Tech Support Scamming
through unsolicited phone calls
, browser pop-ups
from "so-called Support Techs
" advising "your computer is infected with malware"
, All Your Files Are Encrypted"
and other fake "alert messages"
has become an increasing common scam tactic over the past several years. The scams may involve web pages with screenshots of fake Microsoft (Windows) Support messages, fake reports of suspicious activity, fake warnings of malware found on your computer, fake ransomware
and fake BSODs
all of which include a tech support phone number to call in order to fix the problem. If you call the phone number (or they called you), scammers will talk their victims into allowing them remote control access of the computer so they can install a Remote Access Trojan
in order to steal passwords and other sensitive personal information which could then be used to access bank accounts or steal a person's identity.Not answering any questions and hanging up the telephone is the best way to deal with phone scammers
...then report them to the appropriate authorities.
If you are dealing with browser pop-up scams, closing the web browser and then relaunching it usually eliminates the bogus warning message and is the best way to deal with these scams
. If the browser freezes or hangs, you may have to close it with Windows Task Manager
by selecting End Task.
Scammers and cyber-criminals are very innovated...see Tech Support Scams use new Tricks to Hold Browsers Hostage
. They are always developing creative and more sophisticated techniques to snare their victims into providing personal information or stealing their money for financial gain. The criminals can target specific browsers like Microsoft Edge
, Google Chrome
, specific devices like Apple
and even your iPhone
For more information about how these scams work and resources to protect yourself, please read Beware of Phony Emails & Tech Support Scams
...there are suggestions near the bottom for dealing with scams and a list of security scanning tools to use in case the usual methods do not resolve the problem or you allowed remote access into your computer.