05
May, 2017

suppor scams

Technical Support Scams are a common scenario these days. Cyber crooks not just send fraudulent email messages to online users but also make calls claiming to be a support member from HP, DELL or any other renowned technical support team for taking your sensitive credentials. They make use of available phone directories that include names, phone numbers and other details of online users like you. With your basic information in hand, it becomes easy for them to trap their targets.

Well, in order to spot technical support scams, here are some tips to help you. Take a look-

  • Always make it a note that legitimate technical support teams will never contact you. You have to request them for assistance. It is advisable to get the contact details of your support line by visiting the official website of your service provider and ask for help whenever required.
  • Be cautious if a support team asks for your system access. Support team never asks for any remote access because they already have your details.
  • Beware of any technician who makes unfeasible claims and promises about offering services free of cost. These are the common tactics to get your personal details for sharing it with third parties.
  • If you have encountered the scam straight away after providing your credit card information to someone, then without getting it delayed any further, contact your bank. Make sure to change all your passwords.
  • Install a reliable antivirus software to block malicious websites. Having the latest version of your security software gives you the best security patches. Keep your software updated same as you do with your Video games.

The best defense against cyber hackers is to avoid sharing any sensitive credentials. Practice the above-mentioned tips to keep yourself protected from falling prey to technical support scams.

The Author

Sweety Gupta

Sweety is an versatile blogger with good experience in the It sector. She is an experience writer who writes on various topics related to cyber security, phishing attacks and machine learning.
Sweety Gupta
  Leave a Comment