SlideShare a Scribd company logo
1 of 13
AVOID THESE TWO POPULAR COMPUTER SCAMS IN 2022
With so many people working from home these days the
demand for online computer help has skyrocketed. Along
with this, the number of scams has also grown significantly.
The frequency of these scams prompted Google to ban all
third-party tech support ads.
Here are a few tips to help you avoid being scammed
when seeking online computer help.
Always be sure to check reviews. Google reviews cannot be
faked. Follow this computer scam warning and stay safe.
Microsoft Office Scam Alert
Beware
‘Microsoft
Office’ USB
Sticks That
Show Up in the
Mail: It’s a
Scam
If you receive a Microsoft Office product randomly in the
mail, be careful:
It could be a Microsoft Office scam.
The scheme is elaborate, and it could end up tricking
unsuspecting consumers hoping to get free access to
Microsoft Office Professional, which can normally retail for
$439
The scam works by triggering a virus alert
once the USB stick is plugged into the
victim’s PC. To fix the issue, the alert tells the
user to call a customer support number. “As
soon as they called the number on screen,
the helpdesk installed some sort
of TeamViewer (remote access program)
and took control of the victim’s computer,”
In addition, the customer support technician
also asks for payment information.
It’s not the first-time scammers have circulated
malicious USB drives through the mail. In 2020, security
firm Trustwave also uncovered a malware-laden USB
stick sent through the mail that pretended to come
from Best Buy as $50 gift card promotion.
In a statement, Microsoft added: “We
take appropriate action to remove any
suspected unlicensed or counterfeit
products from the market and to hold
those targeting our customers
accountable.
We’d like to reassure all users of our
software and products that Microsoft
will never send you unsolicited packages
and will never contact you out of the
blue for any reason.
You can visit this(Opens in a new
window) support page for guidance on
how to avoid fraud, Microsoft Office
scam, and other scams.”
Websites that pop up a warning asking you to call a
number are always fake.
ALWAYS
No matter how realistic they appear
If you receive a phone call telling you that you
have a computer problem, it’s fake.
100% of the time
HANG UP!
Most of these scams apparently are geared at
Seniors. Personally, I have always suspected
they somehow have access to AARP. I can't
see any other way these scammers find their
Senior victims. This computer scam warning is
especially important for Seniors to understand.

More Related Content

Similar to Avoid These Two Popular Computer Scams in 2022.pptx

Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
Vishwan Aranha
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 

Similar to Avoid These Two Popular Computer Scams in 2022.pptx (20)

Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
ihegc012
ihegc012ihegc012
ihegc012
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
Phishing
PhishingPhishing
Phishing
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
 
Web Security
Web SecurityWeb Security
Web Security
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 

Recently uploaded

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 

Avoid These Two Popular Computer Scams in 2022.pptx

  • 1. AVOID THESE TWO POPULAR COMPUTER SCAMS IN 2022
  • 2. With so many people working from home these days the demand for online computer help has skyrocketed. Along with this, the number of scams has also grown significantly. The frequency of these scams prompted Google to ban all third-party tech support ads. Here are a few tips to help you avoid being scammed when seeking online computer help. Always be sure to check reviews. Google reviews cannot be faked. Follow this computer scam warning and stay safe.
  • 3. Microsoft Office Scam Alert Beware ‘Microsoft Office’ USB Sticks That Show Up in the Mail: It’s a Scam
  • 4. If you receive a Microsoft Office product randomly in the mail, be careful: It could be a Microsoft Office scam.
  • 5. The scheme is elaborate, and it could end up tricking unsuspecting consumers hoping to get free access to Microsoft Office Professional, which can normally retail for $439
  • 6. The scam works by triggering a virus alert once the USB stick is plugged into the victim’s PC. To fix the issue, the alert tells the user to call a customer support number. “As soon as they called the number on screen, the helpdesk installed some sort of TeamViewer (remote access program) and took control of the victim’s computer,” In addition, the customer support technician also asks for payment information.
  • 7. It’s not the first-time scammers have circulated malicious USB drives through the mail. In 2020, security firm Trustwave also uncovered a malware-laden USB stick sent through the mail that pretended to come from Best Buy as $50 gift card promotion.
  • 8. In a statement, Microsoft added: “We take appropriate action to remove any suspected unlicensed or counterfeit products from the market and to hold those targeting our customers accountable. We’d like to reassure all users of our software and products that Microsoft will never send you unsolicited packages and will never contact you out of the blue for any reason. You can visit this(Opens in a new window) support page for guidance on how to avoid fraud, Microsoft Office scam, and other scams.”
  • 9. Websites that pop up a warning asking you to call a number are always fake. ALWAYS No matter how realistic they appear
  • 10.
  • 11. If you receive a phone call telling you that you have a computer problem, it’s fake. 100% of the time
  • 13. Most of these scams apparently are geared at Seniors. Personally, I have always suspected they somehow have access to AARP. I can't see any other way these scammers find their Senior victims. This computer scam warning is especially important for Seniors to understand.