Google Security Alert Scam: Don’t Fall for This Fake Account Warning

The Google Security Alert Scam is a phishing and tech support scam that uses fear to make victims believe their Google account has been hacked. The message may arrive by text, email, phone notification, pop-up, or even a fake website pretending to be a Google security page.

The goal is simple: push you to click, call, share codes, install remote access software, or hand over sensitive information.

1 3

Scam Overview

A real Google security alert is designed to protect your account. Google may notify users about suspicious activity, unfamiliar sign-ins, new devices, changed recovery details, or account behavior that looks unusual. Google’s own help pages explain that these alerts are meant to help prevent other people from using or abusing your account.

The scam version copies that same idea but twists it into a trap.

Instead of directing you to safely review your account from inside your Google Account settings, the fake alert creates panic and pushes you toward a risky action. It may tell you to call a “Google support” number, click a verification link, install a security app, confirm your password, or speak with a supposed fraud specialist.

The message usually sounds urgent:

“Google Security Alert: New login detected from an unrecognized device.”

“Your Google account was accessed from Windows, Chicago.”

“Suspicious sign-in blocked. Call support immediately.”

“Your account will be disabled unless you verify now.”

“Unauthorized recovery number added. Contact Google Security.”

The scam works because the fear is believable. A Google account can contain Gmail, photos, saved passwords, YouTube access, Google Drive files, Android backups, business accounts, payment details, browser sync data, and recovery access for other services. Losing control of it can feel serious.

Scammers know that. They use the Google name because people trust it. They add technical details like a city, device type, IP address, browser name, or operating system to make the alert feel more realistic. Then they create a deadline or warning to make the victim act quickly.

The most dangerous version of this scam leads to fake tech support. A victim calls the number in the message and reaches someone pretending to be from Google Security, Google Support, Gmail Protection, or an account recovery department. From there, the scammer claims the victim’s device is infected, the account is hacked, or someone is stealing money through connected accounts.

The fake support agent may then ask the victim to install AnyDesk, TeamViewer, UltraViewer, Zoho Assist, or another remote access tool. The FTC warns that tech support scammers commonly ask for remote access, send victims to spoofed websites, and push them to enter banking or card information under the excuse of support or refunds.

Once connected remotely, the scammer can watch the screen, guide the victim through banking pages, see private information, manipulate what appears on the device, or pressure the victim into making payments. They may claim they need to “secure” the account, “remove hackers,” “refund fraudulent charges,” or “move money to a safe account.”

Another common ending is the gift card demand. The scammer may tell the victim to buy Google Play, Apple, Steam, Target, Walmart, or other gift cards and read the codes over the phone. The FTC specifically warns that scammers often impersonate tech support and ask for remote access or gift card payments, and that gift cards should not be used as payment to fix a computer or account issue.

This is why the Google Security Alert Scam should not be treated as a harmless spam message. It can lead to full account takeover, stolen banking information, unauthorized transfers, identity theft, gift card loss, crypto theft, or malware installation.

How the Google Security Alert Scam Works

1. The Victim Receives a Fake Security Alert

The scam begins with a message that appears to come from Google. It may arrive as an SMS, email, browser pop-up, phone notification, or fake login page.

Common subject lines and text examples include:

  • “Google Security Alert”
  • “Critical Security Alert”
  • “Suspicious Sign-In Prevented”
  • “New Login From Unknown Device”
  • “Your Google Account Was Accessed”
  • “Account Verification Required”
  • “Recovery Phone Number Changed”
  • “Your Gmail Account Will Be Disabled”

Some fake alerts are very simple. Others are designed to look like official Google emails, with logos, buttons, warning colors, and security language.

2. The Message Creates Panic

The scammer wants the victim to feel that something bad is already happening. The fake alert may claim:

  • Someone logged in from another city or country
  • A hacker changed the recovery phone number
  • A suspicious device was added
  • Gmail was accessed from a new browser
  • The account will be suspended
  • The device is infected
  • Payment or banking information is at risk
  • Google detected unauthorized activity

The message often uses urgent wording such as “immediately,” “final warning,” “act now,” “account locked,” or “if this was not you.”

That urgency is intentional. The scammer does not want the victim to calmly open Google Account settings and check the alert safely.

3. The Victim Is Pushed to Call or Click

This is the main trap.

A legitimate security check should be handled through your actual Google Account, not through a random phone number, suspicious link, or pop-up. Google’s account recovery guidance tells users to review recent security events from their Google Account and follow the on-screen steps if they see activity they do not recognize.

The fake alert avoids that safe path.

Instead, it may say:

  • “Call Google Security at this number.”
  • “Click here to verify your identity.”
  • “Download this security tool.”
  • “Confirm your account before it is disabled.”
  • “Contact support within 24 hours.”

If the scam is a phone-based version, calling the number connects the victim to a fake tech support center.

4. A Fake Google Agent Takes Over the Conversation

The scammer may sound professional. They may use scripts, background call center noise, fake employee names, and technical language to appear legitimate.

They may say:

  • “Your account has been compromised.”
  • “Hackers are connected to your Gmail.”
  • “Your IP address is showing suspicious activity.”
  • “Your phone has malware.”
  • “Your bank account may be exposed.”
  • “We need to secure your device now.”
  • “Do not log out or the hackers may regain control.”

At this stage, the scammer is building authority. They want the victim to stop questioning and start following instructions.

5. The Scammer Requests Remote Access

The fake support agent may ask the victim to install remote access software. They may describe the app as a “Google security tool,” “support connection,” “verification tool,” or “screen sharing app.”

This is a major red flag.

Remote access tools can be legitimate when used by real IT professionals, but scammers abuse them to view or control the victim’s device. Once connected, they may open system screens, logs, warnings, or command windows and falsely claim these normal items prove the device is hacked.

They may also ask the victim to open Gmail, Google Account settings, online banking, PayPal, Cash App, Coinbase, or other sensitive accounts.

6. The Scam Becomes Financial

After the fake diagnosis, the scammer turns the conversation toward money.

They may claim:

  • You need to buy security software
  • You are owed a refund
  • A hacker made unauthorized purchases
  • Your bank account must be checked
  • You need to transfer money to a “safe” account
  • You must buy gift cards to complete verification
  • You must pay to remove malware
  • You must send crypto to protect your funds

A common trick is the fake refund scam. The scammer asks the victim to log in to online banking while remote access is active. Then they claim a refund was processed incorrectly or that too much money was returned. They pressure the victim to “send back” the difference, often through gift cards, wire transfer, crypto, or payment apps.

7. The Scammer May Try to Steal the Google Account

Not every version focuses on immediate money. Some scammers first try to take over the Google account itself.

They may ask for:

  • Your Google password
  • A two-step verification code
  • A recovery code
  • A backup code
  • A password reset code
  • Access to your Gmail
  • Permission to approve a sign-in prompt
  • A screenshot of your security settings

Never share one-time codes. A code that looks like a security step for you can be the final key the scammer needs to enter your account.

8. The Victim May Be Targeted Again

If the scammer gets money, account access, or personal data, the victim may be contacted again. The next caller may claim to be from Google, the bank, law enforcement, a refund department, or a recovery company.

These follow-up scams often target people who already lost money. The new scammer may claim they can recover the stolen funds for a fee. In many cases, that is simply another layer of fraud.

Common Google Security Alert Scam Examples

Below are examples of fake messages scammers may use. The exact phone numbers, links, locations, and wording can change.

1. Fake New Login Alert

“Google Security Alert: New login detected from Windows in Chicago. If this was not you, call support immediately at +1-XXX-XXX-XXXX.”

2. Fake Critical Security Alert

“Critical Security Alert: Suspicious activity detected on your Google account. Verify now to avoid suspension.”

3. Fake Gmail Access Warning

“Gmail Notice: Your account was accessed from an unknown browser. Contact Google Security if this was not you.”

4. Fake Account Lock Warning

“Google: Your account has been temporarily locked due to unusual activity. Call now to restore access.”

5. Fake Recovery Phone Change

“Google Alert: A new recovery phone number was added to your account. If you did not authorize this change, call immediately.”

6. Fake Device Infection Alert

“Google Security: Malware detected after suspicious login attempt. Speak to a support agent now.”

7. Fake Verification Request

“Google: Verification required after unusual sign-in. Confirm your identity now or your account may be disabled.”

8. Fake Banking Risk Alert

“Google Security Team: Your account may be linked to unauthorized banking activity. Call now to secure your device.”

9. Fake Password Reset Alert

“Google: Password reset requested from unknown location. If this was not you, contact account protection immediately.”

10. Fake Account Suspension Threat

“Final Notice: Your Google account will be suspended in 24 hours due to suspicious activity. Verify immediately.”

Red Flags of the Google Security Alert Scam

The alert is likely fake if:

  • It tells you to call a random phone number
  • It uses panic-driven language
  • It threatens account suspension
  • It asks you to click a shortened or strange link
  • It asks for your password or verification code
  • It asks you to install AnyDesk, TeamViewer, or another remote access app
  • It asks you to open your bank account
  • It claims your device is infected
  • It asks for gift cards, crypto, wire transfers, or payment apps
  • It has strange spelling, spacing, grammar, or formatting
  • It comes from a suspicious email address or unknown sender
  • It claims to be Google but sends you to a non-Google website

The biggest warning sign is this: scammers try to move you away from Google’s real account security tools and into their own phone call, link, or remote session.

What To Do If You Receive a Google Security Alert

Do not panic. Do not call the number in the message. Do not click the link. Do not reply.

Instead, check your account manually.

Open your browser or Google app yourself, go directly to your Google Account, and review your security settings. Google’s guidance says users can check recent security events and confirm whether suspicious activity was theirs or not.

Take these steps:

  1. Go directly to your Google Account.
  2. Open the Security section.
  3. Review recent security events.
  4. Check signed-in devices.
  5. Remove devices you do not recognize.
  6. Review your recovery phone and recovery email.
  7. Change your password if you see suspicious activity.
  8. Turn on two-step verification or passkeys.
  9. Check Gmail forwarding rules and filters.
  10. Block and report the scam message.

Google also recommends a Security Checkup to help protect an account, detect suspicious activity, and recover access if needed.

What To Do If You Called the Fake Google Support Number

If you called but did not share anything, hang up and block the number. Then check your Google Account directly.

If you followed instructions, take stronger action.

1. Disconnect Remote Access

If the scammer told you to install AnyDesk, TeamViewer, UltraViewer, Zoho Assist, or another remote access tool, disconnect from the internet immediately.

Turn off Wi-Fi, unplug Ethernet, or enable airplane mode.

2. Uninstall the Remote Access App

Remove any app the scammer asked you to install. Also check whether “unattended access” or automatic connection was enabled.

3. Change Passwords From a Clean Device

Use another device that the scammer never accessed. Change passwords for:

  • Google
  • Gmail
  • Banking accounts
  • PayPal
  • Crypto accounts
  • Shopping accounts
  • Apple ID or Microsoft account
  • Any account that uses the same password

4. Secure Your Google Account

Review recent security events, remove unknown devices, update recovery options, and turn on two-step verification or passkeys. Google advises users to review unfamiliar devices and suspicious account changes when investigating suspicious activity.

5. Contact Your Bank

Call your bank using the number on the back of your card or inside the official banking app. Tell them you may have been targeted by a tech support scam.

Ask them to check for:

  • New payees
  • Unauthorized transfers
  • Card charges
  • Changed contact details
  • New devices
  • Suspicious login activity

6. Cancel Exposed Cards

If you typed card details, read card details aloud, or opened banking while the scammer was connected, ask your bank whether the card should be replaced.

7. Report Gift Card Losses Immediately

If you bought gift cards and gave the codes to the scammer, contact the gift card company right away. Keep the card and receipt.

8. Scan the Device

Run a full security scan. If the scammer had remote control, consider asking a trusted local technician to inspect the device.

9. Watch for Follow-Up Scams

Do not trust anyone who contacts you claiming they can recover the money for a fee. Recovery scams often follow tech support scams.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

FAQ About the Google Security Alert Scam

Is every Google Security Alert a scam?

No. Google can send real security alerts when it detects suspicious activity or a new sign-in. The scam version usually pushes you to call a random number, click a suspicious link, install remote access software, or share sensitive information.

How can I safely check if a Google alert is real?

Do not use the link or number in the message. Go directly to your Google Account, open Security, and review recent security events and signed-in devices.

Does Google ask users to call a support number from a text message?

A random phone number inside an unexpected security text should be treated as suspicious. Scammers commonly use fake support numbers to move victims into tech support fraud.

What happens if I call the number?

You may reach a fake support center. The scammer may claim your account is hacked, your device is infected, or your bank account is at risk. They may ask for remote access, verification codes, gift cards, or banking access.

Why do scammers ask for AnyDesk or TeamViewer?

They want to view or control your device. Once connected, they can watch what you type, guide you into banking pages, fake technical problems, or manipulate you into sending money.

Why do scammers ask for gift cards?

Gift cards are fast, hard to reverse, and easy to resell. No legitimate Google security process requires gift cards.

Should I change my Google password?

If you only received the message and did not interact with it, first check your Google security activity. If you see anything suspicious, change your password immediately from a clean device.

What if I gave the scammer a verification code?

Change your password immediately, sign out of all devices, remove unknown recovery options, and enable stronger two-step verification. A verification code can allow a scammer to access or take over your account.

What if I clicked the link but did not enter anything?

Close the page and do not continue. Then manually check your Google Account security settings. If you downloaded anything, remove it and scan your device.

What if I entered my password on a fake Google page?

Change your Google password immediately from a clean device. Then sign out of all devices, check recovery options, review Gmail forwarding rules, and enable two-step verification.

The Bottom Line

The Google Security Alert Scam uses the fear of a hacked account to push victims into dangerous actions. The fake alert may look like a warning about a new login, suspicious activity, account suspension, malware, or recovery changes.

The safest response is to avoid the phone number, avoid the link, and check your Google Account directly. Real account protection happens inside your official Google Account settings, not through a random support number, remote access session, gift card payment, or verification code request.

If a supposed Google agent asks to control your device, view your bank account, receive gift card codes, or collect one-time verification codes, it is a scam.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Comment on this post

Previous

Google New Login Text Scam: The Fake Unrecognized Device Alert

Next

Ledger Email Scam: Fake Security Alerts Are Stealing 24-Word Recovery Phrases