Phony Tech Support Specialists Continue to Target Your Personal Information

Phony Tech Support Specialists Continue to Target Your Personal Information
Image: Pixabay
April 08, 2016

Phony help desk specialists are continuing to target consumers across the country. If you get a call or email from someone claiming to be from tech support, DO NOT give that person access to your computer under any circumstance!

According to reports from consumers, the bogus tech support specialists claim to be with brand name software or computer companies like Microsoft, Dell, IBM, and Hewlett-Packard (HP). In reality, they're overseas scam artists looking to steal your personal information.

The fake support specialist will tell you that your computer is malfunctioning or has been infected with malicious software (malware), then direct you to take a series of steps to fix the problem. Eventually, they will prompt you to download software or allow them to access your computer remotely. This will give the scammer access to all the data stored on your computer.

In a recent twist on this scam, the Federal Trade Commission (FTC) reports that people are getting calls from someone claiming to be from the Global Privacy Enforcement Network. Their claim? That your email account has been hacked and is sending fraudulent messages. They say they'll have to take legal action against you, unless you let them fix the problem right away. If you raise questions, the scammers turn up the pressure.

These con artists take advantage of your reasonable concerns about computer viruses and other threats. They know that computer users have heard time and again that it's important to install security software. But the purpose behind their elaborate scheme isn't to protect your computer; it's to make money.

If you receive a call or email from someone who claims to be with tech support, keep these helpful tips in mind:

  • NEVER share personal information with someone you do not know who contacts you.
  • Computer and software companies do not make unsolicited calls offering tech support.
  • NEVER give someone control of your computer unless you can confirm who the person is. If you need tech support, contact the computer or software company directly.
  • Getting pressure to act immediately? That's a sure sign of a scam. Hang up.
  • Be suspicious of emails that are poorly written, urgent, ask you for personal information or link to a website that does not match the organization it claims to be from.

Learn more about tech-support scams and government imposter scams at

If you have received a phony tech support email or phone call, contact the North Carolina Attorney General's Office.

Suspected tech support scams should also be reported to the FTC online at, or by calling 1-877-FTC-HELP (1-877-382-4357).

Get Connected with Consumer Connections

Stay up-to-date about issues that really matter! Get the Consumer Connections newsletter!

We're committed to providing you with information you need to make you a better, more informed consumer. Whether it's a vehicle recall, a product recall, or a new scam, we feature it in Consumer Connections.

So why not give it a try? Go on. All of your friends are doing it. It's completely free and comes just once a week.

You've finally filled out all the paperwork for a new or used car and drive it off the lot in triumph. Then, only a few hours (or days or weeks) later, the dealer calls you and tells you that you have to return the car because your financing didn't go through. What's going on? Is this legal? No.

According to the scam alert released by the Better Business Bureau (BBB), scammers are targeting unsuspecting consumers across the country by impersonating cable companies and taking advantage of subscribers' eagerness to save money on cable television services.

Do you know how to protect yourself against computer fraud? Most people think they can spot a scam, but scammers are getting better every day. It's now sometimes very difficult to know who is on the other end of the Internet and whether an email or website is truly legitimate.

We use our phones to do all kinds of things. But those who use USB charging stations may want to think twice before checking off the first two items on that list. Security researchers have discovered a way to hack into smartphones using USB stations and view and record everything that is displayed on the screen.