2 min read

How to protect your identity and money from tech support scams

Alina BÎZGĂ

August 18, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
How to protect your identity and money from tech support scams

Tech support scams inflict millions of dollars in losses every year. The FTC has received over 45,000 tech support complaints this year, with median losses ranging from $231 to $1,422, depending on the contact methods.

Fraudsters who get into the ‘tech support business,’ often target seniors and exploit their fear by claiming that their household devices (computers, mobile devices or even appliances) require some kind of immediate attention.  These fake technicians have only one goal: to steal money, data and identities. The tech issues are always made up and the scammers often pretend to be from well-known tech companies such as Apple and Microsoft.

They use confusing tech lingo to convince targets that the problems are real and install remote access software or enroll in computer maintenance programs that will allow them to gain access to your information or direct you to phishing websites to steal your credit card numbers or other sensitive data.

Common signs of fake support scams include:

  • You get an unsolicited phone call or email from someone claiming to work for a brand-name tech company such as Microsoft or Apple. Those companies do not contact customers unless the customer initiates communication.
  • A pop-up or blue screen appears on your computer, phone or tablet with a warning that a virus or other malicious program has infected your device.
  • The message urges you to immediately call a toll-free number or click a link to get technical help or security software.
  • The message contains bad grammar or misspelled words
  • You are asked to pay for tech support or other services with a gift card, cash-reload card or wire transfer. The FTC says no legitimate company asks for payment that way.

To protect your data, money and identity, stick to good cyber hygiene and:

  • Hang up on any unsolicited calls from individuals who claim to provide tech support for your devices
  • Use a security solution that protects against malware and blocks you from accessing malicious pop-ups
  • Never call the number or interact with pop-ups that mention virus alerts or that your system is compromised
  • Be skeptical of all unsolicited emails, messages and phone calls asking you to install remote access software to fix technical issues on your devices
  • Don’t rely on caller ID or email address to determine the validity of the request as cybercriminals can easily spoof email addresses and phone numbers
  • Never give your financial information including credit card number or other sensitive information via phone, email or text
  • Be suspicious of payment methods such as crypto transfers, wire transfers and gift card purchases
  • Keep your operating system and devices up to date at all times
  • Report any suspicious activity and request to the FTC and police

To help protect your data and keep your financial information secure, be sure to check out Bitdefender Ultimate Security - our all-in-one security solution.

Subscribers receive identity theft protection, a cross-platform password manager, award-winning security for up to 10 devices, and a VPN to help you safely and privately browse the internet for the best deals.

Note: Identity theft protection and Ultimate Security solutions are available for the US only.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Identity theft victims report long-lasting physical and emotional problems, ITRC says Identity theft victims report long-lasting physical and emotional problems, ITRC says
Alina BÎZGĂ

September 29, 2022

2 min read
What Happens to Your Data When a Company Gets Breached What Happens to Your Data When a Company Gets Breached
Filip TRUȚĂ

September 28, 2022

2 min read
Data Breach at Australia Telecom Giant Exposes PII of 10 Million Customers Data Breach at Australia Telecom Giant Exposes PII of 10 Million Customers
Alina BÎZGĂ

September 27, 2022

2 min read