Tech support scams are one of the most persistent and damaging types of online fraud. Scammers impersonate well-known companies like Microsoft, Apple, and Google to trick you into paying for unnecessary services, handing over remote access to your computer, or sharing your personal and financial information. Here's how to spot them and protect yourself.
How Tech Support Scams Work
Tech support scams rely on a simple formula: create a sense of urgency and fear about a fake problem, then offer to "fix" it for a fee. Scammers use several methods to reach their victims.
Fake Pop-Up Warnings
The most common tactic involves displaying a fake security alert in your web browser. These pop-ups are designed to look like official warnings from Microsoft, Apple, or your antivirus software. They typically claim your computer is infected with a virus or that your personal data has been compromised, and they display a phone number to call for immediate help.
Some of these fake alerts use full-screen mode to make it appear that your browser is locked, or they play audio warnings to increase panic. The goal is to prevent you from closing the window and to pressure you into calling the number displayed.
Unsolicited Phone Calls
Scammers cold-call potential victims and claim to be from Microsoft, Apple, or another tech company. They may say they've detected a virus on your computer, your account has been compromised, or your software license is expiring. They often spoof caller ID to make it appear they're calling from a legitimate company.
Search Engine Ads
Scammers purchase search engine ads for terms like "Microsoft support phone number" or "Apple customer service." When you search for help and click on one of these ads, you're directed to a fake support page with a scammer's phone number instead of the real company's.
Phishing Emails
You may receive emails that appear to be from a tech company, claiming there's a problem with your account, subscription, or device. These emails contain phone numbers or links that connect you to scammers rather than legitimate support teams.
The Key Thing to Remember
Legitimate tech companies like Microsoft, Apple, and Google will never contact you unsolicited by phone, email, or pop-up to tell you there's a problem with your computer. Any unexpected contact claiming to be tech support is almost certainly a scam.
What Happens If You Engage
If you call the number or allow a scammer to contact you, here's what typically happens:
- They claim to diagnose a problem: The scammer walks you through steps like opening Event Viewer on Windows, which always shows harmless warning entries. They present these normal system logs as evidence of infection
- They request remote access: You're asked to download remote desktop software like AnyDesk, TeamViewer, or similar tools, giving the scammer full control of your computer
- They install malware: Once they have remote access, scammers may install malware, ransomware, keyloggers, or backdoor programs that persist after the call ends
- They steal your data: With access to your computer, they can copy files, saved passwords, financial information, and personal documents
- They demand payment: You're asked to pay for the "repair" — often $200 to $1,000 or more — via gift cards, wire transfers, or cryptocurrency. Some scammers set up recurring subscription charges
Red Flags to Watch For
Knowing the warning signs can help you avoid falling victim:
- Unsolicited contact: Any phone call, pop-up, or email claiming you have a computer problem that you didn't initiate yourself
- Urgency and fear tactics: Claims that your computer will be disabled, your data will be lost, or your identity will be stolen unless you act immediately
- Requests for remote access: Any request to download software that gives someone else control of your computer
- Payment via gift cards or cryptocurrency: Legitimate companies never ask for payment in gift cards, wire transfers, or cryptocurrency
- Pressure to stay on the line: Scammers try to keep you on the phone and prevent you from hanging up to think or consult someone else
- Claims to be from Microsoft, Apple, or Google: These companies do not proactively reach out to consumers about device issues
How to Close a Fake Pop-Up
If you see a full-screen fake warning in your browser, don't call the number displayed. Instead, press Ctrl+Alt+Delete (Windows) or Command+Option+Escape (Mac) to open the task manager and force-close your browser. Alternatively, press Alt+F4 on Windows to close the active window. After closing, clear your browser cache and run a scan with legitimate antivirus software.
How to Protect Yourself
Prevention
- Never call numbers from pop-ups: If you need tech support, go directly to the company's official website and find their contact information there
- Hang up on unsolicited calls: If someone calls claiming to be from a tech company, hang up. If you're concerned, call the company directly using the number on their official website
- Use ad blockers: Browser ad blockers can prevent many fake tech support ads and malicious pop-ups from appearing
- Keep software updated: Ensure your operating system, browser, and antivirus software are up to date with the latest security patches
- Use legitimate antivirus software: Install reputable antivirus software and run regular scans. Windows Defender, which comes built into Windows, provides solid baseline protection
- Verify search results: When searching for tech support, carefully check the URL of any website before calling a phone number listed on it
Protect Vulnerable Family Members
Tech support scams disproportionately target older adults. The FBI's Internet Crime Complaint Center reported that adults over 60 lost billions to various scams in recent years, with tech support scams being among the most common.
Help protect elderly family members by:
- Explaining how tech support scams work and what the red flags are
- Installing ad blockers and pop-up blockers on their browsers
- Setting yourself or another trusted person as their go-to contact for any tech issues
- Establishing a rule: never call a phone number from a pop-up, and never give remote access to anyone who called you
What to Do If You've Been Scammed
- Disconnect from the internet if the scammer has or had remote access to your computer
- Run a full antivirus scan using legitimate security software to detect and remove any malware
- Change your passwords for all accounts accessed from that computer, especially email, banking, and financial accounts
- Contact your bank or credit card company to dispute fraudulent charges and secure your accounts
- Monitor your credit reports for unauthorized activity and consider placing a fraud alert or credit freeze
- Report the scam to the FTC at reportfraud.ftc.gov and the FBI's IC3 at ic3.gov
- Report the scam to the impersonated company — Microsoft, Apple, and Google all have fraud reporting channels
How PrivacyOn Keeps You Safe
Tech support scammers often use personal information found online to make their calls more convincing — addressing you by name, referencing your location, or mentioning details that make the call seem legitimate. This data typically comes from data broker sites that publish your personal information publicly.
PrivacyOn removes your personal data from 100+ data broker sites, making it harder for scammers to find and target you. Combined with 24/7 dark web monitoring to detect if your credentials appear in breaches, and family plans starting at $8.33/month that protect up to 5 people, PrivacyOn provides a comprehensive layer of defense against scams of all kinds.