Urgent Tech Alert: When an Unknown Caller Gains Access to Your Laptop
Recently, I encountered a concerning situation involving my father’s computer security. He received a phone call from someone claiming to represent his Internet Service Provider (ISP) and, for reasons that I can only describe as perplexing, allowed this stranger to access his laptop via TeamViewer. The incident took a worrying turn when the screen went dark for about four minutes, prompting him to abruptly end the connection.
While I may not be a tech expert, my exposure to hacking scenarios—largely gleaned from shows like “Mr. Robot”—has left me feeling anxious about the potential consequences of this breach. It’s alarming to think that they could have installed malicious Software that allows them to monitor or control his computer.
In light of this incident, my immediate plan was to disconnect the internet, back up his files, and proceed with a complete factory reset of the laptop. Is this approach practical? Does it sufficiently mitigate the risks? I sought advice before taking drastic measures.
Update: Actions Taken
Thank you to everyone who offered guidance. I went ahead and wiped his laptop clean, and it has since received a clean bill of health from Malwarebytes. While my father is understandably frustrated at the prospect of resetting five years’ worth of passwords, I reminded him that it could certainly be worse.
Interestingly, the scammers called back, requesting that he go through the same process again. I was right next to him this time, and I made it clear that they should leave us alone. This interaction is somewhat reassuring; it suggests that they may not have gained access to anything critical during the initial call.
What You Should Know
This situation underscores the importance of being vigilant about your online security. Always verify the identity of anyone requesting access to your devices over the phone, and never share personal information or grant remote access without confirming their credentials. If you suspect that you’ve been targeted, follow up with protective measures such as Software scans and system resets to safeguard your data.
Share this content: