706.991.9898

PostNet

The Gurus have relocated to PostNet right next to Publix in Greensboro. Now open on Saturday!!!

Advertisements

Tech Support Scams

Fake

If someone calls you from Microsoft tech support to help you fix your computer, mobile phone, or tablet, this is a scam designed to install malicious software on your computer, steal your personal information, or both.

Do not trust unsolicited calls. Do not provide any personal information.

What you need to know about tech support phone scams:

  1. Microsoft will not make unsolicited phone calls about computer security or software fixes. If you receive a call like this one, it’s a scam, and all you need to do is hang up.
  2. Cybercriminals often use publicly available phone directories, so they might know your name and other personal information when they call you. They might even guess what operating system you’re using.
  3. If you have already given access to your computer to someone who claimed to be from Microsoft, immediately call the Gurus to inspect your system for malware and viruses.
  4. If you gave someone your credit card information to pay for services, contact your credit card company and alert them to this fraudulent purchase.
  5. The Federal Trade Commission (FTC) has received reports that criminals are taking advantage of consumers’ knowledge of the scam by calling to offer refunds for phony tech support. This is also a scam.

 

85

Yes. This is a scam. This is not a legitimate call from Microsoft. Microsoft does not make unsolicited phone calls about your computer security or software fixes. If you receive a call like this one, it’s a scam, and all you need to do is hang up.

Don’t let scammers encourage you to install dangerous software.

Do not trust unsolicited calls. Do not provide any personal information.

I think I might have already fallen for this scam…

If you think you might be a victim of fraud contact Techknow Gurus immediately!

Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Some forms of ransomware encrypt files on the system’s hard drive, while some may simply lock the system and display messages intended to coax the user into paying.ransomware

Users must constantly scan their computers and be proactive in preventing such malicious attacks.

For more information call the Gurus…

Tag Cloud

%d bloggers like this: