Hey computer users, it’s time for a pop quiz.
A) You get an urgent call or email from a tech support company, saying your computer has a problem. Should you give the company remote access to your computer to make repairs?
B) A warning announcing “suspicious activity” or “security threat detected” appears on your computer screen. Should you call the number shown on the screen to talk to a technician?
C) One of these tech support companies asks you to pay for its services, maybe by using a gift card (like from iTunes or Amazon) or wire transfer. Should you?
The answer to all of these questions is “No.”
Here’s why: Your computer is almost certainly fine. Legit tech support companies don’t operate that way. Tech support scammers sometimes make false claims that they are associated with legitimate computer companies to make you believe them. The person who calls, or who gives you a toll-free number to call, is a scammer who wants to steal your money. If you give someone control of your computer, they can install malicious software that can help them steal your personal information. And anyone who asks you to pay for anything – including tech support services – with a gift card is scamming you. No legitimate company will ever ask you to pay with a gift card. If someone wants you to pay with a gift card, please tell the FTC at FTC.gov/complaint.
For more tips on avoiding a tech support scam, watch this video:
To read a version of this blog post in Tagalog, click here.
Upang mabasa ang bersyon ng blog post na ito sa Tagalog, mag-click dito.
To read a version of this blog post in Korean, click here.
이 블로그 포스트를 한국어로 보시려면 여기를 클릭하세요.
To read a version of this blog post in Traditional Chinese, click here.
如需閱讀此篇博客的繁體中文版,請點擊這裡。
To read a version of this blog post in Simplified Chinese, click here.
如需阅读此篇博客的简体中文版,请点击这里。
It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.
The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.
We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.