{"id":20745,"date":"2024-11-25T11:00:50","date_gmt":"2024-11-25T10:00:50","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=20745"},"modified":"2025-10-08T10:18:40","modified_gmt":"2025-10-08T08:18:40","slug":"tech-support-betrug","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/11\/25\/tech-support-betrug\/","title":{"rendered":"Beware of Tech Support Scams: How You Can Protect Yourself"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_20745 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_20745')){$('.twoclick_social_bookmarks_post_20745').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2024\\\/11\\\/25\\\/tech-support-betrug\\\/\",\"post_id\":20745,\"post_title_referrer_track\":\"Beware+of+Tech+Support+Scams%3A+How+You+Can+Protect+Yourself\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_20753\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-20753\" class=\"size-medium wp-image-20753\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1-300x200.png\" alt=\"\u201cAre You Sure?\u201d Warning Message\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1-300x200.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1-1024x683.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1-768x512.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1-1536x1024.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Design-12-1-2048x1365.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-20753\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/de.freepik.com\/fotos-kostenlos\/sind-sie-sicher-warnung-warnung_18122996.htm#fromView=search&amp;page=1&amp;position=12&amp;uuid=50350d2e-d3fa-41a2-9b73-debb6a8fe02d\">Freepik<\/a><\/p><\/div><\/p>\n<p>In today&#8217;s digital world, we are constantly connected to technology &#8211; whether it&#8217;s through our smartphones, computers or other electronic devices. Unfortunately, there are people who take advantage of this fact to scam the unsuspecting. One common scam that many fall victim to is the tech support scam. In this blog post, we want to explain how the scam works and how you can protect to protect yourself.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">What Is Tech Support Scam?<\/span><\/h3>\n<p>Tech support scams come in various forms, but it basically comes in the form of scammers pretending to be employees of a tech support team and tricking unsuspecting users into paying for questionable services or programs or providing personal information. This is often done via unrequested phone calls, pop-up ads or fake emails claiming that your computer or other device has been affected by a virus or other threat.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Does the Scam Work?<\/span><\/h3>\n<p>The scammers use various tactics to gain the trust of their victims. They might claim to be from a well-known technology company and offer to fix the supposed problem. They often display fake alerts or pop-ups urging users to call or click on a link.<\/p>\n<p>Once on the phone, the scammers try to obtain personal information such as passwords or credit card details pretending that these are needed for the fixing. Alternatively, they try to get users to download remote access software that will allow them to solve alleged problems remotely. However, instead of solving the problem, they may actually install malware or unwanted programs on your computer.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Can You Protect Yourself?<\/span><\/h3>\n<p>There are several things you can do to protect yourself from tech support scams:<\/p>\n<ol>\n<li>DON&#8217;T LET YOURSELF BE RUSHED!<br \/>\nNothing is so important that it has to be done immediately. This is particularly the case when using a smartphone.<\/li>\n<li>Be skeptical about spontaneous calls or messages claiming there are problems with your device. Serious companies will not contact you unexpectedly to solve technical problems and ask for data or even payments.<\/li>\n<li>Ignore pop-up ads or emails that require urgent action and are designed to get you to provide personal information or click on suspicious links. You always have the option of checking the sender of emails.<\/li>\n<li>Verify the identity of the caller or company by calling the company directly that the suspected scammer claims to be from. Use the official contact information from the website or other trusted sources.<\/li>\n<li>Install reliable antivirus software and keep your programs and operating systems updated to close security gaps and avoid malware.<\/li>\n<li>Be careful when sharing personal or financial information over the phone or internet<\/li>\n<li>If in doubt, contact someone you trust.<\/li>\n<\/ol>\n<p>Tech support scams are a serious problem that affect thousands of people every year. By educating yourself about common scams and taking precautions, you can protect yourself from these fraudulent practices. Remember, it&#8217;s always safer to be suspicious and when in doubt, consult a trusted person instead of responding to random unsolicited requests.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?gguid=PER-3EYLA7M&amp;allou=1&amp;lidx=1\">Morgane Overath<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":6019,"featured_media":20751,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[314],"tags":[1317,81,61,1319,119,1318,1321,1320,39],"class_list":["post-20745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-sicherheit","tag-betrug","tag-it-security","tag-it-sicherheit","tag-scam","tag-support","tag-tech-support","tag-tech-support-scam","tag-tech-support-betrug","tag-technologie"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/20745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/6019"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=20745"}],"version-history":[{"count":13,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/20745\/revisions"}],"predecessor-version":[{"id":23047,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/20745\/revisions\/23047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/20751"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=20745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=20745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=20745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}