Tech support scammers are modern-day scammers who prey on our deepest technological fears and vulnerabilities. Tammy from Flagler Beach, Florida, recently contacted us with a concerning email:
“I think Microsoft Windows may have hacked us… we turned off the computer after calling the Microsoft number telling us at full volume not to touch the computer. What do we do???”
We’re sorry you’re experiencing this issue. Tammy’s experience is a classic example of a common tech support scam that has targeted unsuspecting users. It is important to note that Microsoft will never proactively contact you to provide unsolicited technical or PC support. These criminals have developed their tactics to easily convince you that your computer has a critical problem that needs immediate attention.
Any communication they have with you must be initiated by you. If you receive a phone call or pop-up from someone claiming to be from Microsoft telling you that your computer has a problem or has been hacked, it’s likely a scam.
Red Flags Scammers Use to Trick You into Thinking Your Computer is Compromised
Tech support scammers have become master manipulators, using psychological tactics to exploit your fears and vulnerabilities. Here are the six most common warning signs that you are falling victim to a sophisticated tech support scam:
Unsolicited contact: Beware of unexpected calls, emails, or pop-ups claiming your device is compromised.
Urgency and fear tactics: Scammers often create a sense of panic, claiming that hackers could access your devices and data imminently.
Remote access requests: A major red flag is if someone you haven’t contacted requests remote access to your computer.
Pressure for immediate payment: Be suspicious of demands for payment, especially through non-reversible methods such as gift cards, bank transfers, or cryptocurrencies.
Impersonation of accredited companies: Scammers may claim to be from well-known technology companies such as Microsoft or Apple.
Suspicious pop-up messages: Beware of pop-up warnings about viruses or system problems, especially those with countdown timers.
9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TREAT YOU
Immediate steps to take if you are the target
To quickly protect your information and minimize potential damage, follow these steps.
1) Deactivate immediately: Hang up the phone or close any suspicious pop-ups.
2) Disconnect from the internet: This can prevent possible remote access by scammers.
3) Do not provide remote access: Never give control of your device to unsolicited callers.
4) Run a security scan with powerful antivirus software: Use reliable, up-to-date and powerful antivirus software to check your system. The best way to protect yourself from malicious links that install malware and potentially access your private information is to have antivirus software installed on all of your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best antivirus protection winners of 2024 for your Windows, Mac, Android, and iOS devices.
5) Change critical passwords: Update passwords for important accounts, especially if you have shared any information. Make sure you create strong and unique passwords. Consider using a password manager to generate and store complex passwords.
6) Enable two-factor authentication: Whenever possible, enable multi-factor authentication. This adds an extra layer of security to your accounts..
7) Monitor your accounts: Keep an eye on your financial accounts, email accounts, and social media accounts for any unusual activity. If you think scammers have stolen your identity, consider identity theft protection here.
Identity theft companies can monitor personal information such as your Social Security number, phone number, and email address and alert you if it is sold on the dark web or used to open an account. They can also help you freeze your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts about using some services is that they can include identity theft insurance of up to $1 million to cover losses and legal fees and a white-collar fraud resolution team where a US-based case manager .helps you recover any losses. See my tips and best options on how to protect yourself from identity theft.
8) Invest in personal data removal services: Using a data removal service can be an effective additional step in protecting your personal information after a potential tech support scam. These services locate and remove your personal information from various online platforms, databases, and data brokers. By removing unnecessary or outdated information, data removal services minimize your online presence, making it difficult for scammers to find and exploit your data.
While no service promises to remove all of your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites on an ongoing basis over a longer period of time. Check out my top picks for data removal services here.
9) Contact professionals: If you are unsure of any of the steps to take or if the situation seems serious, consider contacting a professional IT service.
10) Report the incident: Report the scam to local authorities and Federal Trade Commission in the US. You can also report the scam to Microsoft directly.
Remember, it is important to stay calm and take one step at a time.
SPOTIFY PLAYLISTS ARE HACKED TO PROMOTE PIRATE SOFTWARE AND SCAMS
Kurt’s Key Takeaways
Tech support scams are designed to exploit fear and technical uncertainty. Remember that legitimate technology companies will never contact you proactively about computer problems. Always check support through official channels and, if in doubt, consult a trusted, tech-savvy friend or professional.
Have you or someone you know ever been the target of a tech support scam? Share your experiences and how you coped by writing to us at Cyberguy.com/Contact.
For more tech tips and security alerts, sign up for my free CyberGuy Report newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or tell us what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most frequently asked questions about CyberGuy:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.