What is Robocall? Based on Google, it is a phone call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. Robocalls are often associated with political and telemarketing phone campaigns, but can also be used for public-service or emergency announcements.

But this time, its all about telemarketing related scam. This involves the scammer cold-calling their victims pretending to be your tech company by saying “I am calling from your tech company” and that is going out of business and offering refunds for tech support services that can no longer be offered or might also take control of your device to provide final services. Of course, none of this is true and there is no refund coming. They just want your bank account information so they can steal your money, or your personal info so they can pretend to be you (and steal other people’s money and services in your name).

According to YouMail, which collects and analyzes calls through its robocall blocking service. There is an estimated 3.4 billion in April. It means these scams are skyrocketed in recent years. This kind of scam is alarming and we are here to protect you by spreading the information and awareness about this latest scam.

We prepared steps to protect yourself from this kind of scam. This scam targeted the consumer which has existing tech support. We care about this because we are also a technical support company that provides tech support to our client. Now please follow the following steps to prevent and avoid this kind of scam.

Step 1: Add your name to the FTC’s “Do not call” registry, and report the calls you get anyway.

Registration for the service began in 2003 and sign-ups don’t expire, yet the FTC reported receiving 4. 5 million complaints in 2017, at “an average of more than 375,000 robocall complaints per month,” compared to 2013’s 2.18 million. It isn’t completely effective, but the people who signed up probably get fewer calls than they would have if they hadn’t.

Step 2: Use your phone’s Do Not Disturb mode so that you only get calls from people in your contact list.

Use your phone's Do Not Disturb mode so that you only get calls from people in your contact list.

This way you don’t have to see the calls come through or have to ignore them. Keep in mind this strategy won’t work for any professional hoping to hear from new clients or those who receive regular calls from unknown numbers are part of their job, but it’s a great option if you have a separate, non-work phone.

Step 3: If you don’t want to block all new numbers, block them as they come by going into the callers’ contact information in your phone.

This is especially helpful if there are a few numbers you get calls from frequently. If you choose the route of answering unknown numbers instead of waiting for a voicemail, keep a couple of things in mind: Don’t engage by speaking OR by pressing a number even to be taken off a list, according to the FTC: “Doing so will probably lead to more unwanted calls. Instead, hang up and file a complaint with the FTC.” Train yourself to answer questions by repeating them instead of saying “yes,” because that can be used as a vocal signature to make unauthorized credit card charges. For example, the answer to “Can you hear me?” should be “I can hear you,” instead of “Yes.”


Don’t be left behind! Improve your security today! Download our All-In-One Anti-Virus and Anti-Malware software. Don’t worry it’s FREE! You can try it before buy it. You will not regret to have this on your computer.

Download For FREE!


Step 4: Buy a Samsung Galaxy S, Samsung Note, or Google Pixel phone that lets you know it’s a scam so you don’t have to answer to find out.

Samsung’s Smart Call flags call it suspects are spam, and Google turns the screen bright red and orange to tell you not to answer. Google’s even adding spam filtering so the calls go straight to your voicemail, as spotted by 9to5 Mac.

Step 5: If you have any other phone, ask your carrier about caller ID options that help identify callers that aren’t legitimate.

For now, Sprint and Verizon still make you pay for premium caller ID; AT&T and T-Mobile offer it for free to postpaid customers. Again, this won’t completely eradicate calls but it’ll help. Lately, senators and members of Congress have been pushing for legislation that requires carriers to offer free robocalling blocking. The FCC also started allowing carriers to “proactively block illegal robocallers” in November, but a lot of robocalls go through multiple carriers, which makes it nearly impossible to track the source.

Step 6: Use third-party apps like Nomorobo, Hiya, and RoboKiller.

Most of these apps will require a fee that can be paid monthly (about $2 to $3) or annually (about $25). In addition to caller ID and personal block lists, they automatically block calls from telemarketers and robocallers, sometimes giving them a taste of their own medicine by responding with bots.

Some of these apps also give the option to make a caller hit a button (0 or 1) to prove they’re not a bot like some sites do with captchas. There are bots smart enough to get around it just like there are bots that get around captchas, though.

Step 7: For any phone that isn’t iOS or Android, like landlines or Google Voice, use third-party subscription services like Jolly Roger Telephone Company.

To join Jolly Roger, subscribers have to share their phone number and email address. After you pick a robot, you can send spam numbers to it and receive a recording of the call to your email so you still know what it was about. But b careful with who you send to the bot because it doesn’t sound very professional judging by The New York Times’ description. The Jolly Roger bots apparently give the caller generic “uh-huh” responses and then asks them to repeat the pitch when it’s over.

So here are the steps we can share with you to protect yourself from this kind of scam. We can assure you protection by downloading our software for your smartphone and for your desktop computer. You may try it now and see how we protect our client from recognized and common cyber attack. Don’t leave behind and protect yourself today! See more details below.

Download For FREE!

If you have suggestions or question regarding this blog please leave your comment below. This blog is brought to you buy MS365 Security. Your partner in cybersecurity!  The reference for this tips and tricks is from Business Insider. No copyright intended to the blog. All rights are reserved for Business Insider. Keep posted on our blogs, see you next time.

You Must Share This!
Please wait...