Tech Support Scam (Update September 2018)

Tech support scams have made a resurgence in Grenfell. The scam is nothing new, and the same old scare tactics are being implemented.

Usually, an unsolicited call from a person claiming to be a representative of Telstra, or another well-known company, will claim that your computer has been hacked.

Another tactic being used is an automated call advising you that your “internet has been compromised” and that it will be cut off if you don’t act promptly. You are then required to call the scammer yourself.

The first thing to note here is that Telstra, Microsoft, or any of the other companies that the caller claims to be, will not call you out of the blue to help with your “hacked” device.

Often with these calls, you will notice a delay before you can hear the person on the other end. This can be an indication that the caller may be a scammer.

The scammer will talk you through the steps to open Windows Event Viewer. Event Viewer keeps logs of what is happening on your machine. This includes a section that shows all the errors that have occurred on your device.

It is a simple program to open; hold the windows key and press R, type in eventvwr and press enter.

To the end user, the number of errors in event viewer looks to be of concern – and that is what scammer is praying on.

Unless you are having noticeable trouble with your device. The errors should not be of any concern.

They are not “hacking attempts” as the scammer will try to tell you.

If, so far, the scammer has convinced you that he is legitimate, you will be talked through installing a remote access tool such as Team Viewer.

There are many other remote access tools that have been used.

These remote access tools are legitimate programs and will not be flagged as malicious by your antivirus. The scammer is just using the tool for malicious purposes. Much like a brick is used to build a house, it can also be used as a “tool” to break into a house.

The scammers tactics vary from this point onward.

In some cases the scammer will ask for access to the victims bank account. The premise being that hackers are trying to hack in. Once the victim logs in on behalf of the scammer, the scammer is then able to transfer funds to his own accounts.

Other scammers have installed free software to “fix” the device, after which they charge a fee – in some cases up to $1200.

Once you have allowed remote access to your machine, there is nothing stopping the scammer from setting up a backdoor, stealing personal data, or from simply deleting files.

Whatever the outcome, it is all bad for the victim.

What can you do to avoid these scams

Caller ID: If your phone supports caller ID, screen your calls. If you do not recognize the number, or the number is private, don’t answer the phone.

Of course, use this to your discretion. If you are expecting a call this week from the doctors, you may need to answer that private caller.

Don’t call back: Ignore the automated message advising you to call back on a certain number. This tactic makes the scammers work a lot easier because you have called them and essentially lowered your guard. Sometime the numbers can be a premium service, meaning you may be paying per minute to talk to them.

Call a Friend: If you do get a call and you are not sure, use your mobile (if you have one) and call a trusted friend or family member. Sometimes just talking out loud to someone else will help the scam stand out.

Obtain a Silent Number: Telstra have removed fees associated in having a silent number. This keeps your details out of the White Pages and online directories.  Fees may still apply for other telephone providers. To activate this, call your telephone provider.

Register on the Do Not Call: This isn’t going to stop a malicious caller, but it will prevent some of the legitimate (but still annoying) telemarketing calls.

Educate your friends and family: Share this article with your friends and family. The more we talk about the scams going around, the less likely we are to fall for them.

Scamwatch is run by the ACCC. It provides information to consumers and small businesses about how to recognise, avoid, and report scams.

Our Tech Tips articles also have great tips on protecting yourself online, so do check them out as well.

Google Yourself

What does the internet know about you? What have you posted on social media that is visible to everyone? Are you leaking too much data? Google Yourself – “Googling” yourself sounds like something Vanity Smurf would do in admiration of his self-image. But it is something you should do too, not because you are vain, but because it is a great way to see what information is publicly visible online.

Do a Google search for Your Name, what results do you get? I’ll wait.

This information could potentially be viewed by anyone. A stalker, a cyber-criminal, or a potential employer. The data available could lead to an unwanted altercation, your identity being stolen, or not being hired for that job because of a silly social media post.

How to Search

There are many ways to search for data on the internet. Google, which is by far the most popular search engine, is a good start. Mix it up and use Bing or DuckDuckGo as well. Different search engines will provide different results. It is a good idea to cast your net widely.

Here are some basic search terms to try:

Your Name – Without inverted commas. This will bring up search results containing ‘Your’ and ‘Name’ but not always the exact phrase.

“Your Name” – With inverted commas. This will show search results containing ‘Your Name’.

Your Name Town – Will bring up search results containing Your, Name, and Town

“Your Name” + “town” – Will bring up search results that must include ‘Your Name’ and ‘Town’ Your Name – Search for the terms on a specific website. You could use this to search for articles in your local newspaper that contain your name.

Other terms to search could be your Phone Number and Email Address. If you can find those in a Google Search, that means anyone is able to.


We live in a world where we are increasing losing our privacy.  Whether it is due to another high profile data breach, swapping privacy for monetary value (rewards cards), or just failing to keep our own social media accounts locked down. Someone else is making a living from your data. You could become a hermit, and move into the forest or you could take some steps to reclaim your privacy.

Mobile Service Centre Visiting Grenfell

The Australian Government Mobile Service Centre is supporting rural communities by providing convenient access to Australian Government payments and services. This specialised vehicle offers a wide range of face to face and self service assistance for rural  families, older Australians, students, job seekers, people with disability, carers, farmers and self-employed people. Information about Department of Veterans’ Affairs programs and support services for veterans and their families will also be available.

You can visit the Mobile Service Centre at:

Opposite Grenfell Public Library, Main Street
Thursday, 25 October 2018
9:30 am to 3:30 pm

A Farm Household Case Officer will be in attendance

Experienced staff travel with the Mobile Service Centre and provide friendly, face-to-face service, information and support. Staff can also help you create a myGov account. myGov is a simple and secure way to access government services online.

For more information, go to, call 132 316, or like their Facebook Page.

Computer Maintenance & Repairs, Custom Built Computers, Laptops and more.