Skip Navigation

When Your Computer Tells You to Call — Don’t

Mike is trying to check his email.

He’s not overly computer savvy, but he gets by. Reads the news. Sends messages to family. Pays a few bills online.

Then his screen freezes.

A loud alert starts blaring.

A message fills the screen:

“WARNING: Your computer has been infected. Call Microsoft immediately.”

There’s a phone number.

Mike hesitates.

The message looks serious. Official. Urgent.

So, he calls.

The Help That Wasn’t Help

The person who answers sounds professional.

Calm. Confident.

They say they’re with tech support.

They explain that Mike’s computer has been compromised—viruses, hackers, possible identity theft.

They can help.

But they need access.

Mike follows their instructions:

  • Downloads a program
  • Grants remote access
  • Watches as the cursor moves on its own

The “technician” shows him files, logs, warnings—things Mike doesn’t fully understand.

But it looks convincing.

The Real Goal

Then comes the solution.

“We can fix this for you today.”

There’s a fee.

A few hundred dollars.

Maybe more.

Mike pays.

But it doesn’t stop there.

Once inside his computer, the scammer may:

  • Access banking information
  • Install malware
  • Lock files or accounts
  • Come back later for more

What started as a “fix” becomes a much bigger problem.

What Just Happened?

This is a tech support scam—one of the most common and costly scams targeting individuals today.

According to the Federal Bureau of Investigation, tech support scams result in billions of dollars in losses each year and often target older adults.

How These Scams Work

Scammers use fear and confusion to their advantage.

The Setup

  • Pop-up warnings on your screen
  • Fake security alerts
  • Unsolicited phone calls

The Approach

  • Claim your device is infected or compromised
  • Use technical language to sound credible
  • Create urgency

The Goal

  • Get remote access to your device
  • Convince you to pay for fake services
  • Steal sensitive information

Why This Scam Works

For someone like Mike, the situation feels overwhelming.

  • The warning looks official
  • The problem sounds serious
  • The “expert” sounds trustworthy

And when technology is unfamiliar, it’s easy to rely on someone who seems to know what they’re doing.

The Red Flags

Even convincing scams leave clues:

🚩 Unsolicited pop-ups telling you to call immediately
🚩 Messages claiming to be from Microsoft, Apple, or your bank
🚩 Requests for remote access to your computer
🚩 Pressure to act quickly
🚩 Requests for payment via unusual methods

How to Protect Yourself

  1. Don’t Call the Number

If you see a pop-up:

  • Do not call the number provided
  • Close the browser or restart your computer
  1. Never Give Remote Access to Strangers

Legitimate companies will not:

  • Contact you out of the blue
  • Ask for access this way
  1. Talk to Someone You Trust

If you’re unsure:

  • Ask a family member
  • Contact a known, trusted technician
  • Call your bank if financial information may be involved

If It Happens, Act Quickly

If you’ve given access or made a payment:

  • Disconnect your computer from the internet
  • Contact your bank immediately
  • Change important passwords
  • Report the incident to IC3.gov

Final Thought: Slow Down the Panic

Scammers rely on urgency.

They want you to feel like something is wrong—and that they are the only solution.

But real tech companies don’t:

  • Send alarming pop-ups
  • Ask you to call random numbers
  • Request remote access without you initiating it

If your computer tells you to panic, that’s the moment to pause.

Because the person offering help—

Might be the problem.

 

Sources

Federal Bureau of Investigation – Internet Crime Complaint Center (IC3) 2025 Annual Report

https://www.ic3.gov/Media/PDF/AnnualReport/2025_IC3Report.pdf

 

Internet Crime Complaint Center – Report Fraud & Learn About Scams

https://www.ic3.gov

 

Scams