SERIOUS THREAT OF IDENTITY THEFT
Approximately 2 wks ago I allowed a support tek located in India to remotely access my computer to fix a problem I was having on my computer. After resolving the problem he asked me for my credit card # so he could charge me for fixing the problem, which I had clearly advised him at the very beginning of our conversation I wouldn't give him remote access to my computer if there was going to be a cost involved.
He became very agitated and abusive and threatened to call #411 and report me to whomever answered that number.
In addition, HE REFUSED TO DISCONNECT FROM MY COMPUTER AND HE REMAINED ON THE PHONE AND IN MY COMPUTER, DURING WHICH TIME I COULD SEE HIS CURSOR MOVING ALL AROUND MY SCREEN!
IT FINALLY OCCURED TO ME THAT I COULD PROBABLY GET RID OF HIS PRESENCE ON MY COMPUTER BY SHUTTING IT DOWN, WHICH I DID. WHEN I REBOOTED MY COMPUTER, MY HOME SCREEN WHICH HAD BEEN LOADED WITH APPROXIMATELY 30 ICONS OR SO NO LONGER INCLUDED THESE ICONS!
NOTHING LIKE THIS HAS EVER HAPPENED TO ME DURING ALL THE YEARS I HAVE BEEN USING A COMPUTER & I AM BESIDE MYSELF WITH WORRY OVER THE POSSIBILITY THAT BEFORE I SHUT DOWN MY COMPUTER AND I COULD SEE HIM MOVING HIS CURSOR ALL AROUND ON THE SCREEN, HE WAS ABLE TO COLLECT ALL MY MOST IMPORTANT INFORMATION ----- BANK ACCT NUMBERS! 401K PLAN! ALL MY SAVED PASSWORDS TO ALL PERSONALL ACCTS! ---- YOU NAME IT, HE MUST HAVE BEEN COLLECTNG ALL OF THIS INFO TO USE AS HE WISHED IN THE FUTURE!
ARE THERE ANY STEPS I CAN TAKE TO PROTECT MYSELF FROM IDENTITY THEFT BY THIS TERRIBLE SUPPORT TEK, SHORT OF DESTROYING MY COMPUTER????!!!! YOUR IMMEDIATE REPLY WOULD BE SO GREATY APPRECIATED. THANK YOU. M.WINTERS.
[Personal information removed by moderator. Please read Forum rules and guidelines, thanks.]
Được chỉnh sửa bởi Chris Ilias vào
Tất cả các câu trả lời (1)
Sounds like a scam site.
You may have ad/mal-ware. Further information can be found in this article; https://support.mozilla.org/en-US/kb/troubleshoot-firefox-issues-caused-malware?cache=no
Run most or all of the listed malware scanners. Each works differently. If one program misses something, another may pick it up.