Hey computer users, it’s time for a pop quiz.
A) You get an urgent call or email from a tech support company, saying your computer has a problem. Should you give the company remote access to your computer to make repairs?
B) A warning announcing “suspicious activity” or “security threat detected” appears on your computer screen. Should you call the number shown on the screen to talk to a technician?
C) One of these tech support companies asks you to pay for its services, maybe by using a gift card (like from iTunes or Amazon) or wire transfer. Should you?
The answer to all of these questions is “No.”
Here’s why: Your computer is almost certainly fine. Legit tech support companies don’t operate that way. Tech support scammers sometimes make false claims that they are associated with legitimate computer companies to make you believe them. The person who calls, or who gives you a toll-free number to call, is a scammer who wants to steal your money. If you give someone control of your computer, they can install malicious software that can help them steal your personal information. And anyone who asks you to pay for anything – including tech support services – with a gift card is scamming you. No legitimate company will ever ask you to pay with a gift card. If someone wants you to pay with a gift card, please tell the FTC at FTC.gov/complaint.
For more tips on avoiding a tech support scam, watch this video:
To read a version of this blog post in Tagalog, click here.
Upang mabasa ang bersyon ng blog post na ito sa Tagalog, mag-click dito.
To read a version of this blog post in Korean, click here.
이 블로그 포스트를 한국어로 보시려면 여기를 클릭하세요.
To read a version of this blog post in Traditional Chinese, click here.
如需閱讀此篇博客的繁體中文版,請點擊這裡。
To read a version of this blog post in Simplified Chinese, click here.
如需阅读此篇博客的简体中文版,请点击这里。
56 Comments
Read Our Privacy Act Statement
It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.
Comment Policy
This is a moderated blog; we review all comments before they are posted. We expect participants to treat each other and the bloggers with respect. We will not post comments that do not comply with our commenting policy. We may edit comments to remove links to commercial websites or personal information before posting them.
We won’t post:
Comments submitted to this blog become part of the public domain. To protect your privacy and the privacy of others, please do not include personal information. Also, do not use this blog to report fraud; instead, file a complaint.