Internet

Cold Call Tech Support Scams: How They Work and How to Avoid Them

Cold calling tech support scams are a growing concern as cyber criminals continue to exploit unsuspecting individuals. These scams involve unsolicited phone calls from fraudsters claiming to be representatives of reputable tech companies, offering to help with non-existent computer problems. In this article, we’ll dive into how these scams work and provide tips on how to avoid falling victim to them.


Cold calling tech support scams usually follow this pattern

– The scammer initiates an unsolicited call, claiming to be from a well-known tech company such as Microsoft or Apple.

– They inform the victim that their computer has been infected with a virus or malware, and that immediate action is required to prevent further damage or data loss.

– The scammer may use technical jargon to confuse the victim and create a sense of urgency.

– They then offer to fix the issue remotely, often for a fee, and request access to the victim’s computer.

– Once the scammer has access to the computer, they can install malware, steal personal information, or lock the victim out of their system until a ransom is paid.

What to watch out for

(The Red Flags of Cold Call Tech Support Scams)

– Unsolicited calls: Legitimate tech companies generally do not initiate contact with customers for tech support issues.

– Urgency: Scammers often create a sense of urgency to pressure victims into complying with their demands.

– Requests for remote access: Genuine tech support representatives will rarely, if ever, request remote access to your computer. Most of the services that they would need access to they can do so without your PC.

– Payment demands: Scammers may ask for payment in advance or request untraceable payment methods, such as gift cards or cryptocurrencies. These payment types are always scams, no legitimate company will take gift cards as payment, and very few accept cryptocurrencies.

How to Avoid Cold Calling Tech Support Scams

– Be cautious of unsolicited phone calls claiming to be from any tech support company. If you receive such a call, hang up immediately.

– Do not provide personal information or payment details to anyone over the phone unless you have verified their identity and the legitimacy of the call. The best way to verify the caller is to find the companies direct number and call inquiring about your account.

– If you suspect that your computer has been compromised, contact a local well known tech company or the relevant software or hardware provider using verified contact information from their official website.

– Keep your computer’s security software up to date and enable automatic updates to ensure you are protected from the latest threats. If you would like SureTech Services provides Antivirus protection for our clients.

– Educate yourself and your family members about the dangers of tech support scams, and share this knowledge with friends and colleagues.

What to Do If You Fall Victim to a Cold Call Tech Support Scam

If you suspect that you have fallen victim to a cold call tech support scam, take the following steps:

– Disconnect your computer from the internet to prevent further access by the scammer.

– Contact a local computer repair company to assess the situation.

– Run a full system scan using a reputable antivirus software to remove any malware that may have been installed.

– Change all your passwords, especially for online banking, email, and social media accounts.

– Report the scam to your local law enforcement agency and consumer protection organizations.

– Monitor your financial accounts for any signs of unauthorized activity.

Conclusion

Cold calling tech support scams are a growing threat in today’s digital age. By staying informed and vigilant, you can protect yourself and your loved ones from falling victim to these scams. Always be cautious when dealing with unsolicited phone calls, and remember that legitimate tech companies will never initiate contact with you to inform you of a virus or malware issue. Stay safe and stay informed!

loganCold Call Tech Support Scams: How They Work and How to Avoid Them
read more

Common Tech Support Scams and How to Avoid Them

In today’s digital age, technology plays a significant role in our daily lives. However, with the advancement of technology, cyber criminals have found new ways to exploit unsuspecting users through various scams. Tech support scams are some of the most common and persistent forms of cyberattacks that can lead to financial loss and compromise personal information. This article will shed light on common tech support scams and provide you with essential tips to avoid falling victim to these malicious schemes.

Cold Calls

Cold calls are unsolicited phone calls from individuals claiming to represent reputable tech companies, such as Microsoft or Apple. These scammers often claim that your computer or device has been infected with viruses or malware, and they offer to fix the issue remotely. In reality, they are attempting to gain unauthorized access to your device to steal personal information or install malicious software.

How to avoid:

  • Be cautious of unsolicited calls, especially if they ask for remote access to your device.
  • Verify the caller’s identity by contacting the company they claim to represent through official channels.
  • Hang up immediately if you suspect the call is a scam.

Fake Pop-up Warnings

Pop-up warnings are fake alerts that appear on your device, stating that your computer is infected with a virus or has encountered a serious problem. These warnings typically encourage you to contact a tech support number or download a specific software to resolve the issue. However, doing so can grant scammers access to your device or personal information.

Here is an example of a pop up scam

How to avoid:

  • Never call a phone number displayed in a pop-up alert.
  • Keep your computer’s security software up to date, and rely on it to detect and remove malware.
  • Close suspicious pop-ups using the “X” button or by using Task Manager (Ctrl + Alt + Del) on Windows or Force Quit on Mac.

Phishing Emails

Phishing emails are designed to look like legitimate messages from well-known companies. They often contain links or attachments that, when clicked, can install malware on your device or direct you to a fake website where scammers can steal your personal information.

Here is a Paypal Phishing email

How to avoid:

  • Don’t click on links or download attachments from unfamiliar sources.
  • Check the sender’s email address for any discrepancies or unusual characters. (see 1 above)
  • Verify the legitimacy of the email by contacting the company directly through official channels.

Tech Support Refund Scams

In this scam, cyber criminals pose as representatives of a tech support company and claim that you are entitled to a refund for previous services. They ask for your bank account or credit card information to process the refund, but instead, they use this information to steal your money.

How to avoid:

  • Never provide financial information or personal details over the phone or email.
  • Verify the legitimacy of the refund claim by contacting the company directly through official channels. Not through links or numbers provided by an unknown person.
  • Be cautious of unsolicited calls or emails offering refunds for tech support services.

Conclusion

Tech support scams are a growing threat in the digital world, targeting unsuspecting users and causing financial loss and identity theft. By staying vigilant and following the tips mentioned above, you can significantly reduce the risk of falling victim to these malicious schemes. Remember to have a good anti-virus, keep your device’s software updated, be cautious of unsolicited calls and emails, and always verify the legitimacy of tech support claims before providing any personal or financial information.

loganCommon Tech Support Scams and How to Avoid Them
read more

New PC Malware Found

There has been a recent discovery in the PC-Malware world.There is a computer malware which infects a users PC and gathers passwords and other information from the user. What makes this virus so unique is that when an anti-malware program attempts to scan the PC the malware detects it and then deletes the Master Boot Record. This in turn causes the Windows operating system to not turn on. Basically windows will not work and you’ll have to re-install the operating system. The good news is that your files still exist you just have to have another PC to retrieve them off the hard drive. Once you have retrieved the files you can re-install the OS and transfer the files back over. I recommend scanning the files remotely before moving them back to the new PC if you have to transfer files.

We have seen malware that gathers information, often called spyware, but seeing one that deletes the Master Boot Record are quite rare. This is because typically the malware wants to go unnoticed and gather as much information as possible. If malware/spyware is found and removed the hackers already have their data so there is no reason to attack the computer, but in this case it does. In reality there is no reason for the malware to cause this type of damage other than because they can.

Typically malware just monitors users webpage visits and uses that information to sell items, legitimate and not to the end user. So having one that steals personal information and then damage the operating system is unheard of. Overall it isn’t too big of a concern because it is easy enough to retrieve your files, it just mean’s we’re looking at people who want to do damage for no other reason than to do damage.

loganNew PC Malware Found
read more

FCC Redefines Broadband

The FCC recently announced that Broadband companies are not deploying high-speed internet fast enough. With the new consumer demand for media online the FCC upgraded the previous definition of broadband from 4Mbps/1Mbps to 25Mbps/3Mbps. This is a substantial increase in the minimum requirements to qualify as a broadband provider. They estimate that around 17% of the population in America don’t have access to broadband internet under the new definition and that the ISP’s are not deploying internet fast enough to supply internet to customers.

What does this mean?

Well it means that DSL and cable companies have to offer higher speeds at affordable rates if they are to comply with the new broadband requirements. DSL companies are going to be hit particularly hard because DSL lines run off existing phone lines which don’t have the capacity to transmit that much data. This requires them to lay additional lines to reach customers which is a costly endeavor. Cable companies will also have to extend cable lines to more customers, but they have the capability of offering high capacity lines to current customers. The FCC wants people to have access to high speed internet, but they are only looking at the choices people have for internet. Basically as long as your cable/DSL provider offers 25Mbps/3Mbps your area has broadband internet regardless of whether or not you choose to buy it. This FCC ruling helps push ISP’s to provide the option of higher speed internet to currently undeserved areas.

This also helps create some competition which has been lacking for the past decade or so. For instance in my area we have two choices DSL/Cable, DSL only offers 4Mbps/1Mbps where cable offers up to 50Mbps/5Mbps. With this ruling DSL might start offering higher service because they are no longer “broadband” which makes them compete with the cable companies. There is no choice in my area, you either get cable or you deal with slow internet. Now this is even more true for area’s who don’t currently have anything other than DSL. If you only have the one option for internet this is great news because either DSL will increase their bandwidth or cable will start making a moving towards your direction, at least in theory.

The FCC has the authority to take “immediate action” if broadband is not “being deployed to all Americans in a reasonable and timely fashion”. So I suspect we will see companies fighting the FCC over the next few years but eventually giving in and providing high-speed broadband to more customers.

loganFCC Redefines Broadband
read more

Google Fiber to Arrive in Raleigh, Durham, Chapel Hill NC!

Google Fiber has updated their webpage showing that they will be deploying to the RDU area! Why is this good news you ask? Well for a couple of reasons.

  1. Speed – Google fiber is extremely fast internet, you can get 1GB download and a 1GB upload.
  2. Affordable – Google fiber is affordable, they offer a 1GB connection for $70 a month. Right now TWC offers 50Mb for $65, so you’re getting twenty times the speed for five more dollars! They also offered free internet of 5mb for seven years if you paid the $300 setup fee.
  3. They support net neutrality. Net neutrality is the idea that an internet provided won’t lower your connection if you use too much bandwidth or if you go to a specific webpage. While many companies say they support net neutrality they are accused of throttling internet connections. They also use throttling of a customers speed to make netflix, hulu and other providers to pay them so that their service is unimpeded. While you don’t directly pay that cost, it means netflix and other others must pay and therefore they bill you more for their services.
  4. Competition – It forces other companies to install more affordable and powerful internet connections. Already AT&T have announced they plan to lay fiber lines in the RDU area as well. This drives prices down, Yay!, and it gives us access to a better connections.

With any luck we will see similar pricing from google fiber. We won’t know more until they talk to the cities on the 28th + 29th of January but it is good news for us North Carolinian’s! I will post my thoughts on what they talk about in the coming days, tune in then!

loganGoogle Fiber to Arrive in Raleigh, Durham, Chapel Hill NC!
read more