Cloud Optimization Could Transform

Cloud Optimization Could Transform Your Organization, But It Should Come With A Cost Containment Strategy

A Cost Containment Strategy With more and more resources available in the cloud, it’s easy to lose track of your costs and handicap the whole project with an unexpected bill that shuts the whole thing down. MediaTemple & CloudTweaks Thought Leadership Brand Series The migration
/
The Benefits of Virtualizing SD-WAN and Security

The Benefits of Virtualizing SD-WAN and Security

Benefits of Virtualizing SD-WAN As more companies adopt SD-WAN technology to enhance the agility of their networking architecture, they must give strong consideration to how and where to apply security across the network. There’s no “one strategy fits all” in terms of which SD-WAN product
/

Fake Tech Support Centers Raided in India: Scams Uncovered

Scams Uncovered – Fake Tech Support

Computers are fantastic until they don’t work as expected. Then, people often get flustered and anxiously wonder how to make their machines function normally again.

Scammers at fake tech support centers — frequently based in India — capitalize on those unsettled feelings, often coercing people to pay to fix problems that don’t exist.

Successful Crime Shutdowns in India

These fraudulent tech support efforts have become so severe that London police are working with Microsoft to catch the crooks and are partnering with Indian police forces. The tech brand is particularly interested in helping stop the crimes because the criminals often say they’re representatives of Microsoft.

During a two-day operation in late November 2018, more than 100 members of Indian law enforcement raided 16 call centers, resulting in 39 arrests and counting.

Microsoft received more than 7,000 complaints from users associated with those locations. The criminals have a global reach, since the reports of problems came from people in more than a dozen countries.

There was also another raid six weeks before the November events where police infiltrated 10 call centers and arrested two dozen people.

Then, the law enforcement agents gathered significant evidence of the crimes, including call scripts and voice recordings. That earlier raid happened after a complaint from Microsoft about the problem.

Two Basic Versions of the Scam

Scams Uncovered - Fake Tech Support

The criminals usually take one of two approaches when trying to scam people. Often, they make pop-up boxes appear on the computer that say the machine has a virus.

Accompanying information then provides people with a number to call to speak with supposed tech support personnel. After those individuals claim to repair the issue, they charge the victims amounts of typically $150-$499.

A variation involves the tech support posers contacting people by phone, sometimes going so far as to spoof the number so it comes across on the screen as being from a company that legitimately would provide computer assistance.

The callers then lie about “known” problems on a person’s machine and offer to remedy the issue.

Microsoft Doesn’t Make Unsolicited Calls

This problem has become so severe that Microsoft created a dedicated page to help people recognize if they’re getting targeted by scammers. One of the things the company points out is that it never makes unsolicited calls to customers to ask for personal information — including financial details — or offer tech support help.

These scammers have been around for a while and were so prevalent in 2017 that one news outlet warned people not to answer calls from a certain number associated with the criminals. To avoid thinking these scams are real, people should keep in mind how genuine tech support call centers operate. They usually make customers jump through a few hoops, such as waiting on hold for a while.

A 2018 report from Microsoft found although the overall numbers of people believing fake tech support calls were real went down, there were still more than six in 10 people victimized.

Many scammers got people to download software that allowed the criminals to take over their computers, but some asked the victims to go to websites.

Security Software Often Won’t Stop the Scammers

Although Microsoft is the company focused on here, the tech support problem affects other companies, too. In early 2018, security researchers shed light on a version of this scam that made users’ browsers lock up when using Chrome and Firefox.

Plus, the criminals have figured out how to make their fake pop-ups and other tricks to bypass the security software on a person’s computer.

Analysts say using an ad-blocking plugin is often an effective way to avoid the pop-ups that make the browser dysfunctional, since most of the ads are from a category of malicious web content called maladvertising. They also clarify that even when scammers lock the browser like this, it’s usually possible to force quit the browser from the computer’s task manager window.

Staying Protected Means Not Panicking

Besides the way these criminals lure people into believing lies by telling them their computers have problems, they sometimes try to shame victims into thinking they’ve done something wrong to make the “issues” happen.

To reiterate, real brands do not solicit people over the phone for tech support. Instead of panicking, individuals should take a deep breath and hang up the phone or otherwise stop engaging.

Doing that helps them avoid getting trapped into paying money or letting the criminals tamper with their machines.

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website
Vibhav Agarwal

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization ...
GDPR Compliance

A Quick and Dirty Guide to GDPR Compliance

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union will go into effect. Although ...
Telehealth: Big Data and Healthcare Innovation

Telehealth: Big Data and Healthcare Innovation

Telehealth Innovation Every day, people pop their health-related questions into Google’s search field. Symptoms-related searches alone make up about 1 percent of queries in Google ...
SSO

How SSO Software Works and Why Single Sign-On Is Important

The Functionality and Importance of SSO Software SSO is an acronym for Single Sign-On, a software program which uses one set of login credentials to ...
Nasdaq to Deliver Matching Engine Technology to the Football Index

Nasdaq to Deliver Matching Engine Technology to the Football Index

/
Cloud deployed matching engine offers fixed-odds betting operator platform rich functionality via the Nasdaq Financial Framework STOCKHOLM, Sweden and LONDON, July 23, 2019 (GLOBE NEWSWIRE) -- Nasdaq Inc. (Nasdaq:NDAQ) announced today it has signed ...
Reuters news

Equifax nears deal to pay about $700 million to settle U.S. data breach probes: WSJ

/
(Reuters) - Credit reporting company Equifax Inc (EFX.N) is close to a deal to pay around $700 million to settle data breach probes with U.S. regulators and states, the Wall ...
USA today

Want to break up ‘Big Tech’? Don’t fall prey to these misconceptions

/
Advocates and opponents of breaking up Facebook, Google and other technology giants are falling prey to some serious misconceptions This article was written by Bhaskar Chakravorti, Dean of Global Business, The ...