What is a Tech Support Scam?
A tech support scam is a form of fraud where criminals impersonate technicians from well-known companies like Microsoft, Apple, or your internet service provider. They use scare tactics to convince you that your computer has a serious problem (like a virus) and then charge you for fake "support" services.
How the Scam Works: Step-by-Step
- The Alert: You encounter a pop-up window in your browser that looks like a real security alert. It often has alarming messages like "Your PC is infected!" and may even use a loud, persistent beeping sound.
- The Call to Action: The pop-up instructs you to immediately call a "support" number to avoid data loss or system failure.
- The Deception: When you call, the "technician" will sound professional and ask you to grant them remote access to your computer.
- The "Fix": Once they have access, they will pretend to find non-existent problems. They might open system logs or use built-in command-line tools, claiming normal entries are signs of a virus. They then pressure you into paying for unnecessary software or a "maintenance plan."
Key Red Flags: A Checklist ✅
Legitimate tech companies will never contact you out of the blue. Here are the warning signs:
- Unsolicited Pop-ups or Calls: Real security alerts happen within your antivirus software, not in your web browser. Microsoft and Apple will never display a pop-up asking you to call them.
- Requests for Remote Access: Never give a stranger remote control of your computer.
- Pressure to Pay: Scammers will demand payment via wire transfer, gift cards, or cryptocurrency. This is a massive red flag.
- The "Technician" Contacts You First: You should only ever seek out tech support from official company websites, not the other way around.
What to Do If You See One
If you see a tech support scam pop-up, simply close your web browser. You may need to use Task Manager (Ctrl+Shift+Esc) or Force Quit (Cmd+Option+Esc) if it freezes your screen. Do not call the number. Your computer is not actually infected.
Analyze a Suspicious Link →