|
Here’s how they work:
Tech support scams typically take advantage of people's concerns about the security of their computers and personal information. They employ various techniques to gain victims' trust and manipulate them into taking actions that benefit the scammers.
One common tactic used by cybercriminals is to create messages that appear to be from well-known companies such as Microsoft, Apple, or internet service providers (ISPs). These messages are designed to mimic the branding and language of legitimate companies, making them look convincing at first glance. They may include alarming statements about detected infections, system errors, or unauthorized access to your computer. These scams often involve pop-ups or other forms of messaging that appear legitimate, urging victims to contact a provided phone number immediately. The cybercriminals behind these scams claim that failure to comply could result in the loss of personal data.
Some red flags to watch out for:
• Legitimate companies will not send unsolicited pop-ups or messages warning you about viruses or malware on your computer. Be skeptical of any unexpected messages that claim to be from a reputable company.
• Tech support scammers may ask for remote access to your computer to "fix" the alleged issues. Never grant remote access to someone you don't know and trust. It provides scammers with an opportunity to install malware or gain unauthorized access to your personal information.
• A clear indication of a tech support scam is when the supposed support representative asks for payment for their services. Legitimate companies will not demand payment upfront to resolve computer issues.
For additional information about online scams and cybercrime visit our website: https://www.myunionstate.bank/services/mobile-and-online-banking/online-security-tips
|