Tech Support Scams: Fake Microsoft and Apple Calls

Tech Support Scams: Fake Microsoft and Apple Calls

Quick Take

The most important thing to know: Legitimate tech companies never cold-call you about computer problems. If someone calls claiming to be from Microsoft, Apple, or any tech company saying your computer is infected or compromised, it’s a scam. Hang up immediately.

These tech support scams trick thousands of people into paying for fake computer repairs and handing over remote access to their devices. The good news? They’re completely preventable once you know what to watch for.

What This Threat Actually Is

A tech support scam starts with an unsolicited phone call, pop-up window, or email claiming there’s an urgent problem with your computer or online accounts. The scammer poses as a representative from Microsoft, Apple, Norton, or another trusted tech company.

Here’s how criminals execute these scams: They either cold-call potential victims or use fake pop-up ads on websites that display alarming messages about viruses or security breaches. Once they have your attention, they guide you through steps that appear to show problems with your computer — usually by having you look at normal system files or logs that seem suspicious to non-technical users.

The scammer then offers to fix these “problems” for a fee, typically between $200-$500. They’ll ask you to download remote access software so they can “repair” your computer. Once they have remote access, they may install actual malware, steal personal information stored on your device, or set up backdoor access for future attacks.

Why it works so well: These scams exploit our natural anxiety about technology and our trust in well-known companies. Many people aren’t confident about computer security, so when someone with technical-sounding language offers to help, it feels legitimate. The scammers are also skilled at creating urgency — claiming your computer will be permanently damaged or your accounts compromised if you don’t act immediately.

Tech support scams are unfortunately common, with consumer protection agencies receiving hundreds of thousands of reports annually. The financial losses add up quickly because victims often provide credit card information and may not realize they’ve been scammed until days or weeks later.

Who’s Most at Risk

Older adults are disproportionately targeted because scammers assume they may be less familiar with how tech companies actually operate and more trusting of unsolicited help offers. However, anyone can fall victim — especially during stressful moments when you’re already having computer problems.

You’re at higher risk if you:

  • Recently searched online for tech support help (scammers buy ads targeting these searches)
  • Use your computer for online banking or shopping (scammers know financial information may be accessible)
  • Have received similar scam calls before (your number gets shared among scammer networks)
  • Live alone or are isolated (less likely to have someone nearby to ask for a second opinion)

Specific scenarios that create exposure:
If you’ve been getting legitimate security warnings from your computer or accounts, you might be more susceptible to fake ones. If you recently had actual computer problems, a scammer’s call might seem like fortunate timing rather than a red flag.

The uncomfortable reality: Data brokers and phone number databases mean scammers can easily get your contact information and sometimes basic details about you. You can’t completely prevent them from calling, but you can control how you respond.

Real-World Scenarios

Scenario 1: The Fake Microsoft Call
Sarah receives a call from someone with an Indian accent claiming to be “David from Microsoft Security.” He tells her their monitoring systems detected malware on her computer linked to her IP address. David guides her to Windows Event Viewer, showing her normal system errors that he claims are proof of infection.

Feeling anxious, Sarah follows his instructions to download TeamViewer software so he can “remove the threats.” Once connected, David shows her more files he claims are malicious and offers a $299 security package. Sarah provides her credit card information. Only later does she realize Microsoft doesn’t make unsolicited calls — and by then, the scammer has remote access to her computer and her financial information.

Sarah’s costs: $299 for fake services, plus time and stress dealing with potential credit card fraud. She also needs professional help to ensure no malware was actually installed during the fake “repair.”

Scenario 2: The Browser Pop-up Trap
While browsing news websites, Mike encounters a pop-up that looks like a Windows security alert. It claims his computer is infected and provides a phone number to call immediately. The pop-up won’t close easily, making it seem more urgent.

When Mike calls the number, the “technician” confirms the infection and offers to guide him through removal steps. The scammer has Mike open normal system folders, pointing to routine files as evidence of problems. After an hour of “diagnosis,” Mike is told he needs advanced malware removal for $450.

Mike’s realization moment: When he mentions the call to his tech-savvy nephew the next day, he learns that legitimate security warnings never include phone numbers to call.

Mike’s costs: $450 plus the time spent on the phone and potential exposure of personal information visible on his screen during the remote session.

Scenario 3: The Apple ID Scare
Linda gets a robocall saying her Apple ID has been compromised and used for suspicious purchases. She’s instructed to press 1 to speak with an Apple security specialist. Worried about her account, she follows the prompts.

The fake Apple representative confirms unauthorized activity and says they need to verify her identity and secure her account. They ask for her Apple ID password, social security number, and credit card details to “reverse the fraudulent charges.”

Linda’s wake-up call: When she checks her actual Apple account later, there are no unauthorized purchases — but by then, the scammer has her login credentials and personal information.

Linda’s costs: Potential account takeover, identity theft risk, and the time needed to change passwords and monitor accounts for misuse.

Warning Signs

Red flags that indicate a tech support scam:

  • Unsolicited contact claiming urgent computer problems — Real tech companies don’t monitor your personal computer or call about issues
  • Requests for remote access software like TeamViewer, LogMeIn, or AnyDesk from someone who contacted you first
  • Pressure to act immediately or claims your computer will be “permanently damaged” without instant action
  • Requests for payment via gift cards, wire transfers, or cryptocurrency — legitimate companies don’t ask for these payment methods
  • Generic greetings and lack of specific account information — real companies have your account details
  • Pop-ups that claim to be security warnings but include phone numbers — legitimate security alerts direct you to official websites, not phone numbers

Where to check if you’re unsure:

  • Contact the company directly using official phone numbers from their website, not numbers provided by the caller
  • Check your computer’s actual security software dashboard
  • Ask a tech-savvy friend or family member for a second opinion

The early warning most people ignore: Feeling rushed or pressured during any tech support interaction. Legitimate technical support is patient and never creates artificial urgency.

Real vs. false alarms:

  • Real: Security warnings within your actual antivirus software or operating system that don’t include phone numbers
  • False: Pop-ups with phone numbers, unsolicited calls about computer problems, or emails claiming to be from tech companies about issues you didn’t report

How to Protect Yourself

Here are your best defenses against tech support scams, starting with the most effective:

Protection Method What It Prevents Cost Difficulty
Never answer unsolicited tech calls All phone-based scams Free Easy
Use reputable antivirus software Malware that creates fake pop-ups $30-60/year Easy
Enable pop-up blockers in your browser Fake security warning pop-ups Free Easy
Keep software updated Vulnerabilities scammers exploit Free Easy
Use caller ID screening Unwanted scam calls Free-$10/month Easy
Create a family communication plan Isolation-based decision making Free Medium

Prevention habits that reduce your exposure:

  • Bookmark official support websites for companies you use regularly, so you always go directly to legitimate help
  • Set up automatic software updates to reduce the likelihood of actually needing emergency technical support
  • Never download software suggested by unsolicited callers — only download programs from official company websites
  • Take time to think — legitimate technical issues rarely require immediate action

Technology settings that help:

  • Enable your phone’s spam call filtering (available on most modern smartphones)
  • Set your browser to block pop-ups and display warnings about suspicious websites
  • Configure your computer to show file extensions, making it easier to spot suspicious downloads

Free protections to set up today:

  • Register your phone number with the National Do Not Call Registry (DoNotCall.gov) — while it won’t stop scammers, it helps identify calls that shouldn’t be happening
  • Set strong, unique passwords for all your tech company accounts (Apple ID, Microsoft account, etc.)
  • Enable two-factor authentication on important accounts

If You’ve Been Affected

If you’re currently on a call you suspect is a scam: Hang up immediately. Don’t worry about being rude — protecting yourself is more important than social niceties.

If you gave remote access to your computer:

  • Disconnect from the internet immediately — unplug your ethernet cable or turn off your Wi-Fi
  • Run a full antivirus scan using your legitimate security software
  • Change all passwords for accounts you access from that computer, especially banking and email
  • Check your computer for new software you didn’t install and remove anything suspicious

If you provided financial information:

  • Contact your credit card company or bank immediately to report potential fraud and request new cards
  • Monitor your accounts daily for unauthorized transactions
  • Consider placing a fraud alert on your credit reports through any of the three credit bureaus

Who to contact in the first 24-48 hours:

  • Your bank or credit card companies if you provided financial information
  • FTC at ReportFraud.ftc.gov to file an official complaint
  • Your local police if you lost money — get a police report number for insurance or bank claims
  • The real company the scammer claimed to represent, so they’re aware of the impersonation

Recovery timeline expectations:
Most financial damage can be limited if you act within 24-48 hours. Credit card companies typically resolve fraud claims within 7-10 business days. Computer cleanup may take longer if malware was installed.

When professional help is worth it:
If you gave remote access to a computer containing sensitive business information, financial records, or if you’re not comfortable checking your computer for malware yourself, professional tech support or identity theft recovery services can ensure nothing was missed.

FAQ

Q: How do I know if a tech support call is legitimate?
A: Legitimate tech companies never make unsolicited calls about computer problems. If you didn’t contact them first or don’t have an active support case, hang up. When in doubt, call the company back using the official number from their website.

Q: What if the caller knows some of my personal information?
A: Scammers often have basic information like your name, phone number, or even what type of computer you use (gathered from data brokers or previous scams). Real tech support would have detailed account information and service history. Don’t let partial information convince you a call is legitimate.

Q: Can scammers actually see problems on my computer remotely?
A: No — scammers show you normal system files, logs, or temporary files that exist on every computer and claim they’re problems. They can’t detect issues on your computer unless you give them remote access first. Any “problems” they show you during the call are normal computer operations.

Q: What should I do if I get a scary pop-up warning?
A: Close your browser completely (not just the tab) and restart it. Real security warnings come from your installed antivirus software, not from websites. If you’re concerned, run a scan with your legitimate antivirus program or contact tech support through official channels.

Q: Are there any legitimate reasons a tech company would call me?
A: Yes, but only if you have an active support case or subscription service where you’ve specifically requested a callback. The representative should be able to reference your case number, account details, and the specific issue you reported. When in doubt, ask for their information and call back through official channels.

Conclusion

Tech support scams prey on our natural desire to protect our computers and personal information, but they’re entirely preventable once you understand the pattern. Remember: legitimate tech companies don’t call you out of the blue, don’t create artificial urgency, and don’t ask for remote access to fix problems you didn’t report.

The key to staying protected is simple skepticism. When someone contacts you claiming there’s an urgent tech problem, take a step back and verify independently. Your future self will thank you for the few minutes it takes to double-check rather than the hours or days it takes to recover from a scam.

While preventing tech support scams protects you from immediate financial loss, comprehensive identity protection requires monitoring for threats you might not see coming. IdentityProtector.com gives you comprehensive identity monitoring, real-time alerts when your information is found in breaches or on the dark web, credit monitoring across all three bureaus, and expert recovery support if the worst happens. Our specialists understand that identity protection isn’t just about automated reports — it’s about having real people ready to help you navigate recovery if you ever need it. Take control of your identity security today, so you can focus on what matters most to you.

Leave a Comment

icon 4,206 users this month
J
James
just started identity monitoring