For many companies,outsourcing technical supportoffers a cost-efficient way to assist customers. Unfortunately, this same general impression is what goaded many users to fall victim to a recent scam. The result: thousands of damaged computers across different countries. With such fraudulent activities spreading in different countries, it's crucial to know how you can protect yourself, and your computer (and the sensitive data stored within it) from malicious activities who operate tech support scams. One tech support scam, thousands of victims The Federal Trade Commission (FTC), in partnership with regulators from several other countries,announcedthe suppression of one of the biggest tech support scams in the world earlier this month. The scam’s victims mostly came from six English-speaking countries: the US, the UK, Australia, Ireland, Canada, and New Zealand. Investigators believed that the scam usedtechnical support outsourcedmostly to call representatives from India. Victims reported receiving calls informing them that their computer contained harmful viruses. These representatives identified themselves as employees from Google, Microsoft, and other prominent companies, and claimed that only they could remove the viruses for a certain fee. In order to "help," they would request remote access to the victim’s computer, and would then proceed to install damaging malware while pilfering money from the latter’s credit card. The FTC reported that it has received around2,400 complaints from the US; the exact count of victims from other parts of the world is currently unknown. How can you arm yourself from these scams? Given this mode of operations, there are a few things you have to remember to protect yourself from the scam: Technical support agents do not call you; you call them.Legitimate tech support representatives have no way of knowing that your computer has viruses or that its cursor is not moving unless you inform them, not even if they came from Google or Microsoft. Do not approve any request for remote access.Outsourced technical supportrepresentatives can help guide you isolate tech problems, and give you instructions on what to do in order to have your device up and running. They, however, will not ask you to let them control your computer from wherever they are. Do not give away your credit card details.If the specific product is still under warranty, there may not be any need to pay for every service or replacement parts. Otherwise, these fake representatives may ask for your credit card details to process the payment for repairs, without you knowing that they are stealing more than the supposed amount they indicated. Terminate the call at the first sign of a scam.If the scamming tech representative manages to get as far as installing the malware, put down the phone and uninstall the program as soon as you can. There are other variations to the scam. In other cases, the perpetrators fool their victims by posting their number in one of Google’s listings under titles like “Help.” Others post online ads then promise the removal of viruses and malwares. The ad comes with a download link that automatically installs a program, which will then “scan” the PC and come up with fake detection results. In both cases, the victims may receive calls fromoutsourced technical supportagents as in the first example. Given these, you should remember that: Not everything listed in Google is reliable. You must know how to determine which numbers are real and which ones are merely uploaded by scammers out to exploit your privacy. If you need to contact companies, it's best to directly go to the company’s website and look for the hotline number there. Not all ads on the Internet are reliable. As mentioned, scammers also use online ads as part of their fraudulent activities. Some of these ads come with fake reviews and features, so you must know how to differentiate programs that offer genuine results from those that can ruin your computers. Even with the FTC’s announcements, the scam itself may not have died out completely. It may have spiraled into an entirely different strain or variation. As such, everyone must do their best to fight off the malaise that these fraudulent activities bring.
...read more