Posted by compu10 on November 7, 2022
“I don’t remember ordering that!”
In this post, I’m going to try and help you understand how to spot scamming and hacking attempts. I’ll try to include images of actual hacking and scamming attempts. Remember that any of the Protection Plans we offer include FREE “peace of mind” support, so if you get something suspicious we will help you determine whether or not it’s a scam at no additional cost.
Phishing, Hacking, Scamming… what’s the difference?
Phishing
Phishing is usually not a “live” hacker, at least not initially. It’s an attempt to steal your information by automated processes, like clicking links, filling out forms, stuff like that. These folks are trying to trick you into entering your passwords (so they can either take over your accounts and use them for malicious purposes, or hold them for ransom, or both). The only thing you have to do to avoid falling into this scam, is to not click the links or fill out the forms. These scams often look like an email claiming you purchased something you didn’t actually purchase, or that your account has been suspended due to illegal activity, or that you need to verify your login information due to a “hacking attempt” (irony, right?). I’ve also seen text messages that say something like “Your UPS Package cannot be delivered…” Nope.
The best practice is to NEVER click on links you were not specifically expecting in your email. If you have a concern about an unauthorized purchase or an account issue, open a new window in your browser and go directly to the site in question. Contact the customer support on that site if you need to.
Note that if you DO end up falling for a phishing scam, you may end up actually dealing with a “live scammer” who will do their best to convince you, often using a lot of pressure and even insulting language and threats, to cooperate with their attempts to gain access to your valuable information. If you find yourself in that situation, hang up. If you see them actively doing something on your computer, shut it down using the power button. See the “scamming” section below.
Scamming
Scamming usually involves a live person. These folks are trying to get you to give them your bank account or credit card information. They might call you directly and claim to be from your bank, or say that Microsoft has detected a problem with your computer (Microsoft will never call you) or that your “Copy of Windows has Expired” (Windows is not a subscription service) or even that your Microsoft Office has expired (if it did, Microsoft would not call you about it). You might get a scary looking “pop-up” on your computer, saying something like “Microsoft has detected a problem on your computer! Please call this number to fix it!”, or “The FBI has detected illegal activity on your computer! Call this number!”. Sometimes it will even use your webcam to show yourself on the screen, as if you’re being recorded by the FBI. These types of pop-ups usually warn you not to turn your computer off, saying that if you do it will erase your hard drive.
Now, there ARE threats that will encrypt all of your files (ransomware), but there are ways to avoid that ever being a problem. We’ll get into that below. Typically though, the first thing you SHOULD do is just turn your computer off completely and then restart it. **DO NOT** call any number that has popped up on your screen!! When you reopen your browser (if you are given the option), choose to NOT restore the open browser windows you had open. If this doesn’t fix the issue – call me!! I can help you.
If however you do happen to fall into one of these traps, the scammer will try to find a way to get control of your computer. They may tell you to go to a website and enter a code. Occasionally, the threat is sophisticated enough that you don’t need to actually do anything and they will take control of your computer. This is one of the worst case scenarios because they might then be able to access your saved passwords, banking information, hide or delete your files and cause all sorts of trouble. If you ever see a situation where someone untrustworthy has gained access to your computer, shut it down immediately and call someone (like me) to help you!
It’s always important to have GOOD protection on your devices. We sell a comprehensive protection and monitoring package that includes real-time, personal assistance if you see things that are concerning. This will prevent most malicious software from stealing your information. Be very careful about what you click on. If you’re not sure whether a link, or attachment is legit or not, reach out to the person who sent it to you. Ask them questions that only they would know the answer to, such as where you met them. Set up 2FA (Two-Factor Security) on your social media and email accounts. You can also set up a special code generator for an extra layer of protection. Additionally, once again, make sure you log out of your accounts when you’re not using them, if there are other people who use your devices.
Finally…
Computer Chick offers remote assistance to help you do all of the things mentioned in this article. If you need help, schedule an appointment and we will happily assist you!
Stay safe out there!
– Computer Chick
You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
*
*
Be the first to comment.