{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/tech-support-scam","result":{"data":{"contentfulDictionaryTerm":{"title":"Tech Support Scam","slug":"tech-support-scam","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Learn about the different types of tech support scams and how to protect yourself from them."}},"body":{"body":"# Tech Support Scam\n\nTech support scams are schemes where cyber criminals pose as technical support representatives or employees of reputable companies. They use various tactics, such as pop-up warnings or unsolicited phone calls, to deceive people into believing their computers have issues. The scammers then persuade them to provide remote access to their computers, enabling them to steal personal information, install malware, or extort money for fake repairs. ","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"tech-support-scam","style":"position:relative;"},"children":[{"type":"text","value":"Tech Support Scam"},{"type":"element","tagName":"a","properties":{"href":"#tech-support-scam","ariaLabel":"tech support scam permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Tech support scams are schemes where cyber criminals pose as technical support representatives or employees of reputable companies. They use various tactics, such as pop-up warnings or unsolicited phone calls, to deceive people into believing their computers have issues. The scammers then persuade them to provide remote access to their computers, enabling them to steal personal information, install malware, or extort money for fake repairs."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Tech Support Scam","slug":"tech-support-scam","keepLearning":[{"title":"Threat","slug":"threat"},{"title":"Trojan","slug":"trojan"},{"title":"URL (Uniform resource locator)","slug":"url-uniform-resource-locator"}],"breadcrumb":{"location":"/dictionary/tech-support-scam","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/tech-support-scam","crumbLabel":"tech-support-scam"}]}}},"staticQueryHashes":["1614255152"]}