Tech support scams are devastatingly effective, particularly against older Australians. The Australian Competition and Consumer Commission (ACCC) reports Australians lose over $14 million to tech support scams annually. Understanding how they work is the first line of defence.
How Tech Support Scams Work
The fake alert: A browser pop-up fills the screen warning of a "critical virus infection" or "Windows error." A loud alarm sound may play. A phone number is displayed, claiming to be Microsoft, Telstra or a security company. The pop-up is designed to look like a Windows system alert and may be difficult to close.
The phone call: You call the number. A convincing "technician" answers, often with an Indian accent. They claim to be from Microsoft or your ISP and say they've detected a problem with your computer. They ask you to grant remote access using tools like AnyDesk or TeamViewer.
The "diagnosis": Once connected, they show you "evidence" of a problem β Windows Event Viewer entries (which every computer has, all completely normal), or command prompt output they've deliberately made to look alarming.
The charge: They demand payment β usually $200β$500 β to "fix" the nonexistent problem. Some then steal banking credentials or install actual malware while they have access.
The Critical Tells
- Microsoft, Apple and Telstra will never call you unsolicited about a computer problem
- Legitimate pop-ups do not include phone numbers
- Closing the browser or restarting the computer removes a fake alert immediately
- Real security software doesn't play audio alarms
How to Close a Fake Alert
Press Ctrl+W to close the browser tab. If that fails, Ctrl+Shift+Esc to open Task Manager β right-click the browser β End Task. If the pop-up survives that, press and hold the power button to force off the computer. A full shutdown removes all fake alerts.
What to Do If Someone Has Been Scammed
If payment was made by credit card, contact the card provider immediately to dispute the charge and report fraud. Change all passwords from a clean device. Have the computer professionally checked for any malware or remote access software the scammer may have installed.