Views:

Estimated reading time: 3 minutes

In this guide, you will learn:

What is a Cold Calling Scam?

A tech support cold calling scam occurs when scammers call you, pretending to be from well-known tech companies like Microsoft, Apple, or antivirus companies. They claim there’s a problem with your device and offer to fix it.

Their real objective is to scare you into paying for unnecessary services or to steal your personal information. They might conduct a remote session on your computer, remove your security software, and install their own products to steal your data.

These scammers often use high-pressure tactics, claiming your device has viruses or is about to crash, creating a sense of urgency.

Variations of Cold Calling Scams

Here are some common variations:

  • Microsoft Scam: Scammers claim to be from Microsoft’s tech support, insisting your computer has been infected with viruses or malware. They ask for remote access or payment for fake security software.
  • Apple Support Scam: Fraudsters pretend to be from Apple, saying your iCloud account has been compromised or your Mac/iPhone has malware, asking for login credentials or payment for services.
  • ISP Scam: Scammers pose as representatives from your internet service provider, warning of issues with your connection. They might request payment to "fix" the problem or try to gain access to your router or device.
  • Software License Expiry: Scammers claim your software license (e.g., Windows) is about to expire and demand immediate payment to renew it, or your device will stop working.

If you receive a call claiming to be from Trend Micro, know that Trend Micro will never call you unexpectedly. If a support call is needed, it will be scheduled in advance. Report any unexpected calls to Trend Micro support.

How to Identify a Scam Call

  • Unsolicited Calls: Tech companies will never call you unexpectedly. If you didn’t request support, it’s probably a scam.
  • High-Pressure Tactics: Scammers create urgency, claiming your device will be damaged or your data compromised unless you act immediately. Legitimate tech support will allow you to verify their claims.
  • Remote Access Requests: If a caller asks for remote access to your device to “fix” a problem, it’s a red flag. Scammers can steal your data or install harmful software.
  • Payment for Free Services: Fraudsters may ask for payment for services or software that are free or unnecessary. Be cautious if asked for payment information upfront.
  • Poor Grammar or Language: Many scammers use scripts with poor grammar or awkward phrasing, indicating the call isn’t from a legitimate company.

Why Am I Getting a Cold Call?

  • Data Breaches: Your contact information might have been exposed in a data breach.
  • Random Dialing: Scammers use robocalls to dial random numbers, hoping to find someone who will fall for their story.
  • Public Information: Your phone number could be listed in public directories or on social media, making you a target for cold calling scams.

What to Do If You Receive a Tech Support Cold Call

  • Hang Up Immediately: If you receive an unsolicited call, don’t engage with the caller. Politely hang up or simply end the call.
  • Do Not Provide Information: Never share personal details like passwords, account information, or payment details over the phone.
  • Do Not Give Remote Access: Never allow a caller to remotely access your device. This is a common tactic scammers use to take control of your data and computer.
  • Verify the Caller: If you’re unsure about the legitimacy of the call, hang up and contact the company’s official customer support through their website.
  • Use a Scam-Checking Tool: Use tools like Trend Micro Check to verify if the phone number is associated with known scams. This helps you quickly determine if a call is legitimate or fraudulent.

What to Do If You’ve Fallen Victim to a Cold Call

  • Disconnect Your Device: If you’ve given remote access, immediately disconnect your device from the internet to prevent further interference.
    • Windows/Mac: Turn off your Wi-Fi or disconnect the Ethernet cable.
    • Mobile (Android/iOS): Turn on Airplane Mode or disconnect from Wi-Fi and mobile data.
  • End Remote Access: If you allowed remote access, immediately terminate the connection.
    • Windows: Press Ctrl + Alt + Delete, open Task Manager, and end any suspicious remote access applications.
    • Mac: Go to System Preferences > Sharing and uncheck Remote Management or Screen Sharing.

    💊 Worried About Online Threats? Let Our Experts Handle It!️👨‍💻

    Our Virus Removal Service not only eliminates all existing threats but also fortifies your device against future infections. Enjoy peace of mind and top-tier security today!

    • Thorough Threat Removal: We identify and eliminate unfamiliar applications, unexplained data usage, unwanted pop-ups, and causes of slow performance.
    • Comprehensive Protection: Receive proactive recommendations to safeguard your system against future threats.
    • Available 24/7: Reach out to us any time, day or night, to utilize this service.


    Purchase Now: US & Canada | Australia | New Zealand

  • Report the Scam
  • Contact Your Bank: If you’ve provided payment information, notify your bank or credit card company to block unauthorized transactions.
  • Change Your Passwords: If you’ve shared any passwords, change them immediately. Use strong, unique passwords for each of your accounts.

How to Protect Yourself from Cold Calls

  • Install Call-Blocking Apps: Use apps that block or filter spam calls. Many phones also have built-in features to screen scam calls.
  • Avoid Answering Unknown Numbers: If you don’t recognize the number, let it go to voicemail. Scammers rarely leave detailed messages.
  • Verify Before You Act: Always confirm the identity of a caller before taking any action. Legitimate companies will never pressure you into making immediate decisions.
  • Use Trend Micro Check: Trend Micro Check helps you quickly verify phone numbers and links to ensure they aren’t associated with known scams. This tool can save you from engaging with fraudulent tech support calls.
  • Keep Your Devices Secure: Protect your devices with up-to-date antivirus software. Trend Micro offers comprehensive security solutions to shield your devices from malware, phishing attempts, and other threats.
Visit the Cybersecurity Learning Center!

GUARD YOURSELF AGAINST SCAMS!

Discover how to protect yourself from scams, online fraud, and dive into essential topics to protect your digital identity, and care for your devices.

Visit our 👉 Cybersecurity Learning Center! 👈

See also

Add a comment