Tech Support Scams: How to Spot Fake Computer Help and Protect Yourself (2026 Guide)

Tech Support Scams: How to Spot Fake Computer Help and Protect Yourself (2026 Guide)

Last updated: March 17, 2026 | By Alpha

Tech support scams are one of the most persistent and devastating forms of fraud in America. In 2025, the FBI reported over $1.3 billion in losses from tech support fraud — making it the third-costliest scam category behind investment fraud and business email compromise. These scams target everyone, but adults over 60 account for 66% of all losses.

Whether it's a terrifying pop-up claiming your computer has a virus, an unsolicited phone call from "Microsoft," or a fake antivirus alert demanding immediate action, tech support scammers use fear and urgency to trick you into paying for services you don't need — or worse, giving them remote access to your entire digital life.

In this comprehensive guide, you'll learn exactly how these scams work, the 8 most common types, 12 red flags to watch for, and step-by-step protection strategies. Plus, you can check any suspicious message with our free AI scam detector.


Table of Contents

  1. What Is a Tech Support Scam?
  2. The Numbers: How Big Is This Problem?
  3. 8 Common Tech Support Scam Types
  4. How Tech Support Scams Actually Work (The Playbook)
  5. 12 Red Flags That It's a Tech Support Scam
  6. Real Examples of Tech Support Scams
  7. Who Gets Targeted Most?
  8. What to Do If You've Been Scammed
  9. 7 Ways to Protect Yourself
  10. The Remote Access Danger: What Scammers Can Do With Your Computer
  11. Refund Scams: The Dangerous Sequel
  12. FAQ

What Is a Tech Support Scam?

A tech support scam is any scheme where a fraudster pretends to be a legitimate technical support representative to steal money, personal information, or gain unauthorized access to your devices. These scammers typically impersonate well-known companies like Microsoft, Apple, Google, Norton, McAfee, or your internet service provider.

The core tactic is always the same: create fear about a fake problem, then offer to "fix" it for a fee.

How It Differs From Legitimate Tech Support

Feature Real Tech Support Scam Tech Support
Contact initiation You contact them They contact you
Payment method Credit card, invoice Gift cards, wire transfer, crypto
Urgency Works at your pace "Act NOW or lose everything"
Remote access Only with your explicit consent for a specific issue Demands immediate remote access
Caller ID May show real number Spoofed to look legitimate
Diagnosis Runs actual diagnostic tools Shows fake "errors" in Event Viewer
Cost Transparent pricing upfront Vague until they hook you

The Numbers: How Big Is This Problem?

Tech support fraud is a billion-dollar industry that's growing every year:

  • $1.3 billion lost in 2025 (FBI IC3 Report)
  • $924 million lost in 2023 (up 15% from 2022)
  • 37,560 complaints filed with the FTC in 2024 alone
  • Average loss: $25,000+ for victims over 60
  • 66% of losses come from victims aged 60+
  • Top impersonated brands: Microsoft (42%), Apple (18%), Google (12%), Norton/McAfee (10%)
  • Remote access abuse involved in 78% of cases
  • Gift card payments demanded in 64% of cases

The Growth Trend

Year Reported Losses Change
2021 $347 million
2022 $806 million +132%
2023 $924 million +15%
2024 $1.1 billion +19%
2025 $1.3 billion +18%

The numbers only tell part of the story. The FTC estimates that only 5-10% of victims actually report the fraud, meaning the real total could exceed $10 billion annually.


8 Common Tech Support Scam Types

1. The Fake Virus Pop-Up

How it works: You're browsing the web when suddenly your screen fills with alarming warnings: "YOUR COMPUTER IS INFECTED!" "CALL MICROSOFT SUPPORT IMMEDIATELY: 1-800-XXX-XXXX." The pop-up may play loud alarm sounds, lock your browser, or display a fake blue screen of death.

What really happens: There is no virus. The pop-up is just a webpage designed to look like a system alert. It exploits your browser's full-screen mode to appear convincing.

The hook: A phone number to call for "immediate help." Once you call, you're connected to scammers who will charge $200-$800 for "repairs" to a nonexistent problem.

How to escape: Press Ctrl+Alt+Delete (Windows) or Command+Option+Escape (Mac) to force-quit your browser. Never call the number.

2. The Cold Call From "Microsoft"

How it works: You receive an unsolicited phone call from someone claiming to be from Microsoft, Dell, HP, or your ISP. They say they've "detected a problem" with your computer or that your "Windows license is expiring."

What really happens: Microsoft will never call you unsolicited. The caller is using a spoofed phone number and a script designed to sound authoritative.

The playbook: They'll ask you to open Event Viewer (which always shows harmless warnings), claim these are "critical errors," then request remote access to "fix" them. They'll install unnecessary software and charge $300-$500.

3. The Fake Antivirus Software

How it works: A pop-up or ad claims your antivirus has expired or your computer has been scanned and found infected. It urges you to download "security software" immediately.

What really happens: The "antivirus" is actually malware — ransomware, spyware, or a trojan that gives scammers backdoor access to your system.

Warning signs: Legitimate antivirus software doesn't advertise through browser pop-ups. Real security alerts come from software already installed on your computer.

4. The Search Engine Trap

How it works: You search Google for "HP printer support" or "Netflix help" and click on a top result that looks official. The website displays a phone number that connects you to scammers, not the real company.

What really happens: Scammers buy Google Ads or create SEO-optimized fake support websites that rank above legitimate results. The sites look professional with company logos and branding.

How to avoid it: Always go directly to the company's official website (e.g., support.microsoft.com) rather than searching and clicking ads.

5. The Email Alert Scam

How it works: You receive an email that appears to be from Norton, McAfee, Geek Squad, or Microsoft claiming your subscription is about to renew for $299-$499 unless you call to cancel.

What really happens: There is no subscription. The email is designed to make you panic and call the number, where scammers will "help you cancel" by getting your bank details or remote access to your computer.

The tell: Check your actual bank/credit card statements. If there's no charge, the email is fake.

6. The Browser Hijack

How it works: Your browser's homepage suddenly changes, new toolbars appear, or you keep getting redirected to unfamiliar websites. A message tells you to call tech support to remove the "virus."

What really happens: You've likely installed a browser extension or "free" software that bundled adware. The redirect pages are scam landing pages.

The fix: Remove unfamiliar browser extensions, clear your browser cache, and run a legitimate malware scan (Malwarebytes is free).

7. The Remote Access Takeover

How it works: After establishing contact through any of the methods above, the scammer convinces you to install remote access software like AnyDesk, TeamViewer, or UltraViewer. They claim they need to "diagnose" your computer.

What really happens: Once they have remote access, they can:

  • Install actual malware or keyloggers
  • Access your banking websites
  • Copy personal files and photos
  • Create hidden admin accounts for future access
  • Lock you out of your own computer
  • Transfer money from your bank accounts

Critical rule: Never give remote access to someone who contacted you first.

8. The "Free Scan" Bait

How it works: A website or ad offers a "free computer scan" that takes a few minutes. After the scan, it reports dozens of "critical issues" that need immediate attention.

What really happens: The scan is fake. It shows the same alarming results on every computer. The goal is to sell you unnecessary "repair" software for $50-$300 or convince you to call for paid support.


How Tech Support Scams Actually Work (The Playbook)

Understanding the scammer's step-by-step process helps you recognize it in real time:

Stage 1: The Hook (Creating Fear)

  • Pop-up alarm, cold call, or email warning
  • Claim: "Your computer is compromised"
  • Urgency: "You must act NOW"
  • Fear: "Your bank accounts are at risk"

Stage 2: The Build-Up (Establishing Authority)

  • Claim to be from Microsoft, Apple, or your ISP
  • Use technical jargon to sound legitimate
  • Reference your computer's actual operating system
  • May know your name (from data broker sites)

Stage 3: The "Proof" (Fake Evidence)

  • Ask you to open Event Viewer (always shows warnings)
  • Show you the "tree" command (files scrolling = "hacking in progress")
  • Display fake scanning websites showing "threats detected"
  • Point to normal system processes as "suspicious activity"

Stage 4: The Remote Access (Gaining Control)

  • "We need to connect to your computer to fix this"
  • Guide you to install AnyDesk, TeamViewer, or similar
  • Once connected, they control your mouse and keyboard
  • They may deliberately break things to "prove" the problem

Stage 5: The Close (Extracting Payment)

  • "The repair will cost $299 (one-time) or $499 (lifetime protection)"
  • Preferred payment: gift cards, wire transfer, cryptocurrency
  • May install actual malware and offer to "protect" you monthly
  • Might ask for bank details to "verify your identity"

Stage 6: The Callback (Double-Dipping)

  • Weeks later: "We need to issue a refund for overpayment"
  • This leads to the refund scam (see section below)
  • Or they sell your info to other scam operations
  • Some install backdoors for future remote access

12 Red Flags That It's a Tech Support Scam

Watch for these warning signs:

  1. Unsolicited contact — You didn't reach out to them first
  2. Urgency and fear — "Your computer will crash!" "Your data is at risk!"
  3. Request for remote access — Especially from an unexpected caller
  4. Gift card payments — No legitimate company accepts iTunes or Google Play cards as payment
  5. Fake caller ID — The number appears to be from Microsoft, Apple, etc. (easily spoofed)
  6. Event Viewer "proof" — Showing you normal system warnings as evidence of infection
  7. Pressure to act immediately — "Don't turn off your computer" or "Don't hang up"
  8. Claims your computer is sending spam/viruses — Your ISP handles this differently
  9. Request for banking info — To "verify identity" or "process refund"
  10. Vague company identity — "We're from Windows support" (Windows is an OS, not a company)
  11. Non-refundable payment methods — Wire transfers, cryptocurrency, prepaid debit cards
  12. Follow-up calls about refunds — "We charged you too much, let us refund you" (it's another scam)

Real Examples of Tech Support Scams

Example 1: The Pop-Up Trap

You're reading a news article when your screen suddenly shows: "WINDOWS DEFENDER — SECURITY WARNING. Your PC is infected with 5 viruses! Call Microsoft Certified Technicians: 1-888-XXX-XXXX. Do NOT restart your computer!" Loud alarm sounds play.

Reality: This is just a webpage in full-screen mode. Close your browser to escape.

Example 2: The Cold Call

"Hello, I'm calling from Microsoft Technical Support. We've detected suspicious activity on your Windows computer. Your computer may be sending viruses to other computers on your network. Can I help you fix this?"

Reality: Microsoft never makes unsolicited calls. The scammer doesn't know anything about your computer.

Example 3: The Email Invoice

Subject: "Norton LifeLock — Auto-Renewal Confirmation $449.99" Body: "Your annual Norton subscription has been renewed for $449.99. If you did not authorize this charge, call 1-866-XXX-XXXX within 24 hours to cancel and receive a full refund."

Reality: You probably don't have a Norton subscription. Even if you do, check your bank statements — don't call the number in the email.

Example 4: The Search Result

You Google "HP printer not working" and click the first result. The website looks like HP's official support page. A chat pop-up says: "HP Certified Support — Call 1-855-XXX-XXXX for immediate printer assistance."

Reality: This is a fake website. The real HP support is at support.hp.com.


Who Gets Targeted Most?

While anyone can fall victim, certain groups face higher risk:

By Age

  • 60+ years old: 66% of total losses ($860M+ in 2025)
  • 40-59 years old: 22% of losses
  • Under 40: 12% of losses (but growing rapidly)

By Circumstance

  • People experiencing real computer issues — Searching for help makes them vulnerable to fake support sites
  • Less tech-savvy users — May not know what Event Viewer warnings mean
  • People living alone — No one nearby to provide a second opinion
  • Recent retirees — More time online, less workplace IT support
  • Small business owners — Fear of business disruption

Why Seniors Are Hit Hardest

  1. Grew up trusting authority figures — "Microsoft" carries weight
  2. Less familiar with caller ID spoofing — Assume displayed numbers are real
  3. Fear of losing precious photos/documents — Strong emotional leverage
  4. May not have trusted tech-savvy advisor nearby — No one to ask "is this real?"
  5. Fixed income — A $500 loss is devastating, but scammers are persistent
  6. Less likely to report — Embarrassment, fear of losing independence

What to Do If You've Been Scammed

If you've already fallen victim, take these steps immediately:

Step 1: Disconnect and Secure (First 30 Minutes)

  1. Disconnect from the internet — Unplug ethernet, turn off WiFi
  2. Uninstall remote access software — Remove AnyDesk, TeamViewer, UltraViewer, SupRemo
  3. Run a full antivirus scan — Use Windows Defender or Malwarebytes (free)
  4. Change ALL passwords — From a different, clean device
  5. Enable 2FA everywhere — Especially email and banking

Step 2: Protect Your Finances (First 24 Hours)

  1. Call your bank — Report the fraud, freeze affected accounts
  2. Contact your credit card company — Dispute charges, request new card
  3. Place a fraud alert — Contact one of the three credit bureaus (Equifax, Experian, TransUnion)
  4. Monitor statements — Check for unauthorized transactions daily

Step 3: Report the Scam

  1. FTC: ReportFraud.ftc.gov
  2. FBI IC3: ic3.gov
  3. Microsoft: microsoft.com/reportascam (if they impersonated Microsoft)
  4. Your state Attorney General: naag.org/find-my-ag
  5. Local police: File a report for your records

Step 4: Secure Your Computer (First Week)

  1. Consider a clean install — If remote access was granted, this is safest
  2. Check for hidden accounts — Settings > Accounts > Other users
  3. Review installed programs — Remove anything unfamiliar
  4. Check browser extensions — Remove anything you didn't install
  5. Update all software — OS, browsers, antivirus
  6. Change WiFi password — If the scammer had access to your network

Getting Your Money Back

  • Credit card: File a chargeback (highest success rate)
  • Debit card: Contact your bank's fraud department
  • Gift cards: Contact the gift card company immediately (recovery unlikely but possible if fast)
  • Wire transfer: Contact your bank ASAP (recovery difficult but not impossible)
  • Cryptocurrency: Recovery is extremely unlikely

7 Ways to Protect Yourself

1. Know the Rules

  • Microsoft, Apple, Google, and your ISP will NEVER call you unsolicited
  • Real tech companies don't demand immediate payment over the phone
  • No legitimate company accepts gift cards as payment
  • Pop-up warnings with phone numbers are always scams

2. Secure Your Browser

  • Install an ad blocker (uBlock Origin is free and excellent)
  • Keep your browser updated
  • Don't install extensions from unknown sources
  • Enable pop-up blocking

3. Use Real Security Software

  • Windows Defender (built into Windows 10/11) is excellent and free
  • Malwarebytes (free version for on-demand scanning)
  • Don't pay for antivirus you didn't research yourself
  • Keep auto-updates enabled

4. Verify Before Trusting

  • If someone calls claiming to be tech support, hang up
  • Look up the real company number from their official website (not from the call/email/pop-up)
  • Call them back on the verified number
  • Ask a trusted friend or family member for a second opinion

5. Never Give Remote Access to Strangers

  • Remote access = full control of your computer
  • Only grant remote access when you initiated the support request
  • Only use remote access with verified companies through their official channels
  • Watch what they do during the session — end it if anything seems wrong

6. Use Safe Payment Methods

  • Credit cards offer the best fraud protection and chargeback rights
  • Never pay with gift cards, wire transfers, cryptocurrency, or cash
  • Be suspicious of "discount for cash/gift card" offers

7. Educate Your Circle

  • Talk to elderly parents and grandparents about these scams
  • Set up their computers with ad blockers and security software
  • Put a sticky note on their monitor: "Microsoft will never call you"
  • Offer to be their "tech support second opinion" person

The Remote Access Danger: What Scammers Can Do With Your Computer

When you give a scammer remote access, they can:

Immediate Actions

  • View everything on your screen — Including open banking tabs
  • Control your mouse and keyboard — Navigate anywhere you can
  • Install software silently — Malware, keyloggers, backdoors
  • Copy files — Documents, photos, tax returns, passwords
  • Access saved passwords — Browser-stored credentials for all your sites

Behind-the-Scenes Actions

  • Create hidden admin accounts — For future unauthorized access
  • Modify system settings — Disable security features
  • Install persistent backdoors — Software that survives restarts
  • Access your email — Send emails as you, reset passwords for other accounts
  • Encrypt your files — Hold them for ransom

Long-Term Consequences

  • Identity theft — Using your stolen personal information
  • Financial fraud — Accessing bank accounts, opening new credit lines
  • Account takeovers — Hijacking your email, social media, shopping accounts
  • Repeated victimization — Selling your access to other criminal groups
  • Data sold on dark web — Your information available to any buyer

Bottom line: Giving remote access to a scammer is like giving a stranger the keys to your house, your car, your safe, and your filing cabinet — all at once.


Refund Scams: The Dangerous Sequel

One of the most devastating follow-up scams targets people who've already been victimized:

How Refund Scams Work

  1. The callback: Weeks or months later, you get a call: "We're issuing refunds because our company is shutting down. You're owed $300."
  2. The setup: They ask you to install remote access software again "to process the refund."
  3. The trick: While connected, they open your bank's website and edit the HTML code to make it LOOK like too much money was deposited (e.g., $3,000 instead of $300).
  4. The panic: "Oh no, we accidentally sent $3,000! You need to send back the extra $2,700 or I'll lose my job!"
  5. The extraction: They pressure you to send the "overpayment" via wire transfer or gift cards.
  6. The reality: No money was ever deposited. They just edited what your screen displays. Your actual bank balance never changed.

Why This Works

  • Victims feel guilty about the "accidental" overpayment
  • The edited bank page looks completely real on screen
  • Emotional pressure ("I'll lose my job") creates urgency
  • Previous victims may trust the scammer's voice/company name

How to Protect Yourself

  • No one issues refunds by remote access to your computer
  • Check your bank balance from a different device before believing the screen
  • Real refunds go back the way they came — credit card refund, check in the mail
  • Hang up and call your bank directly if anyone claims to have sent you money

FAQ

Is it ever legitimate for a company to call me about computer problems?

Very rarely. Your ISP might contact you if your computer is part of a botnet sending spam, but they would send a letter or email first, not demand immediate remote access. Microsoft, Apple, and Google will never call you unsolicited about computer problems.

What if I already gave a scammer remote access?

Disconnect from the internet immediately. Remove any remote access software they had you install. Run a full antivirus scan. Change all your passwords from a different device. Consider having a trusted IT professional check your computer or doing a clean reinstall of your operating system.

Can scammers really access my bank account through remote access?

Yes. If you're logged into your bank's website or have banking apps open, a scammer with remote access can see and interact with everything you can. They can also install keyloggers that capture your passwords when you type them later.

How do I know if my computer really has a virus?

Use the built-in security software on your computer (Windows Defender for Windows, XProtect for Mac). Run a scan. These tools are reliable and free. If they say you're clean, you almost certainly are. You can also use Malwarebytes for a second opinion.

Why do scammers want gift cards instead of credit cards?

Gift cards are untraceable. Once the scammer has the code on the back, they can drain the value instantly and it cannot be reversed. Credit card charges can be disputed and reversed through your bank.

My screen is locked with a "call this number" message. What do I do?

This is a browser lock scam. Press Ctrl+Alt+Delete (Windows) or Command+Option+Escape (Mac) to open Task Manager. Force-quit your browser. When you reopen it, don't restore the previous session. If the lock persists, restart your computer.

Are tech support scams only on Windows?

No. While Windows users are targeted most often (largest market share), Mac users, Chromebook users, and even smartphone users are increasingly targeted. The scam techniques are adapted for each platform.

How do I report a tech support scam?

Report to the FTC at ReportFraud.ftc.gov, the FBI's IC3 at ic3.gov, and your state Attorney General. If the scammer impersonated a specific company, report to that company as well (e.g., microsoft.com/reportascam).

Can I get my money back?

It depends on how you paid. Credit card payments have the best chance of recovery through chargebacks. Debit card fraud should be reported to your bank immediately. Gift card payments are rarely recoverable. Wire transfers and cryptocurrency are extremely difficult to recover.

What's the difference between tech support scams and refund scams?

Tech support scams charge you for fake repairs. Refund scams claim to give you money back but actually trick you into sending them money. Refund scams often target previous tech support scam victims.


Stay Safe — Check Before You Trust

Tech support scammers rely on fear, urgency, and your trust in well-known brand names. The single most important rule: if someone contacts you first claiming your computer has a problem, it's a scam.

When in doubt, use our free AI scam detector to analyze any suspicious message, email, or pop-up text. It takes seconds and could save you thousands.

Remember:

  • Microsoft will never call you
  • Real tech support doesn't demand gift cards
  • Pop-ups with phone numbers are always fake
  • When in doubt, hang up and verify independently

Stay informed. Stay skeptical. Stay safe.


This guide is updated regularly with the latest tech support scam tactics. Last updated March 17, 2026.

Have a suspicious message? Check it free with Alpha's AI Scam Detector

🔍 Think You've Been Targeted?

Use our free AI-powered scam detector to analyze suspicious messages, emails, or screenshots instantly.

Check for Scams — Free