Security

Cold Call Tech Support Scams: How They Work and How to Avoid Them

Cold calling tech support scams are a growing concern as cyber criminals continue to exploit unsuspecting individuals. These scams involve unsolicited phone calls from fraudsters claiming to be representatives of reputable tech companies, offering to help with non-existent computer problems. In this article, we’ll dive into how these scams work and provide tips on how to avoid falling victim to them.


Cold calling tech support scams usually follow this pattern

– The scammer initiates an unsolicited call, claiming to be from a well-known tech company such as Microsoft or Apple.

– They inform the victim that their computer has been infected with a virus or malware, and that immediate action is required to prevent further damage or data loss.

– The scammer may use technical jargon to confuse the victim and create a sense of urgency.

– They then offer to fix the issue remotely, often for a fee, and request access to the victim’s computer.

– Once the scammer has access to the computer, they can install malware, steal personal information, or lock the victim out of their system until a ransom is paid.

What to watch out for

(The Red Flags of Cold Call Tech Support Scams)

– Unsolicited calls: Legitimate tech companies generally do not initiate contact with customers for tech support issues.

– Urgency: Scammers often create a sense of urgency to pressure victims into complying with their demands.

– Requests for remote access: Genuine tech support representatives will rarely, if ever, request remote access to your computer. Most of the services that they would need access to they can do so without your PC.

– Payment demands: Scammers may ask for payment in advance or request untraceable payment methods, such as gift cards or cryptocurrencies. These payment types are always scams, no legitimate company will take gift cards as payment, and very few accept cryptocurrencies.

How to Avoid Cold Calling Tech Support Scams

– Be cautious of unsolicited phone calls claiming to be from any tech support company. If you receive such a call, hang up immediately.

– Do not provide personal information or payment details to anyone over the phone unless you have verified their identity and the legitimacy of the call. The best way to verify the caller is to find the companies direct number and call inquiring about your account.

– If you suspect that your computer has been compromised, contact a local well known tech company or the relevant software or hardware provider using verified contact information from their official website.

– Keep your computer’s security software up to date and enable automatic updates to ensure you are protected from the latest threats. If you would like SureTech Services provides Antivirus protection for our clients.

– Educate yourself and your family members about the dangers of tech support scams, and share this knowledge with friends and colleagues.

What to Do If You Fall Victim to a Cold Call Tech Support Scam

If you suspect that you have fallen victim to a cold call tech support scam, take the following steps:

– Disconnect your computer from the internet to prevent further access by the scammer.

– Contact a local computer repair company to assess the situation.

– Run a full system scan using a reputable antivirus software to remove any malware that may have been installed.

– Change all your passwords, especially for online banking, email, and social media accounts.

– Report the scam to your local law enforcement agency and consumer protection organizations.

– Monitor your financial accounts for any signs of unauthorized activity.

Conclusion

Cold calling tech support scams are a growing threat in today’s digital age. By staying informed and vigilant, you can protect yourself and your loved ones from falling victim to these scams. Always be cautious when dealing with unsolicited phone calls, and remember that legitimate tech companies will never initiate contact with you to inform you of a virus or malware issue. Stay safe and stay informed!

loganCold Call Tech Support Scams: How They Work and How to Avoid Them
read more

Common Tech Support Scams and How to Avoid Them

In today’s digital age, technology plays a significant role in our daily lives. However, with the advancement of technology, cyber criminals have found new ways to exploit unsuspecting users through various scams. Tech support scams are some of the most common and persistent forms of cyberattacks that can lead to financial loss and compromise personal information. This article will shed light on common tech support scams and provide you with essential tips to avoid falling victim to these malicious schemes.

Cold Calls

Cold calls are unsolicited phone calls from individuals claiming to represent reputable tech companies, such as Microsoft or Apple. These scammers often claim that your computer or device has been infected with viruses or malware, and they offer to fix the issue remotely. In reality, they are attempting to gain unauthorized access to your device to steal personal information or install malicious software.

How to avoid:

  • Be cautious of unsolicited calls, especially if they ask for remote access to your device.
  • Verify the caller’s identity by contacting the company they claim to represent through official channels.
  • Hang up immediately if you suspect the call is a scam.

Fake Pop-up Warnings

Pop-up warnings are fake alerts that appear on your device, stating that your computer is infected with a virus or has encountered a serious problem. These warnings typically encourage you to contact a tech support number or download a specific software to resolve the issue. However, doing so can grant scammers access to your device or personal information.

Here is an example of a pop up scam

How to avoid:

  • Never call a phone number displayed in a pop-up alert.
  • Keep your computer’s security software up to date, and rely on it to detect and remove malware.
  • Close suspicious pop-ups using the “X” button or by using Task Manager (Ctrl + Alt + Del) on Windows or Force Quit on Mac.

Phishing Emails

Phishing emails are designed to look like legitimate messages from well-known companies. They often contain links or attachments that, when clicked, can install malware on your device or direct you to a fake website where scammers can steal your personal information.

Here is a Paypal Phishing email

How to avoid:

  • Don’t click on links or download attachments from unfamiliar sources.
  • Check the sender’s email address for any discrepancies or unusual characters. (see 1 above)
  • Verify the legitimacy of the email by contacting the company directly through official channels.

Tech Support Refund Scams

In this scam, cyber criminals pose as representatives of a tech support company and claim that you are entitled to a refund for previous services. They ask for your bank account or credit card information to process the refund, but instead, they use this information to steal your money.

How to avoid:

  • Never provide financial information or personal details over the phone or email.
  • Verify the legitimacy of the refund claim by contacting the company directly through official channels. Not through links or numbers provided by an unknown person.
  • Be cautious of unsolicited calls or emails offering refunds for tech support services.

Conclusion

Tech support scams are a growing threat in the digital world, targeting unsuspecting users and causing financial loss and identity theft. By staying vigilant and following the tips mentioned above, you can significantly reduce the risk of falling victim to these malicious schemes. Remember to have a good anti-virus, keep your device’s software updated, be cautious of unsolicited calls and emails, and always verify the legitimacy of tech support claims before providing any personal or financial information.

loganCommon Tech Support Scams and How to Avoid Them
read more

New PC Malware Found

There has been a recent discovery in the PC-Malware world.There is a computer malware which infects a users PC and gathers passwords and other information from the user. What makes this virus so unique is that when an anti-malware program attempts to scan the PC the malware detects it and then deletes the Master Boot Record. This in turn causes the Windows operating system to not turn on. Basically windows will not work and you’ll have to re-install the operating system. The good news is that your files still exist you just have to have another PC to retrieve them off the hard drive. Once you have retrieved the files you can re-install the OS and transfer the files back over. I recommend scanning the files remotely before moving them back to the new PC if you have to transfer files.

We have seen malware that gathers information, often called spyware, but seeing one that deletes the Master Boot Record are quite rare. This is because typically the malware wants to go unnoticed and gather as much information as possible. If malware/spyware is found and removed the hackers already have their data so there is no reason to attack the computer, but in this case it does. In reality there is no reason for the malware to cause this type of damage other than because they can.

Typically malware just monitors users webpage visits and uses that information to sell items, legitimate and not to the end user. So having one that steals personal information and then damage the operating system is unheard of. Overall it isn’t too big of a concern because it is easy enough to retrieve your files, it just mean’s we’re looking at people who want to do damage for no other reason than to do damage.

loganNew PC Malware Found
read more

Lenovo Exposed Users to Preinstalled Adware

Recently Lenovo was caught selling PC’s with pre-installed adware that might have compromised user security. The program which goes by “Superfish” monitors a users actions to determine products or services that they might be interested in purchasing. This was done by Lenovo “to help customers potentially discover interesting products while shopping”. Lenovo has since removed the software from new machines and disabled the software on old machines. However the software on old machines still exists so users would have to manually remove the software themselves. They have yet to explain to users how to remove this software although it appears a clean re-install of the operating system would work.

My major problem with Lenovo is that they gave users adware which lead to a negative user experience. They didn’t give an option for the user to disable it and they didn’t make it public that their computers came with this software. This software isn’t new to me either. I have had clients who had this adware on their non-Lenovo PC and it was incredibly difficult to remove and caused major problems to their PC’s. So I don’t know why Lenovo would have made such a stupid decision to give it to their users. Well, that’s not true, they did it for the money they hoped to generate off of their users shopping habits. Instead this is going to be a major problem for Lenovo in the next few years as I know I don’t have any plans to buy a computer from them, and I won’t be recommending it to anyone either.

loganLenovo Exposed Users to Preinstalled Adware
read more

Adobe Flash Vulnerability – Update ASAP

I wanted to post a warning to everyone out there that there is currently a nasty bit of malware going around that exploits a vulnerability in the flash player. Flash is used to play videos online and display advertisements. This vulnerability allows hackers to compromise websites as well as create malicious advertisements that can install malware on your PC. So when you go to a legitimate website you might end up with this nasty piece of malware. Adobe Flash has released a few updates to fix the issue, but they’re not certain they patched everything so expect another update soon. What can you do to help prevent getting this malware in the meantime?

  1. Make sure to update your adobe flash player. When doing so, deselect their “optional offer” for McAfee Security Scan Plus. This is an antivirus program that many of you don’t need and I don’t recommend.
  2. You can also disable the flash player for the next couple of days. This will make sure they have time to patch the exploit and ensure that you don’t get any malware.
    1. If you use chrome type “chrome://plugins” in the url window, then select “adobe flash player” and click the disable button. After a few days, re-patch in step 1 and it will be enabled and up-to-date.

I have already been contacted by several individuals who are having issues related to this vulnerability so be careful when you’re browsing for the next couple of days. With any luck Adobe Flash will be updated and we will have one less thing to worry about.

loganAdobe Flash Vulnerability – Update ASAP
read more