Fraud perpetrators may cold call you claiming there are problems with your computer and they can help you to solve them. Those fraud perpetrators often use the names of well-known companies such as Microsoft, Apple or IBM. They could even use the name of your broadband provider to sound more legitimate.

The fraud perpetrator will ask you to complete a number of actions on your computer, and the may even be able to demonstrate an “error”. The fraud perpetrator may instruct you to download what is known as a “REMOTE ACCESS TOOL”. This tool gives the scammer access to everything on your computer. The fraud perpetrator can access and copy your data, or download malware onto your computer to monitor what you do in the future. They can even access your online banking, and transfer money between your accounts.

You could also be asked to pay for the “assistance” you have been given. This could be a one-off payment or an ongoing direct debit over many months/years/decennia. If you do provide payment details, these details may be used to commit further fraud against you.

Previous Story

Phone Fraud

Next Story

Private Automatic Branch Exchange Fraud

Latest from Corporate Fraud | Areas of Focus

Phone Fraud

Telephone fraud involves criminals contacting you by phone (vishing) or by text (Smishing) pretending to be

Email Fraud

Email fraud (“Phishing”) involves fraud perpetrators making contact by email and can take a number of

Procurement Fraud

Employees may be trusted with certain procurement responsibilities which can provide opportunities to commit fraud-related offenders.