{"id":75496,"date":"2018-10-08T04:29:04","date_gmt":"2018-10-08T04:29:04","guid":{"rendered":"https:\/\/intelligentbee.com\/blog\/?p=75496"},"modified":"2024-07-29T13:11:02","modified_gmt":"2024-07-29T13:11:02","slug":"technical-support-scams-to-watch-out-for","status":"publish","type":"post","link":"https:\/\/intelligentbee.com\/blog\/technical-support-scams-to-watch-out-for\/","title":{"rendered":"Technical Support Scams To Watch Out For (And How To Spot Them)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Technology has helped the world in many ways, but there\u2019s no denying that there\u2019s a dark side to it. For instance, phones, computers, and the internet can be exploited by fraudsters to deceive unsuspecting users into giving up personal information, and to some extent, their properties too.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-75497\" src=\"https:\/\/intelligentbee.com\/blog\/wp-content\/uploads\/2018\/10\/Tech-Support-Scams-to-Watch-Out-For1-300x194.jpg\" alt=\"Tech Support Scams to Watch Out For\" width=\"800\" height=\"518\" srcset=\"https:\/\/intelligentbee.com\/blog\/wp-content\/uploads\/2018\/10\/Tech-Support-Scams-to-Watch-Out-For1-300x194.jpg 300w, https:\/\/intelligentbee.com\/blog\/wp-content\/uploads\/2018\/10\/Tech-Support-Scams-to-Watch-Out-For1-768x497.jpg 768w, https:\/\/intelligentbee.com\/blog\/wp-content\/uploads\/2018\/10\/Tech-Support-Scams-to-Watch-Out-For1-1024x663.jpg 1024w, https:\/\/intelligentbee.com\/blog\/wp-content\/uploads\/2018\/10\/Tech-Support-Scams-to-Watch-Out-For1.jpg 1600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Technical support scams do just that\u2014they fool the unaware into thinking that there\u2019s something wrong with their system and equipment, make them contact an unknown number, and steal personal information as victims are unknowingly being tricked. There are also instances wherein the scammers are the ones who call the user.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Tech Support Scams in Numbers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">These types of cons are nothing new, but admittedly a lot of people still fall for it, especially since criminals keep finding new ways to conduct their fraudulent activities. A <\/span><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/04\/20\/teaming-up-in-the-war-on-tech-support-scams\/\"><span style=\"font-weight: 400;\">2016 survey sponsored by Microsoft<\/span><\/a><span style=\"font-weight: 400;\"> found that 2 in 3 people have experienced a type of tech support scam within the past 12 months; 1 in 10 have lost money.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 2017, <\/span><span style=\"font-weight: 400;\">Microsoft\u2019s Customer Support Services<\/span><span style=\"font-weight: 400;\"> received 153,000 reports of such scams from 183 countries, with a 24% rise from the previous year. Approximately 15% of those who reported lost an average of $200 and $400. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Virtually anyone who owns a connected device is vulnerable\u2014even though Microsoft is often namedropped by tech support scammers (with the company receiving <\/span><span style=\"font-weight: 400;\">12,000 complaints<\/span><span style=\"font-weight: 400;\"> every month globally), having a device other than Windows cannot protect a person either, as these deceptive acts can also fool those who use MacOS, iOS, Android, and other operating systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In terms of age, scams reported to Microsoft tend to be from older customers. The US <\/span><a href=\"https:\/\/www.ftc.gov\/system\/files\/documents\/public_statements\/967033\/160629olderamericanstest.pdf\"><span style=\"font-weight: 400;\">Federal Trade Commission<\/span><\/a><span style=\"font-weight: 400;\"> (FTC) has found evidence that the elderly are more impacted by fraud as compared to the younger generations. However, it was also found that <\/span><span style=\"font-weight: 400;\">millennials<\/span><span style=\"font-weight: 400;\"> (ages 18\u201334) are more likely to continue with a fraudulent tech offer compared to other age groups. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The underlying cause, though, is that many people are fooled into thinking that they are working with a legitimate business, whether that user is old or not.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>The Fallout<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As mentioned, tech support scams are designed to trick users into believing that their devices are compromised. The frauds will then coerce the user into purchasing unnecessary support services. In some instances, they will request access to the user\u2019s device by getting sensitive information or making them install dubious apps that can remotely retrieve the details they need. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In <\/span><span style=\"font-weight: 400;\">December 2014<\/span><span style=\"font-weight: 400;\">, when tech support scams hit mainstream media, Microsoft sued several companies for unfair and deceptive business practices and trademark infringement. Later in 2015, the <\/span><span style=\"font-weight: 400;\">FTC<\/span><span style=\"font-weight: 400;\"> announced the shutdown of several tech support scammers that pretended to be associated with Apple, Microsoft, and Google, and stole a combined $17 million from consumers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In another case, the FTC had to give out partial refunds to around 37,000 victims of a fraudulent tech support company named <\/span><a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2018\/03\/refunding-10-million-after-tech-support-scam\"><span style=\"font-weight: 400;\">Inbound Call Experts<\/span><\/a><span style=\"font-weight: 400;\">. This is after the company tricked consumers into buying unnecessary products and services by pretending that there is something wrong with their computers, all of which happened from April 2012 to November 2014.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No matter how big a business is, taking a legal action remains to be an arduous process. In this instance, Microsoft had to deal with the consequence of additional costs to fix issues that the company didn\u2019t intend to put themselves into.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Despite Microsoft proving their innocence, there\u2019s no denying that negative news like fraud can have a lasting impact on consumers. Those who don\u2019t know better would likely continue to associate Microsoft with the fraudsters.<\/span><\/p>\n<p>&nbsp;<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/intelligentbee.com\/blog\/technical-support-scams-to-watch-out-for\/#Spotting_the_Sham\" title=\"Spotting the Sham\">Spotting the Sham<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/intelligentbee.com\/blog\/technical-support-scams-to-watch-out-for\/#Unsolicited_Calls\" title=\"Unsolicited Calls\">Unsolicited Calls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/intelligentbee.com\/blog\/technical-support-scams-to-watch-out-for\/#Phishing_Emails\" title=\"Phishing Emails\">Phishing Emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/intelligentbee.com\/blog\/technical-support-scams-to-watch-out-for\/#Sketchy_Advertising_or_Pop-ups\" title=\"Sketchy Advertising or Pop-ups\">Sketchy Advertising or Pop-ups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/intelligentbee.com\/blog\/technical-support-scams-to-watch-out-for\/#Confusing_Search_Results\" title=\"Confusing Search Results\">Confusing Search Results<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Spotting_the_Sham\"><\/span><b>Spotting the Sham<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The best way to avoid falling into shady acts is knowing what constitutes a tech support scam.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"1\">\n<li>\n<h2><span class=\"ez-toc-section\" id=\"Unsolicited_Calls\"><\/span><b>Unsolicited Calls<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This outdated yet effective sham is done through cold calls. The fraudster who claims to be from a reputable company will call the target and say that the company found something wrong on the computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft and other companies often employ <\/span><span style=\"font-weight: 400;\">outsourced tech support<\/span><span style=\"font-weight: 400;\">, but no tech company will ever reach out to the consumer, even if it\u2019s in the name of public service. <\/span><a href=\"https:\/\/www.cnet.com\/how-to\/how-to-avoid-tech-support-scams\/\"><span style=\"font-weight: 400;\">Microsoft\u2019s security bulletin<\/span><\/a><span style=\"font-weight: 400;\"> reads, &#8220;Microsoft will never proactively reach out to you to provide unsolicited PC or technical support. Any communication we have with you must be initiated by you.&#8221; That means users will only receive a call if they request it. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, caller IDs can be manipulated to show only the company name, but not the number, so it\u2019s not reliable either. Hang up if this ever happens, and never give any personal information.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>\n<h2><span class=\"ez-toc-section\" id=\"Phishing_Emails\"><\/span><b>Phishing Emails<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">It\u2019s easy to fall for a <\/span><a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\"><span style=\"font-weight: 400;\">phishing email<\/span><\/a><span style=\"font-weight: 400;\"> because it does look like a message from a legitimate source. But once the target clicks and visits a malicious link included for a fake site that the scammers control, they will then be fooled into filling out a form with their sensitive information like email password, credit card details, bank account number, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Again, the best way to avoid this practice is to ignore it (and delete the email, too) and never reply. Don&#8217;t click any of the links on it, either. Remember to change passwords regularly as well.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>\n<h2><span class=\"ez-toc-section\" id=\"Sketchy_Advertising_or_Pop-ups\"><\/span><b>Sketchy Advertising or Pop-ups<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Pop-ups appear when users are browsing the Internet and visit a website that contains suspicious links that, when clicked, will redirect them to a site hosting the pop-ups. These pop-ups can get so intrusive that it can become difficult for the user to close them as they appear. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Often, these pop-ups will contain a message stating that the computer is infected or that it will be locked down, blocking internet access, or making it unusable. The message will usually be accompanied by a phone number which the user can contact to fix the problems, or so it claims.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First off, you should know that legitimate IT support groups will not use pop-up messages to alert you of issues, so it\u2019s best to ignore these messages. Aside from that, scrutinize the message and look for poor spelling or grammar and lousy imagery, which would usually imply fraud. A quick Google search can also support the legitimacy of the contact details included.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li>\n<h2><span class=\"ez-toc-section\" id=\"Confusing_Search_Results\"><\/span><b>Confusing Search Results<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Interestingly enough, fraudulent companies also have budgets to use legitimate paid search channels to advertise their fake support services. To be on the safe side, study the website chosen before retaining a company\u2019s services and always keep an eye out for <\/span><a href=\"https:\/\/www.wordstream.com\/blog\/ws\/2017\/03\/27\/trust-signals\"><span style=\"font-weight: 400;\">trust signals<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>In Conclusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As long as technology continues to advance, so will the swindlers who continue to take advantage of users, especially those who aren\u2019t well-versed in the technological aspect. The responsibility remains with users and consumers, as they need to stay vigilant in this thriving yet perilous age of information security. Tech companies, meanwhile, should do their part and ensure better protection for their clients.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology has helped the world in many ways, but there\u2019s no denying that there\u2019s a dark side to it. For [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":75497,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[1480,1481],"yst_prominent_words":[1470,1479,1478,1477,1476,1475,1474,1473,1472,1471,5,1469,714,659,512,510,373,343,318,268],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/posts\/75496"}],"collection":[{"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/comments?post=75496"}],"version-history":[{"count":8,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/posts\/75496\/revisions"}],"predecessor-version":[{"id":133147,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/posts\/75496\/revisions\/133147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/media\/75497"}],"wp:attachment":[{"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/media?parent=75496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/categories?post=75496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/tags?post=75496"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/intelligentbee.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=75496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}