you into believing that your computer has a serious problem that requires urgent attention.
Any communication they have with you must be initiated by you. If you receive a call or a pop-up window from someone claiming to be from Microsoft and telling you that your computer is having problems or has been hacked, it could be a scam.
Get security alerts, tips from experts – Sign up for Cart Newsletter – Cyber Guy Report here
Red flags scammers use to trick you into believing your computer has been compromised
Tech support scammers have become masters of using psychological tactics to exploit your fears and vulnerabilities. Here are the six most common warning signs that you’re a target of sophisticated tech support scams.
Unsolicited contacts: Watch out for unexpected phone calls, emails, or pop-ups claiming your device has been compromised.
Strategies for creating urgency and fear: Scammers often create a sense of panic by claiming that hackers can access your device or data right now.
Request remote access: If someone you haven’t been in contact with requests remote access to your computer, it raises a big red flag.
Pressure for immediate payment: Be especially suspicious of requests for payment through irreversible methods such as gift cards, wire transfers, or cryptocurrencies.
Impersonation of a well-known company: Scammers may claim to be from well-known technology companies such as Microsoft or Apple.
Suspicious pop-up message: Be wary of pop-up warnings about viruses or system problems, especially those that include a countdown timer.
9 ways scammers can use your phone number to scam you
Actions to take immediately if targeted
To quickly protect your information and minimize potential damage, follow these steps:
1) Disconnect immediately. Hang up or close suspicious pop-ups.
2) Disconnect from the internet. This prevents potential remote access by fraudsters.
3) Don’t provide remote access. Never give control of your device to unwanted callers.
4) Run a security scan using strong antivirus software. Check your system with reliable, up-to-date and powerful antivirus software. The best way to protect yourself from malicious links that can install malware and access your personal information is to install antivirus software on all your devices. This protection also warns you about phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best antivirus protection products of 2024 for Windows, Mac, Android, and iOS devices.
5) Change important passwords. Update your passwords on important accounts, especially if you have shared information with us. Create a strong and unique password. Please consider using . password manager Generate and save complex passwords.
6) Enable two-factor authentication. Enable multi-factor authentication if possible. This adds an extra layer of security to your account.
7) Monitor your account. Always monitor your financial accounts, email accounts, and social media for unusual activity. If you think a scammer has stolen your personal information, consider identity theft protection here..
Identity theft companies monitor your personal information, such as your social security number, phone number, and email address, and alert you if it is sold on the dark web or used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals.
One of the best things about using some of our services is identity theft insurance of up to $1 million to cover your losses and legal costs, as well as an excellent fraud insurance policy with a US-based case manager to help you recover your losses. It includes a resolution team. Check out our tips and recommendations on how to protect yourself from identity theft..
8) Invest in a personal data deletion service. Using a data deletion service can be an effective additional step to protect your personal information after potential tech support scams. These services locate and remove your personal information from various online platforms, databases, and data brokers. Data deletion services minimize your online presence by removing unnecessary or outdated information, making it harder for fraudsters to find and misuse your data.
No service promises to remove all data from the Internet, but if you want to constantly monitor and automate the process of removing information from hundreds of sites over an extended period of time, a removal service is a good option. is the best. Check out my recommended data deletion services here.
9) Contact an expert: If you are unsure of the steps or if the situation seems serious, consider contacting professional IT services.
10) Report the incident. Report the scam to your local authorities. federal trade commission In the United States, you can also report fraud to: Microsoft directly.
Remember that it is important to remain calm and take one step at a time.
Spotify playlists are being hijacked to promote pirated software and scams
Cart important points
Tech support scams are designed to exploit fear and technical uncertainty. Please note that legitimate technology companies will never proactively contact you about computer problems. Always check for support through official channels, and if in doubt, consult a trusted tech-savvy friend or expert.
Have you or someone you know been the target of a tech support scam? Share your experience and how you dealt with it by emailing us at: Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.
Ask Kurt a question or let us know your story you’d like us to cover.
Follow Kurt on his social channels.
Answers to CyberGuy frequently asked questions:
New from cart:
Copyright 2024 CyberGuy.com. Unauthorized reproduction is prohibited.