SecurityApril 30, 20269 min read

How to Protect Yourself from Tech Support Scams

SC

By Sarah Chen

Head of Privacy Research

How to Protect Yourself from Tech Support Scams

Tech support scams are one of the most persistent and damaging types of online fraud. Scammers impersonate well-known companies like Microsoft, Apple, and Google to trick you into paying for unnecessary services, handing over remote access to your computer, or sharing your personal and financial information. Here's how to spot them and protect yourself.

How Tech Support Scams Work

Tech support scams rely on a simple formula: create a sense of urgency and fear about a fake problem, then offer to "fix" it for a fee. Scammers use several methods to reach their victims.

Fake Pop-Up Warnings

The most common tactic involves displaying a fake security alert in your web browser. These pop-ups are designed to look like official warnings from Microsoft, Apple, or your antivirus software. They typically claim your computer is infected with a virus or that your personal data has been compromised, and they display a phone number to call for immediate help.

Some of these fake alerts use full-screen mode to make it appear that your browser is locked, or they play audio warnings to increase panic. The goal is to prevent you from closing the window and to pressure you into calling the number displayed.

Unsolicited Phone Calls

Scammers cold-call potential victims and claim to be from Microsoft, Apple, or another tech company. They may say they've detected a virus on your computer, your account has been compromised, or your software license is expiring. They often spoof caller ID to make it appear they're calling from a legitimate company.

Search Engine Ads

Scammers purchase search engine ads for terms like "Microsoft support phone number" or "Apple customer service." When you search for help and click on one of these ads, you're directed to a fake support page with a scammer's phone number instead of the real company's.

Phishing Emails

You may receive emails that appear to be from a tech company, claiming there's a problem with your account, subscription, or device. These emails contain phone numbers or links that connect you to scammers rather than legitimate support teams.

The Key Thing to Remember

Legitimate tech companies like Microsoft, Apple, and Google will never contact you unsolicited by phone, email, or pop-up to tell you there's a problem with your computer. Any unexpected contact claiming to be tech support is almost certainly a scam.

What Happens If You Engage

If you call the number or allow a scammer to contact you, here's what typically happens:

  1. They claim to diagnose a problem: The scammer walks you through steps like opening Event Viewer on Windows, which always shows harmless warning entries. They present these normal system logs as evidence of infection
  2. They request remote access: You're asked to download remote desktop software like AnyDesk, TeamViewer, or similar tools, giving the scammer full control of your computer
  3. They install malware: Once they have remote access, scammers may install malware, ransomware, keyloggers, or backdoor programs that persist after the call ends
  4. They steal your data: With access to your computer, they can copy files, saved passwords, financial information, and personal documents
  5. They demand payment: You're asked to pay for the "repair" — often $200 to $1,000 or more — via gift cards, wire transfers, or cryptocurrency. Some scammers set up recurring subscription charges

Red Flags to Watch For

Knowing the warning signs can help you avoid falling victim:

  • Unsolicited contact: Any phone call, pop-up, or email claiming you have a computer problem that you didn't initiate yourself
  • Urgency and fear tactics: Claims that your computer will be disabled, your data will be lost, or your identity will be stolen unless you act immediately
  • Requests for remote access: Any request to download software that gives someone else control of your computer
  • Payment via gift cards or cryptocurrency: Legitimate companies never ask for payment in gift cards, wire transfers, or cryptocurrency
  • Pressure to stay on the line: Scammers try to keep you on the phone and prevent you from hanging up to think or consult someone else
  • Claims to be from Microsoft, Apple, or Google: These companies do not proactively reach out to consumers about device issues

How to Close a Fake Pop-Up

If you see a full-screen fake warning in your browser, don't call the number displayed. Instead, press Ctrl+Alt+Delete (Windows) or Command+Option+Escape (Mac) to open the task manager and force-close your browser. Alternatively, press Alt+F4 on Windows to close the active window. After closing, clear your browser cache and run a scan with legitimate antivirus software.

How to Protect Yourself

Prevention

  • Never call numbers from pop-ups: If you need tech support, go directly to the company's official website and find their contact information there
  • Hang up on unsolicited calls: If someone calls claiming to be from a tech company, hang up. If you're concerned, call the company directly using the number on their official website
  • Use ad blockers: Browser ad blockers can prevent many fake tech support ads and malicious pop-ups from appearing
  • Keep software updated: Ensure your operating system, browser, and antivirus software are up to date with the latest security patches
  • Use legitimate antivirus software: Install reputable antivirus software and run regular scans. Windows Defender, which comes built into Windows, provides solid baseline protection
  • Verify search results: When searching for tech support, carefully check the URL of any website before calling a phone number listed on it

Protect Vulnerable Family Members

Tech support scams disproportionately target older adults. The FBI's Internet Crime Complaint Center reported that adults over 60 lost billions to various scams in recent years, with tech support scams being among the most common.

Help protect elderly family members by:

  • Explaining how tech support scams work and what the red flags are
  • Installing ad blockers and pop-up blockers on their browsers
  • Setting yourself or another trusted person as their go-to contact for any tech issues
  • Establishing a rule: never call a phone number from a pop-up, and never give remote access to anyone who called you

What to Do If You've Been Scammed

  1. Disconnect from the internet if the scammer has or had remote access to your computer
  2. Run a full antivirus scan using legitimate security software to detect and remove any malware
  3. Change your passwords for all accounts accessed from that computer, especially email, banking, and financial accounts
  4. Contact your bank or credit card company to dispute fraudulent charges and secure your accounts
  5. Monitor your credit reports for unauthorized activity and consider placing a fraud alert or credit freeze
  6. Report the scam to the FTC at reportfraud.ftc.gov and the FBI's IC3 at ic3.gov
  7. Report the scam to the impersonated company — Microsoft, Apple, and Google all have fraud reporting channels

How PrivacyOn Keeps You Safe

Tech support scammers often use personal information found online to make their calls more convincing — addressing you by name, referencing your location, or mentioning details that make the call seem legitimate. This data typically comes from data broker sites that publish your personal information publicly.

PrivacyOn removes your personal data from 100+ data broker sites, making it harder for scammers to find and target you. Combined with 24/7 dark web monitoring to detect if your credentials appear in breaches, and family plans starting at $8.33/month that protect up to 5 people, PrivacyOn provides a comprehensive layer of defense against scams of all kinds.

SC
Sarah Chen

Head of Privacy Research

CIPP/US CertifiedIAPP MemberB.S. Computer Science

CIPP/US-certified privacy researcher with over a decade of experience helping consumers remove their personal information from data brokers.

Ready to Protect Your Privacy?

Let PrivacyOn automatically remove your personal information from data broker sites and keep it removed.