Tech Support Scams
Recognize and avoid fake tech support calls, popups, and remote access scams that impersonate companies like Microsoft and Apple.
How Tech Support Scams Work
Tech support scams are one of the most common and profitable fraud schemes targeting people today. According to the FBI, Americans lose hundreds of millions of dollars every year to these scams. They work because they exploit something very reasonable: the desire to keep your computer safe and working properly.
The Basic Pattern
Almost every tech support scam follows the same three steps:
- The scare: Something makes you believe your computer has a serious problem โ a virus, a hacker, or compromised personal data.
- The "help": Someone offers to fix the problem, usually by connecting to your computer remotely.
- The cost: They charge you money for the "repair," steal information from your computer, or both.
How They Reach You
Tech support scammers use several methods to make first contact:
Phone calls: You get a call from someone claiming to be from Microsoft, Apple, Norton, or your internet provider. They say they've detected a problem with your computer. This is the oldest version of the scam, and it still works.
Popup warnings on your screen: While browsing the internet, a full-screen message suddenly appears saying your computer is infected. It may include a phone number to call for "immediate help." These popups can look very official, with real company logos and urgent red warning symbols.
Emails: A message arrives claiming to be from a tech company, saying your subscription is about to be charged (often for hundreds of dollars) or that your account has been compromised.
Search engine results: When you search for tech help online, some of the results (especially ads at the top) may lead to scam companies pretending to be legitimate support.
Why It's So Convincing
These scams work because they push the same emotional buttons that legitimate security warnings do. When your computer displays a warning, your natural response is to take it seriously โ and that's usually a good instinct. Scammers have learned to mimic those warnings perfectly.
They also know that most people aren't sure exactly how their computer works behind the scenes. When someone says "I can see that your firewall has been breached," it sounds scary and specific, even though it's meaningless.
What They're Really After
Once a scammer has access to your computer, they may:
- Install software that lets them access your computer anytime they want
- Look through your files for bank statements, tax returns, or saved passwords
- Access your email to reset passwords on your other accounts
- Install ransomware that locks your files until you pay
- Charge you hundreds of dollars for fake repairs or worthless "security" software
The Key Fact
Microsoft, Apple, Google, and your internet provider will never call you to tell you there's a problem with your computer. They don't monitor individual personal computers this way. If you receive any contact like this that you didn't initiate, it's a scam.