Bogus tech support may have merit

Powered by SC Magazine
 

Opinion: Not all scammers are created equal.

You know those bogus tech support scammers who sell over the phone anti-virus software to cure fake infections? It turns out not all of them are so bad.

Over a conversation with well-placed industry folk up here at the AusCERT conference, I learned that some sell functional software.

They sold friends of friends anti-virus software from the big brands. Probably torrent downloads, but functional nonetheless.

They might even be doing good work since there's a fair chance a random call to Australia will hook a victim running an infected Windows box without anti-virus software installed.

And an anti-virus kit or firewall for $40 isn’t too bad when Joe at the IT shop wants $100.

But a scam is a scam. I simply find it interesting that these guys are more akin to greasy salesmen than their counterparts who steal credit cards and bot computers.

And I’m told they use fake company names rather than say they’re from an anti-virus vendor.

I'm told they do this to avoid angering the big tech companies, which in turn makes their dodgy sales ring more sustainable.

Copyright © SC Magazine, Australia


Bogus tech support may have merit
Snake oil salesmen may cure some some ill but a scam is a scam. Jeremy Weate, CC 2.0.
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Snake oil salesmen may cure some some ill but a scam is a scam. Jeremy Weate, CC 2.0.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 739

Vote