When Your Computer Tells You to Call — Don’t
Mike is trying to check his email.
He’s not overly computer savvy, but he gets by. Reads the news. Sends messages to family. Pays a few bills online.
Then his screen freezes.
A loud alert starts blaring.
A message fills the screen:
“WARNING: Your computer has been infected. Call Microsoft immediately.”
There’s a phone number.
Mike hesitates.
The message looks serious. Official. Urgent.
So, he calls.
The Help That Wasn’t Help
The person who answers sounds professional.
Calm. Confident.
They say they’re with tech support.
They explain that Mike’s computer has been compromised—viruses, hackers, possible identity theft.
They can help.
But they need access.
Mike follows their instructions:
- Downloads a program
- Grants remote access
- Watches as the cursor moves on its own
The “technician” shows him files, logs, warnings—things Mike doesn’t fully understand.
But it looks convincing.
The Real Goal
Then comes the solution.
“We can fix this for you today.”
There’s a fee.
A few hundred dollars.
Maybe more.
Mike pays.
But it doesn’t stop there.
Once inside his computer, the scammer may:
- Access banking information
- Install malware
- Lock files or accounts
- Come back later for more
What started as a “fix” becomes a much bigger problem.
What Just Happened?
This is a tech support scam—one of the most common and costly scams targeting individuals today.
According to the Federal Bureau of Investigation, tech support scams result in billions of dollars in losses each year and often target older adults.
How These Scams Work
Scammers use fear and confusion to their advantage.
The Setup
- Pop-up warnings on your screen
- Fake security alerts
- Unsolicited phone calls
The Approach
- Claim your device is infected or compromised
- Use technical language to sound credible
- Create urgency
The Goal
- Get remote access to your device
- Convince you to pay for fake services
- Steal sensitive information
Why This Scam Works
For someone like Mike, the situation feels overwhelming.
- The warning looks official
- The problem sounds serious
- The “expert” sounds trustworthy
And when technology is unfamiliar, it’s easy to rely on someone who seems to know what they’re doing.
The Red Flags
Even convincing scams leave clues:
🚩 Unsolicited pop-ups telling you to call immediately
🚩 Messages claiming to be from Microsoft, Apple, or your bank
🚩 Requests for remote access to your computer
🚩 Pressure to act quickly
🚩 Requests for payment via unusual methods
How to Protect Yourself
- Don’t Call the Number
If you see a pop-up:
- Do not call the number provided
- Close the browser or restart your computer
- Never Give Remote Access to Strangers
Legitimate companies will not:
- Contact you out of the blue
- Ask for access this way
- Talk to Someone You Trust
If you’re unsure:
- Ask a family member
- Contact a known, trusted technician
- Call your bank if financial information may be involved
If It Happens, Act Quickly
If you’ve given access or made a payment:
- Disconnect your computer from the internet
- Contact your bank immediately
- Change important passwords
- Report the incident to IC3.gov
Final Thought: Slow Down the Panic
Scammers rely on urgency.
They want you to feel like something is wrong—and that they are the only solution.
But real tech companies don’t:
- Send alarming pop-ups
- Ask you to call random numbers
- Request remote access without you initiating it
If your computer tells you to panic, that’s the moment to pause.
Because the person offering help—
Might be the problem.
Sources
Federal Bureau of Investigation – Internet Crime Complaint Center (IC3) 2025 Annual Report
https://www.ic3.gov/Media/PDF/AnnualReport/2025_IC3Report.pdf
Internet Crime Complaint Center – Report Fraud & Learn About Scams
