At BeScamAware, we are dedicated to empowering individuals and communities to fight scams and fraud. Through education, awareness, and collaboration, we aim to create a safer world where everyone can confidently navigate the challenges of a rapidly changing digital and physical landscape. Together, we can outsmart the fraudsters, protect one another, and build a future free from deception. Let’s take a stand—because knowledge is power, and prevention is the best defence.

How to Spot and Avoid Tech Support Scams

Protect Yourself from Fake Tech Support Calls and Messages

Tech support scams trick people into believing their computer has a serious problem—like a virus or hacking attempt—so they will pay for unnecessary repairs or give scammers access to their device. These scams often come through phone calls, pop-up messages, emails, or fake websites pretending to be from trusted companies like Microsoft, Apple, or your internet provider.

By learning the warning signs of tech support scams, you can stay safe and protect your personal information.

Things to Look Out For in Tech Support Scams

Unsolicited Calls or Pop-Ups: Legitimate companies do not contact customers out of the blue to warn them about computer problems.

Scare Tactics: Scammers use alarming messages like “Your computer is infected with a dangerous virus!” or “Your data is at risk!” to create panic and make you act fast.

Requests for Remote Access: Scammers may ask you to install software so they can “fix” your computer. This gives them control over your device and access to your files.

Fake Fees for Repairs: They often claim you need to pay for a security upgrade or software fix that doesn’t exist.

Pressure to Act Immediately: Fraudsters say things like “If you don’t act now, your computer will be permanently locked” to push you into making a quick decision.

Spoofed Identities: Scammers may pretend to be from Microsoft, Apple, your internet provider, or even your bank’s fraud department. Always verify their identity before taking any action.

Subject: URGENT: Your Computer Has Been Compromised!

Dear Customer,

We have detected unusual activity on your device that may be the result of a harmful virus. Immediate action is required to prevent permanent damage to your files.

Click here to run a security scan: [fake-link.com]

For assistance, call our certified security team at 0123456789.

Microsoft Security Team

Subject: URGENT: Your Microsoft Account Has Been Compromised!

Dear User,

We have detected suspicious activity on your Microsoft account, which may indicate unauthorized access. To protect your information, your account has been temporarily restricted.

Action Required:
Please verify your identity immediately to restore access. Click the secure link below:

Verify Your Account Now [Fake Link]

If you do not verify within 24 hours, your account may be permanently locked.

Microsoft Security Team
[Fake Customer Support Number: 0123456789]

Subject: Apple Support: Your Device Has Been Infected!

Dear Customer,

We have identified malware activity on your Apple device. Immediate action is required to prevent data loss and protect your personal information.

Steps to Fix:

  1. Click the link below to download the latest security patch.
  2. Follow the instructions to remove the detected threats.

Secure Your Device Now [Fake Link]

If you need further assistance, call our Apple Support Hotline: 0123456789

Apple Security Team

Subject: We Detected a Problem on Your Computer – Fix Now!

Dear Customer,

Your computer has been flagged for a critical security issue. Our system detected a high-risk virus that may be stealing your private information.

To prevent further damage, please contact our certified support team immediately:

📞 Tech Support Hotline: 0123456789
🔗 Or visit: [Fake Link]

Our experts are available 24/7 to assist you. Do not ignore this message, or your data may be lost!

Sincerely,
Tech Support Team

Email Examples

(These emails often contain official-looking logos and formatting, but the sender's email address or links will be suspicious.)

[Microsoft Alert] Suspicious activity detected on your account. Immediate verification required to prevent suspension. Click here: [Fake URL]

Apple ID Alert: Your Apple account has been locked due to unusual login attempts. Confirm your identity now: [Fake URL]

[Your ISP] Alert: We have detected unauthorised access to your internet connection. To avoid service suspension, verify your account immediately: [Fake URL]

WARNING! Your device has been infected with a virus. Contact tech support immediately to avoid data loss: 0123456789

[Bank Security] Unauthorised transaction detected! Your account may be at risk. Call our support line immediately: 0123456789

Text Message Examples

Scammer: “Hello, this is John from Microsoft Support. We have detected a serious security issue on your computer. Hackers may be trying to access your data!”

You: “Oh no! What should I do?”

Scammer: “I need you to download our security tool so we can remove the virus. Just go to this website and install the program.”

You: “How do I know this is real?”

Scammer: “This is a high-priority case. If you don’t act now, your files could be deleted permanently! You can trust us—we are Microsoft experts.”

(At this point, they will try to convince you to install remote access software or make a payment.)

Scammer: “Hello, this is John from Microsoft Technical Support. We have detected a serious issue with your Windows computer. It has been infected with a dangerous virus that could steal your banking information. Are you in front of your computer right now?”

Victim: “Uh… no, what virus?”

Scammer: “Hackers have gained access to your device. If we don’t fix this immediately, your files and passwords could be stolen. I need you to follow my instructions to install a security tool. Just go to this website: [Fake URL] and download the software.”

(If the victim complies, the scammer will gain remote access to their computer and steal data or demand payment for “fixing” the issue.)

Scammer: “Hello, this is Lisa from [Your ISP]. We detected unusual activity on your internet connection, and your service will be disconnected within 24 hours unless we verify your details.”

Victim: “What do you mean, unusual activity?”

Scammer: “There have been multiple hacking attempts on your network. We need to secure your connection immediately. Please confirm your router login details so we can protect your account.”

(If the victim gives their login details, the scammer can hijack their internet service and steal personal data.)

Phone Call Examples

ALERT! Your computer has been blocked due to a severe virus infection.

Immediate removal is required to prevent data loss. DO NOT shut down your device.

Call [Fake Number] for Microsoft-certified support.

Popup Examples

Verify Communications Directly

If you receive a suspicious message, contact the provider directly using the official contact details on their website. Avoid using links or phone numbers provided in the message.

Report Suspicious Messages

Forward scam emails to the provider. Reporting scams helps authorities take action against fraudsters.

Check Your Online Account

Log in to your account by typing the website address in directly to avoid phoney links. If you have an account warning it will, in most cases, be available from your account.

Educate Yourself and Others

Stay informed about common scams, and share information with friends and family to help them avoid falling victim. Remember the SCAM method, Stop, Check, Ask and Monitor!

How to Stay Safe from Tech Support Scams


Don’t Trust Unsolicited Calls or Messages
– If someone contacts you claiming your computer has a problem, hang up immediately and do not click any links.
Never Give Remote Access to Strangers – No legitimate company will ask for remote control of your device unless you contacted them first.
Verify Before You Act – If you’re unsure, contact the company directly using their official website or customer service number.
Keep Your Computer Secure – Use strong passwords, enable automatic updates, and run security scans from trusted antivirus software.
Report Scams – If you receive a scam call, email, or pop-up, report it to your country’s cybercrime agency or the official Microsoft/Apple support team.

By staying alert and following these steps, you can outsmart scammers and keep your devices safe. If something seems suspicious, always STOP, CHECK, ASK, and MONITOR—just like a true Scam Buster!

The Role of BeScamAware

The BeScamAware website is a valuable resource for learning about the latest scam tactics. Visit our site for tips, examples, and guidance to keep yourself safe. Stay alert, stay safe and remember the SCAM Method