Archives - Tech Support Scam


Beware of scareware

Halloween may be long over, but scammers are always up to their old tricks. Scareware, as the name might suggest, is designed to scare users into navigating to malicious websites. Scareware convinces you to download software that you don’t need, promising that it’ll fix a virus you don’t have. Some scams even say your job, […]

5 tips for avoiding online identity theft

We’ve all heard about identity theft. But does it ever actually happen? The answer, unfortunately, is yes. The Federal Trade Commission received nearly 2.1 million identity theft claims in 2020, roughly twice the amount it received the year prior. The scammers are out there. With a little due diligence, you can keep your identity safe […]

Watch out for cryptocurrency tech support scams

Scammers may pose as cryptocurrency (virtual currency) tech support. Individuals in need of tech support may use online search engines to find technical support companies. Criminals pay to have their fraudulent tech support company’s link show higher in search results hoping victims will choose one of the top links in search results. The fraudulent support […]

Don’t engage on unsolicited tech support calls

A standard tech support scam goes as follows: You get an unsolicited call from someone telling you there’s a virus on your device but that it can be fixed if just grant him/her access to your system and submit a payment. It’s all fake. Instead, look for official notifications from your operating system or antivirus […]

Watch out for the “fake refund” tech support scam

In this scam the criminal contacts the victim offering a refund for tech support services previously rendered. The scammer asks for access to the victim’s device and instructs the victim to login to their online bank account to process a refund. As a result, the criminal gains control of the victim’s device and bank account. […]

Watch out for the “the fake refund” tech support scam

In this scam, the criminal contacts the victim offering a refund for tech support services previously rendered. The criminal requests access to the victim’s device and instructs the victim to login to their online bank account to process a refund. As a result, the criminal gains control of the victim’s device and bank account. Consider […]