What Are Tech Support Scams?
Tech support scams are a multi-billion pound industry. The premise is simple: convince you that your computer has a serious problem, then charge you to “fix” it — or worse, use the access to steal your data, install malware, or drain your bank account.
They come in several forms: cold calls claiming to be from Microsoft or your internet provider, browser pop-ups screaming that your PC is infected, fake search results for tech support numbers, and even emails with alarming subject lines about compromised accounts.
The common thread is urgency and fear. Every tech support scam relies on panicking you into acting before you think.
The Red Flags — How to Spot a Scam
1. Unsolicited contact
Microsoft, Apple, Google, your ISP — none of them will ever cold-call you about a problem with your computer. If someone phones you claiming to be from a tech company and says they’ve detected a virus or security issue, it’s a scam. Every single time.
2. Browser pop-ups with phone numbers
Real security warnings from Microsoft Defender or your antivirus never appear inside your web browser and never include a phone number. If you see a full-screen browser alert telling you to call a number immediately, close the tab. If the tab won’t close, press Ctrl+Shift+Esc to open Task Manager and end the browser process.
3. Requests for remote access
Scammers will ask you to install remote access software like AnyDesk, TeamViewer, or UltraViewer so they can “diagnose” the problem. Once they have remote access, they can install malware, steal files, access your banking, or lock you out of your own machine.
4. Fake “proof” of infection
A favourite trick is opening Event Viewer (a standard Windows tool) and pointing at the yellow and red entries as “evidence” of hacking. In reality, every Windows PC has hundreds of these benign log entries — they’re completely normal.
5. Payment by gift card or cryptocurrency
Legitimate companies never ask for payment in gift cards, Bitcoin, or wire transfers. These payment methods are untraceable by design — which is exactly why scammers prefer them.
How the Scam Actually Works
Understanding the playbook helps you recognise it. A typical tech support scam follows this sequence:
Step 1: The hook. You receive a call, see a pop-up, or find a fake support number online. The message is always urgent — your computer is compromised, your data is at risk, you must act now.
Step 2: The “diagnosis”. They walk you through opening legitimate Windows tools (Event Viewer, Command Prompt, Task Manager) and misrepresent normal system activity as evidence of hacking.
Step 3: Remote access. They convince you to install remote access software. Once connected, they may run fake “scans”, open alarming-looking command windows, or show you fabricated results.
Step 4: The upsell. They offer to “fix” the non-existent problem for a fee — typically £150–£500 for a “lifetime security plan”. Some install actual malware during this stage to ensure you call back.
Step 5: The aftermath. You’ve paid for nothing, given a stranger full access to your computer, and potentially exposed your passwords, banking details, and personal files.
How to Protect Yourself
If you get a suspicious call
Hang up. Don’t engage, don’t press any buttons, don’t confirm your name. Just hang up. If you’re worried it might be genuine, look up the company’s official number yourself (don’t use any number the caller gives you) and call them to check.
If you see a browser pop-up
Close the browser tab. If it won’t close, use Ctrl+Shift+Esc to force-close the browser. Do not call any number shown. Do not click any buttons inside the pop-up — even a “Close” button could trigger a download.
Keep your defences up
A properly configured system is your best protection. Make sure Microsoft Defender is running with real-time protection enabled. Better yet, harden it to catch threats that default settings miss.
What to Do If You’ve Already Been Scammed
If you’ve already given remote access or paid money, don’t panic — but act quickly:
- Disconnect from the internet immediately to cut off any remote access.
- Uninstall any remote access software they asked you to install (AnyDesk, TeamViewer, UltraViewer, etc.).
- Run a full malware scan — scammers often install backdoors, keyloggers, or ransomware while they have access.
- Change all your passwords from a different device (phone or another computer). Start with email and banking.
- Contact your bank if you shared any financial information or made a payment. They may be able to reverse the transaction.
- Report it to Action Fraud (UK) or the FTC (US).
Harden Your Defences
The best protection against scams is a properly secured system. The Defender Hardening Console enables every hidden security feature in Microsoft Defender with one click — free, private, no data collected.
Frequently Asked Questions
Will Microsoft ever call me about a virus?
No. Microsoft, Apple, Google, and other major technology companies will never call you unsolicited about problems with your computer. Any such call is a scam.
What if I already gave a scammer remote access?
Disconnect from the internet immediately, uninstall the remote access software, run a full malware scan, change all passwords from a different device, contact your bank if you shared financial information, and report the scam to Action Fraud or the FTC.
Are browser pop-up warnings real?
No. Real security warnings from Windows or your antivirus never appear inside your web browser and never include a phone number. Browser pop-ups claiming your computer is infected are always scams. Close the tab or force-close the browser.