{"id":78157,"date":"2018-05-04T08:30:45","date_gmt":"2018-05-04T15:30:45","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=78157"},"modified":"2018-05-04T08:30:45","modified_gmt":"2018-05-04T15:30:45","slug":"social-engineering-beware-of-tech-support-scams","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/","title":{"rendered":"Social Engineering: Beware of &#8216;Tech Support&#8217; Scams"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-78307\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering.jpg\" alt=\"Social Engineering Tech Support Scams\" width=\"600\" height=\"435\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-150x109.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-300x218.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as &#8220;John,&#8221; or &#8220;Steven,&#8221; but the accent suggests otherwise. The caller claims to be calling from Microsoft tech support, and says that there&#8217;s a problem with your computer. If you say that you have a Mac, they either hang up or say, &#8220;Yes, sorry, you have a Mac.&#8221;<\/p>\n<p>And so begins an attempt at <em><a href=\"https:\/\/www.intego.com\/mac-security-blog\/social-hacking\/\" target=\"_blank\">social engineering<\/a> <\/em>(social hacking), a way of conning people into allowing an unknown person to access their computer, possibly copy files, and eventually getting them to pay for this &#8220;tech support.&#8221; The scammer strings the user along, leads them to supposed &#8220;error&#8221; messages and malware files on their computer, and gets them to install software allowing the scammer to access their files.<\/p>\n<p>Even though Microsoft recently stated that only 183,000 had reported this type of scam to the company in 2017, that&#8217;s probably just a fraction of the number of people who get contacted; it&#8217;s a very common scam. Most tech-savvy people know that this is a scam and just hang up, but as with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" target=\"_blank\">phishing<\/a>\u00a0scams, it only takes a few people to be tricked to make the scam worthwhile.<\/p>\n<h3 id=\"socialengineeringisbigbusiness\">Social engineering is big business<\/h3>\n<p>Tech support\u00a0scams\u00a0are a kind of social engineering, a technique that conmen use to persuade people to give them money, or more, for illegitimate reasons. When well executed, scammers can be quite convincing, but these tech support scams tend to be carried out by people in poor countries with limited English skills, making them easy to detect.<\/p>\n<p>Social engineering is used to glean information from users\u2014bank details, credit card numbers, Microsoft logins or\u00a0Apple IDs. The goal is often to install malware on a user&#8217;s computer, so they can\u00a0access it remotely, copy its files, or even lock down a user&#8217;s documents as part of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\" target=\"_blank\">ransomware<\/a> attack.<\/p>\n<p>One security researcher got contacted by a tech support scammer and <a href=\"http:\/\/www.wired.co.uk\/article\/malwarebytes\">played along<\/a>\u00a0to investigate\u00a0how the process worked. He did this, he said, because &#8220;Many of my family members have received these calls, so I wanted to play the game to see how the scam worked.&#8221; His video shows how this process happens, and the types of tricks the scammers use.<\/p>\n<p>They start by hooking the victim, and then convincing them that there is an issue. They persuade the user to install remote administration software, so they can take control of the computer. They show the user &#8220;threats,&#8221; which\u00a0are merely files that users never see. They explain that they can solve the problems for a (not so small) fee. And then they cash in.<\/p>\n<div id=\"attachment_78163\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-78163\" loading=\"lazy\" class=\"wp-image-78163 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/tech-support-scam-flowchart.png\" alt=\"Tech Support Scam Process\" width=\"800\" height=\"180\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/tech-support-scam-flowchart.png 800w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/tech-support-scam-flowchart-150x34.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/tech-support-scam-flowchart-300x68.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/tech-support-scam-flowchart-768x173.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/tech-support-scam-flowchart-657x148.png 657w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-78163\" class=\"wp-caption-text\">Tech Support Scam Process (Image credit: Microsoft)<\/p><\/div>\n<p>The truth is no one will ever call you out of the blue to tell you that you need tech support on your computer. In some cases, these are just random cold calls hoping to find someone who has a computer; fewer people use desktop computers at home these days, making the targets less common. In other cases, scammers may target people who have shared information about a new computer on Facebook, Twitter, or other social media platforms.<\/p>\n<h3 id=\"techsupportscamsontheweb\">Tech support scams on the Web<\/h3>\n<p>These scams don&#8217;t only occur through phone calls\u2014they also flourish on the Web. You may visit a website and see a dialog suggesting that your computer is infected with malware, and giving you a phone number to contact to get help. Often, these dialogs use the Windows XP interface, but sometimes you see Mac dialogs, like this one:<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-66709 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Apple-Security-Alert-Fraud.png\" alt=\"Apple Security Alert Fraud\" width=\"1010\" height=\"771\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Apple-Security-Alert-Fraud.png 1010w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Apple-Security-Alert-Fraud-150x115.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Apple-Security-Alert-Fraud-300x229.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Apple-Security-Alert-Fraud-768x586.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Apple-Security-Alert-Fraud-657x502.png 657w\" sizes=\"(max-width: 1010px) 100vw, 1010px\" \/><\/p>\n<p>It&#8217;s probably obvious that this is bogus, but the reality is there are plenty of people who fall for these scams. And some of these dialogs look more convincing, but no dialog on a Mac or PC will ever give you a phone number to call to resolve a problem. As with the cold calls, they hope to snag a small percentage of people, because they cast their nets very wide, displaying their messages to millions. If one tenth of one percent of people fall for the scam, that&#8217;s potentially a lot of money.<\/p>\n<p>If you&#8217;re reading this, you probably already know about these social engineering scams. What&#8217;s important is that you tell others\u2014your friends and family, especially older, less tech-savvy people\u2014about this, so they know that when the scammer calls, they should just hang up.<\/p>\n<address><em><strong>Have you ever been called by a tech support scammer? Ever fallen victim to a social engineering attack? We want to hear you story! Drop us a comment below.<\/strong><\/em><\/address>\n","protected":false},"excerpt":{"rendered":"<p>It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as &#8220;John,&#8221; or &#8220;Steven,&#8221; but the accent suggests otherwise. The caller claims to be calling from Microsoft tech support, and says that there&#8217;s a problem with your computer. If you say that you have a Mac, they [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":78304,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3172,2620,2380],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as &quot;John,&quot; or &quot;Steven,&quot; but the accent\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering: Beware of &#039;Tech Support&#039; Scams - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as &quot;John,&quot; or &quot;Steven,&quot; but the accent\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-04T15:30:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg\",\"width\":400,\"height\":260,\"caption\":\"Social Engineering Scam\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/\",\"name\":\"Social Engineering: Beware of 'Tech Support' Scams - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#primaryimage\"},\"datePublished\":\"2018-05-04T15:30:45+00:00\",\"dateModified\":\"2018-05-04T15:30:45+00:00\",\"description\":\"It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as \\\"John,\\\" or \\\"Steven,\\\" but the accent\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering: Beware of &#8216;Tech Support&#8217; Scams\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Social Engineering: Beware of &#8216;Tech Support&#8217; Scams\",\"datePublished\":\"2018-05-04T15:30:45+00:00\",\"dateModified\":\"2018-05-04T15:30:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#webpage\"},\"wordCount\":773,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg\",\"keywords\":[\"Social Engineering\",\"Social Hacking\",\"Support Scam\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as \"John,\" or \"Steven,\" but the accent","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering: Beware of 'Tech Support' Scams - The Mac Security Blog","og_description":"It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as \"John,\" or \"Steven,\" but the accent","og_url":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-05-04T15:30:45+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg","width":400,"height":260,"caption":"Social Engineering Scam"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/","name":"Social Engineering: Beware of 'Tech Support' Scams - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#primaryimage"},"datePublished":"2018-05-04T15:30:45+00:00","dateModified":"2018-05-04T15:30:45+00:00","description":"It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as \"John,\" or \"Steven,\" but the accent","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Social Engineering: Beware of &#8216;Tech Support&#8217; Scams"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Social Engineering: Beware of &#8216;Tech Support&#8217; Scams","datePublished":"2018-05-04T15:30:45+00:00","dateModified":"2018-05-04T15:30:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#webpage"},"wordCount":773,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg","keywords":["Social Engineering","Social Hacking","Support Scam"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/social-engineering-scam.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kkB","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/78157"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=78157"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/78157\/revisions"}],"predecessor-version":[{"id":78289,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/78157\/revisions\/78289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/78304"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=78157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=78157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=78157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}