@prefix rdf: . @prefix dbr: . @prefix yago: . dbr:Technical_support_scam rdf:type yago:Event100029378 , yago:Abstraction100002137 , yago:Crime100766234 , yago:Transgression100745005 , yago:Activity100407535 , yago:YagoPermanentlyLocatedEntity , yago:Swindle100780148 , yago:PsychologicalFeature100023100 , yago:Fraud100769092 , yago:WikicatConfidenceTricks , yago:Bunco100779248 , yago:Act100030358 , yago:WikicatTelephoneCrimes , yago:Wrongdoing100732746 . @prefix rdfs: . dbr:Technical_support_scam rdfs:label "\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A"@ja , "\u6280\u8853\u652F\u6301\u8A50\u9A19"@zh , "Microsoft Tech Scam"@nl , "Fa\u0142szywa pomoc techniczna"@pl , "Technical Support Scam"@de , "Technical support scam"@en ; rdfs:comment "\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\uFF08\u30B5\u30DD\u30FC\u30C8\u3055\u304E\u3001\u82F1: tecnical support scam\u3001tech support scam\uFF09\u3068\u306F\u300C\u507D\u306E\u30A8\u30E9\u30FC\u30E1\u30C3\u30BB\u30FC\u30B8\u300D\u3092\u30DD\u30C3\u30D7\u30A2\u30C3\u30D7\u5E83\u544A\u3067\u8868\u793A\u3055\u305B\u308B\u3001\u3042\u308B\u3044\u306F\u3001\u8A50\u6B3A\u5E2B\u306E\u904B\u55B6\u3059\u308B\u30A6\u30A7\u30D6\u30B5\u30A4\u30C8\u306B\u63B2\u8F09\u3055\u308C\u305F\u300C\u507D\u306E\u30D8\u30EB\u30D7\u30C7\u30B9\u30AF\u300D\u306E\u5E83\u544A\u3092\u901A\u3058\u3066\u3001\u6B63\u898F\u306E\u30C6\u30AF\u30CB\u30AB\u30EB\u30B5\u30DD\u30FC\u30C8\u3092\u88C5\u3044\u884C\u308F\u308C\u308B\u8A50\u6B3A\u306E\u4E00\u7A2E\u3002\u6280\u8853\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u3001\u30C6\u30AF\u30CB\u30AB\u30EB\u30B5\u30DD\u30FC\u30C8\uFF08\u30C6\u30AF\u30B5\u30DD\uFF09\u8A50\u6B3A\u3068\u3082\u3044\u308F\u308C\u308B\u3002 \u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u306F\u3001\u30BD\u30FC\u30B7\u30E3\u30EB\u30FB\u30A8\u30F3\u30B8\u30CB\u30A2\u30EA\u30F3\u30B0\u306A\u3069\u306E\u69D8\u3005\u306A\u4FE1\u7528\u8A50\u6B3A\u306E\u624B\u6CD5\u3092\u7528\u3044\u3001\u5B9F\u969B\u306B\u306F\u554F\u984C\u304C\u306A\u3044\u72B6\u614B\u3067\u3042\u3063\u305F\u3068\u3057\u3066\u3082\u3001\u88AB\u5BB3\u8005\u306E\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u3084\u643A\u5E2F\u6A5F\u5668\u306B\u30DE\u30EB\u30A6\u30A7\u30A2\u611F\u67D3\u3068\u3044\u3063\u305F\u554F\u984C\u304C\u767A\u751F\u3057\u3066\u3044\u308B\u3068\u4FE1\u7528\u3055\u305B\u3001\u305D\u306E\u5F8C\u3001\u8A50\u6B3A\u5E2B\u304C\u4E3B\u5F35\u3059\u308B\u300C\u5618\u306E\u554F\u984C\u300D\u3092\u89E3\u6C7A\u3059\u308B\u305F\u3081\u3001\u8CBB\u7528\u3092\u652F\u6255\u3046\u3088\u3046\u8AAC\u5F97\u304C\u884C\u308F\u308C\u308B\u3002\u652F\u6255\u3044\u306B\u306F\u3001\u8FFD\u8DE1\u304C\u56F0\u96E3\u3001\u304B\u3064\u3001\u6D88\u8CBB\u8005\u4FDD\u8B77\u304C\u672A\u6574\u5099\u3067\u88AB\u5BB3\u8005\u304B\u3089\u306E\u8FD4\u91D1\u8ACB\u6C42\u304C\u96E3\u3057\u3044\u624B\u6BB5\u304C\u7528\u3044\u3089\u308C\u3001\u4E00\u822C\u7684\u306B\u306F\u30AE\u30D5\u30C8\u30AB\u30FC\u30C9\u304C\u5229\u7528\u3055\u308C\u308B\u3002"@ja , "\u6280\u8853\u652F\u6301\u8A50\u9A19\u662F\u6307\u4E00\u985E\u96FB\u8A71\u8A50\u9A19\uFF0C\u7576\u4E00\u4F4D\u8A50\u9A19\u8005\u8072\u7A31\u81EA\u5DF1\u63D0\u4F9B\u6280\u8853\u652F\u6301\u670D\u52D9\u3002\u4E00\u822C\u7531\u51B7\u64A5\u4E0D\u77E5\u60C5\u7684\u7528\u6236\u3002\u5927\u591A\u6578\u9019\u6A23\u7684\u9A19\u5C40\u662F\u91DD\u5C0DWindows\u7528\u6236\u3002\u8A50\u9A19\u8005\u901A\u5E38\u81EA\u7A31\u70BA\u4F86\u81EA\u4E00\u500B\u807D\u8D77\u4F86\u5408\u6CD5\u7684\u516C\u53F8 \uFF08\u4F8B\u5982\uFF1A\"Windows \u6280\u8853\u652F\u6301\u670D\u52D9\u4E2D\u5FC3\"\u3002\uFF09 2008\u5E74\u8D77\u5728\u4E00\u4E9B\u82F1\u8A9E\u570B\u5BB6\u6BD4\u5982\u7F8E\u570B\uFF0C\u82F1\u570B\uFF0C\u6FB3\u5927\u5229\u4E9E\u8207\u52A0\u62FF\u5927\u767C\u751F\u9019\u7A2E\u8A50\u9A19\u3002\u4E00\u822C\u8A50\u9A19\u8005\u662F\u4F86\u81EA\u5370\u5EA6\u7684\u547C\u53EB\u4E2D\u5FC3\u51B7\u64A5\u7684\u96FB\u8A71\u3002. \u5728\u4E2D\u570B\u5927\u9678\uFF0C2016\u5E74\u8D77\uFF0C\u767C\u73FE\u5047\u5192\u6DD8\u5BF6\u6280\u8853\u652F\u6301\u7684\u96FB\u8A71\u3002"@zh , "Fa\u0142szywa pomoc techniczna (ang. technical support scam, tech support scam) \u2013 metoda oszustwa internetowego, w kt\u00F3rej przest\u0119pca pr\u00F3buje zastraszy\u0107 ofiar\u0119 i sk\u0142oni\u0107 j\u0105 do zap\u0142acenia za zb\u0119dn\u0105 pomoc techniczn\u0105. Metoda ta wykorzystuje brak wiedzy informatycznej ofiary. W krajach angloj\u0119zycznych (mi\u0119dzy innymi w Stanach Zjednoczonych, Kanadzie, Wielkiej Brytanii, Irlandii, Australii i Nowej Zelandii) oszustwa tego rodzaju funkcjonuj\u0105 przynajmniej od 2008 roku, a przeprowadzaj\u0105 je zwykle call center po\u0142o\u017Cone w Indiach."@pl , "A technical support scam, or tech support scam, is a type of fraud in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or via fake \"help lines\" advertised on websites owned by the scammers. Technical support scammers use social engineering and a variety of confidence tricks to persuade their victim of the presence of problems on their computer or mobile device, such as a malware infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious \"problems\" that they claim to have found. Payment is made to the scammer through ways which are hard to trace and have fewer consumer protections in place which c"@en , "Technical Support Scam (auch Tech-Support-Betrug) ist eine Art des telefonischen Betrugs, bei welchem der Betr\u00FCger vorgibt, f\u00FCr ein Unternehmen im Computerdienstleistungsbereich zu arbeiten.Ziel der Anrufe sind meist Nutzer von Microsoft Windows (oder seltener auch MacOS), gegen\u00FCber welchen der Betr\u00FCger oft angibt, entweder f\u00FCr Microsoft zu arbeiten oder f\u00FCr ein Dienstleistungsunternehmen in dessen Auftrag."@de , "De Microsoft Tech Scam is een vorm van computercriminaliteit en helpdeskfraude waarbij iemand zich voordoet als een medewerker van Microsoft en telefonisch individuen benadert. Deze zogenaamde medewerker maakt misbruik van het gebrek aan technische kennis van de meeste pcgebruikers en zal personen ervan overtuigen dat er iets mis is met de software van Microsoft op hun pc. Als zogenaamde beveiligingsexpert of technicus zal de oplichter beweren problemen te kunnen verhelpen, maar zal deze backdoors of andere malware installeren teneinde permanente toegang tot de computer van het slachtoffer te krijgen. Het uiteindelijke doel is vaak om via de persoonlijke gegevens of via de installatie van banking trojans de controle over bankrekeningen, PayPal-accounts en wat dies meer zij te verkrijgen. I"@nl . @prefix foaf: . @prefix ns5: . dbr:Technical_support_scam foaf:homepage ns5:protect-yourself-from-tech-support-scams-2ebf91bd-f94c-2a8a-e541-f5c800d18435 ; foaf:depiction , . @prefix dcterms: . @prefix dbc: . dbr:Technical_support_scam dcterms:subject dbc:Telephone_crimes , dbc:Confidence_tricks , dbc:Fraud_in_India , dbc:Cybercrime , dbc:Remote_desktop . @prefix dbo: . dbr:Technical_support_scam dbo:wikiPageID 42331664 ; dbo:wikiPageRevisionID 1122987305 ; dbo:wikiPageWikiLink dbr:Globally_unique_identifier , dbr:Federal_Trade_Commission , dbr:Special_folder , dbr:Internet_geolocation , dbr:Cryptocurrency , dbr:Cold_calling , dbr:File_association , , dbr:Quadcopter , dbr:IP_address , dbr:YouTube , dbr:Millennials , dbr:List_of_confidence_tricks , dbr:Technical_support , dbr:Web_page , dbr:California , dbr:YouGov , dbr:World_Wide_Web , dbr:Computer , dbr:TeamViewer , dbr:Robocall , dbr:Remote_desktop_software , dbr:Wire_transfer , , dbr:Indian_English , dbr:Computer_virus , dbr:Microsoft , dbr:Karl_Rock , dbr:Pop-up_ad , dbc:Telephone_crimes , , dbr:United_States_dollar , dbr:Command_Prompt , dbr:Confidence_trick , dbr:IRS_impersonation_scam , dbr:Cybersquatting , dbr:Bing_Ads , , dbr:Unemployment , dbr:Syskey , , dbr:SSA_impersonation_scam , dbr:Error_message , , dbr:Consumer , dbr:Theft , dbr:Australia , dbr:Telemarketing_fraud , dbr:Google_Search , dbr:Automated_clearing_house , dbr:Mojibake , dbr:Canada , dbr:Death_threat , dbr:Virus_hoax , dbr:Keyword_advertising , dbr:New_Zealand , dbr:Microsoft_Notepad , dbr:AnyDesk , dbr:United_States , dbr:Hewlett-Packard , , dbr:Malware_scanner , dbr:GoToAssist , dbr:South_Africa , dbr:Murder , , dbr:Mobile_device , dbr:Extortion , dbr:Web_browser , dbr:Cheque , dbr:Dismemberment , dbc:Confidence_tricks , dbr:CCTV , dbr:Cybercrime_in_India , dbr:Scam_baiting , dbr:Universally_unique_identifier , dbr:Event_Viewer , dbc:Fraud_in_India , dbr:Ireland , dbr:Windows_Registry , dbr:Fraud , dbr:IYogi , dbr:India , dbr:Law_enforcement_agency , dbr:Phishing , dbr:Rogue_security_software , dbr:Windows_10 , dbr:Temporary_file , dbr:LogMeIn , dbr:Windows_service , dbr:Canadian_Broadcasting_Corporation , dbr:Remote_access_trojan , , dbr:Malware , dbr:System_administrator , dbr:Netstat , dbr:Travel_agency , dbr:Virtual_machine , dbr:Logfile , , dbr:Prefetcher , dbr:Hacker , dbc:Cybercrime , , dbr:Generation_Z , dbr:Rape , dbr:URL , dbr:NDSS_Symposium , dbr:United_Kingdom , dbc:Remote_desktop , dbr:Warranty , dbr:Advertising_network , dbr:Consumer_protection , dbr:Microsoft_Partner_Network , , dbr:Website , dbr:Advance-fee_scam , dbr:Distributed_denial_of_service_attack , , dbr:Antivirus_software , dbr:Blue_Screen_of_Death , dbr:Gift_card , dbr:Lawsuit , dbr:NortonLifeLock ; dbo:wikiPageExternalLink ns5:protect-yourself-from-tech-support-scams-2ebf91bd-f94c-2a8a-e541-f5c800d18435 . @prefix ns9: . dbr:Technical_support_scam dbo:wikiPageExternalLink ns9:tech-support-scams , , , . @prefix owl: . dbr:Technical_support_scam owl:sameAs . @prefix ns11: . dbr:Technical_support_scam owl:sameAs ns11:e8R6 . @prefix yago-res: . dbr:Technical_support_scam owl:sameAs yago-res:Technical_support_scam , , . @prefix wikidata: . dbr:Technical_support_scam owl:sameAs wikidata:Q16738649 , . @prefix dbpedia-nl: . dbr:Technical_support_scam owl:sameAs dbpedia-nl:Microsoft_Tech_Scam . @prefix dbpedia-de: . dbr:Technical_support_scam owl:sameAs dbpedia-de:Technical_Support_Scam . @prefix dbpedia-simple: . dbr:Technical_support_scam owl:sameAs dbpedia-simple:Technical_support_scam . @prefix dbp: . @prefix dbt: . dbr:Technical_support_scam dbp:wikiPageUsesTemplate dbt:Use_British_English , dbt:Main , dbt:Reflist , dbt:Good_article , dbt:Cite_web , dbt:Scams_and_confidence_tricks , dbt:Short_description , dbt:Use_mdy_dates ; dbo:thumbnail ; dbo:abstract "Fa\u0142szywa pomoc techniczna (ang. technical support scam, tech support scam) \u2013 metoda oszustwa internetowego, w kt\u00F3rej przest\u0119pca pr\u00F3buje zastraszy\u0107 ofiar\u0119 i sk\u0142oni\u0107 j\u0105 do zap\u0142acenia za zb\u0119dn\u0105 pomoc techniczn\u0105. Metoda ta wykorzystuje brak wiedzy informatycznej ofiary. Oszu\u015Bci prowadz\u0105cy fa\u0142szyw\u0105 pomoc techniczn\u0105 mog\u0105 zadzwoni\u0107 do ofiary, podaj\u0105c si\u0119 za przedstawicieli producenta oprogramowania (np. Microsoftu). W innym wariancie ataku po\u0142\u0105czenie nawi\u0105zuje ofiara, nak\u0142oniona przez komunikat zamieszczony na stronie internetowej (czasami blokuj\u0105cy przegl\u0105dark\u0119 i trudny do zamkni\u0119cia). Przest\u0119pcy prosz\u0105 o zainstalowanie aplikacji daj\u0105cej zdalny dost\u0119p do urz\u0105dzenia. Nast\u0119pnie mog\u0105 informowa\u0107 ofiar\u0119 o rzekomych problemach na komputerze, na przyk\u0142ad poprzez wskazywanie niegro\u017Anych ostrze\u017Ce\u0144 i b\u0142\u0119d\u00F3w z systemowego podgl\u0105du zdarze\u0144 lub \u201Eskanowanie\u201D komputera komend\u0105 tree w wierszu polece\u0144. Ostatecznie oszust proponuje zakup pomocy technicznej, kt\u00F3ra ma wyeliminowa\u0107 rzekome usterki. W krajach angloj\u0119zycznych (mi\u0119dzy innymi w Stanach Zjednoczonych, Kanadzie, Wielkiej Brytanii, Irlandii, Australii i Nowej Zelandii) oszustwa tego rodzaju funkcjonuj\u0105 przynajmniej od 2008 roku, a przeprowadzaj\u0105 je zwykle call center po\u0142o\u017Cone w Indiach."@pl , "De Microsoft Tech Scam is een vorm van computercriminaliteit en helpdeskfraude waarbij iemand zich voordoet als een medewerker van Microsoft en telefonisch individuen benadert. Deze zogenaamde medewerker maakt misbruik van het gebrek aan technische kennis van de meeste pcgebruikers en zal personen ervan overtuigen dat er iets mis is met de software van Microsoft op hun pc. Als zogenaamde beveiligingsexpert of technicus zal de oplichter beweren problemen te kunnen verhelpen, maar zal deze backdoors of andere malware installeren teneinde permanente toegang tot de computer van het slachtoffer te krijgen. Het uiteindelijke doel is vaak om via de persoonlijke gegevens of via de installatie van banking trojans de controle over bankrekeningen, PayPal-accounts en wat dies meer zij te verkrijgen. In een enkel geval wordt er ook klassiek chantage gepleegd waarbij er bijvoorbeeld kinderporno op de computer van het slachtoffer wordt gevonden. Ook klassieke oplichting komt bij deze methode voor, zo zal de beller beweren dat de Microsoft-licentie betaald moet worden. Deze vorm van computercriminaliteit bestaat sinds 2009. Microsoft schatte in 2015 dat in dat jaar meer dan 3 miljoen Amerikanen in totaal meer dan een miljard dollar zouden hebben betaald aan deze zogenaamde experts."@nl , "\u6280\u8853\u652F\u6301\u8A50\u9A19\u662F\u6307\u4E00\u985E\u96FB\u8A71\u8A50\u9A19\uFF0C\u7576\u4E00\u4F4D\u8A50\u9A19\u8005\u8072\u7A31\u81EA\u5DF1\u63D0\u4F9B\u6280\u8853\u652F\u6301\u670D\u52D9\u3002\u4E00\u822C\u7531\u51B7\u64A5\u4E0D\u77E5\u60C5\u7684\u7528\u6236\u3002\u5927\u591A\u6578\u9019\u6A23\u7684\u9A19\u5C40\u662F\u91DD\u5C0DWindows\u7528\u6236\u3002\u8A50\u9A19\u8005\u901A\u5E38\u81EA\u7A31\u70BA\u4F86\u81EA\u4E00\u500B\u807D\u8D77\u4F86\u5408\u6CD5\u7684\u516C\u53F8 \uFF08\u4F8B\u5982\uFF1A\"Windows \u6280\u8853\u652F\u6301\u670D\u52D9\u4E2D\u5FC3\"\u3002\uFF09 2008\u5E74\u8D77\u5728\u4E00\u4E9B\u82F1\u8A9E\u570B\u5BB6\u6BD4\u5982\u7F8E\u570B\uFF0C\u82F1\u570B\uFF0C\u6FB3\u5927\u5229\u4E9E\u8207\u52A0\u62FF\u5927\u767C\u751F\u9019\u7A2E\u8A50\u9A19\u3002\u4E00\u822C\u8A50\u9A19\u8005\u662F\u4F86\u81EA\u5370\u5EA6\u7684\u547C\u53EB\u4E2D\u5FC3\u51B7\u64A5\u7684\u96FB\u8A71\u3002. \u5728\u4E2D\u570B\u5927\u9678\uFF0C2016\u5E74\u8D77\uFF0C\u767C\u73FE\u5047\u5192\u6DD8\u5BF6\u6280\u8853\u652F\u6301\u7684\u96FB\u8A71\u3002"@zh , "A technical support scam, or tech support scam, is a type of fraud in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or via fake \"help lines\" advertised on websites owned by the scammers. Technical support scammers use social engineering and a variety of confidence tricks to persuade their victim of the presence of problems on their computer or mobile device, such as a malware infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious \"problems\" that they claim to have found. Payment is made to the scammer through ways which are hard to trace and have fewer consumer protections in place which could allow the victim to claim their money back, usually through gift cards. Technical support scams have occurred as early as 2008. A 2017 study of technical support scams found that of the IPs that could be geolocated, 85% could be traced to locations in India, 7% to locations in the United States and 3% to locations in Costa Rica. Research into tech support scams suggests that millennials and those in generation Z have the highest exposure to such scams; however, senior citizens are more likely to lose money to tech support scams. Technical support scams were named by Norton as the top phishing threat to consumers in October 2021; Microsoft found that 60% of consumers who took part in a survey had been exposed to a technical support scam within the previous twelve months. Responses to technical support scams include lawsuits brought against companies responsible for running fraudulent call centres and scam baiting."@en , "\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\uFF08\u30B5\u30DD\u30FC\u30C8\u3055\u304E\u3001\u82F1: tecnical support scam\u3001tech support scam\uFF09\u3068\u306F\u300C\u507D\u306E\u30A8\u30E9\u30FC\u30E1\u30C3\u30BB\u30FC\u30B8\u300D\u3092\u30DD\u30C3\u30D7\u30A2\u30C3\u30D7\u5E83\u544A\u3067\u8868\u793A\u3055\u305B\u308B\u3001\u3042\u308B\u3044\u306F\u3001\u8A50\u6B3A\u5E2B\u306E\u904B\u55B6\u3059\u308B\u30A6\u30A7\u30D6\u30B5\u30A4\u30C8\u306B\u63B2\u8F09\u3055\u308C\u305F\u300C\u507D\u306E\u30D8\u30EB\u30D7\u30C7\u30B9\u30AF\u300D\u306E\u5E83\u544A\u3092\u901A\u3058\u3066\u3001\u6B63\u898F\u306E\u30C6\u30AF\u30CB\u30AB\u30EB\u30B5\u30DD\u30FC\u30C8\u3092\u88C5\u3044\u884C\u308F\u308C\u308B\u8A50\u6B3A\u306E\u4E00\u7A2E\u3002\u6280\u8853\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u3001\u30C6\u30AF\u30CB\u30AB\u30EB\u30B5\u30DD\u30FC\u30C8\uFF08\u30C6\u30AF\u30B5\u30DD\uFF09\u8A50\u6B3A\u3068\u3082\u3044\u308F\u308C\u308B\u3002 \u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u306F\u3001\u30BD\u30FC\u30B7\u30E3\u30EB\u30FB\u30A8\u30F3\u30B8\u30CB\u30A2\u30EA\u30F3\u30B0\u306A\u3069\u306E\u69D8\u3005\u306A\u4FE1\u7528\u8A50\u6B3A\u306E\u624B\u6CD5\u3092\u7528\u3044\u3001\u5B9F\u969B\u306B\u306F\u554F\u984C\u304C\u306A\u3044\u72B6\u614B\u3067\u3042\u3063\u305F\u3068\u3057\u3066\u3082\u3001\u88AB\u5BB3\u8005\u306E\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u3084\u643A\u5E2F\u6A5F\u5668\u306B\u30DE\u30EB\u30A6\u30A7\u30A2\u611F\u67D3\u3068\u3044\u3063\u305F\u554F\u984C\u304C\u767A\u751F\u3057\u3066\u3044\u308B\u3068\u4FE1\u7528\u3055\u305B\u3001\u305D\u306E\u5F8C\u3001\u8A50\u6B3A\u5E2B\u304C\u4E3B\u5F35\u3059\u308B\u300C\u5618\u306E\u554F\u984C\u300D\u3092\u89E3\u6C7A\u3059\u308B\u305F\u3081\u3001\u8CBB\u7528\u3092\u652F\u6255\u3046\u3088\u3046\u8AAC\u5F97\u304C\u884C\u308F\u308C\u308B\u3002\u652F\u6255\u3044\u306B\u306F\u3001\u8FFD\u8DE1\u304C\u56F0\u96E3\u3001\u304B\u3064\u3001\u6D88\u8CBB\u8005\u4FDD\u8B77\u304C\u672A\u6574\u5099\u3067\u88AB\u5BB3\u8005\u304B\u3089\u306E\u8FD4\u91D1\u8ACB\u6C42\u304C\u96E3\u3057\u3044\u624B\u6BB5\u304C\u7528\u3044\u3089\u308C\u3001\u4E00\u822C\u7684\u306B\u306F\u30AE\u30D5\u30C8\u30AB\u30FC\u30C9\u304C\u5229\u7528\u3055\u308C\u308B\u3002 \u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u306F\u3001\u53E4\u304F\u306F2008\u5E74\u306B\u767A\u751F\u3057\u305F\u3053\u3068\u304C\u78BA\u8A8D\u3055\u308C\u3066\u3044\u308B\u30022017\u5E74\u306B\u884C\u308F\u308C\u305F\u8ABF\u67FB\u3067\u306F\u3001\u8A50\u6B3A\u3067\u4F7F\u7528\u3055\u308C\u305FIP\u306E\u4F4D\u7F6E\u60C5\u5831\u53D6\u5F97\uFF08\u30B8\u30AA\u30ED\u30B1\u30FC\u30B7\u30E7\u30F3\uFF09\u304C\u884C\u308F\u308C\u3001\u8FFD\u8DE1\u53EF\u80FD\u306AIP\u306E85%\u304C\u30A4\u30F3\u30C9\u30017%\u304C\u30A2\u30E1\u30EA\u30AB\u5408\u8846\u56FD\u30013%\u304C\u30B3\u30B9\u30BF\u30EA\u30AB\u306E\u3082\u306E\u3067\u3042\u308B\u3068\u5224\u660E\u3057\u305F\u3002\u307E\u305F\u3001\u8ABF\u67FB\u3067\u306F\u3001\u30DF\u30EC\u30CB\u30A2\u30E0\u4E16\u4EE3\u3068\u30B8\u30A7\u30CD\u30EC\u30FC\u30B7\u30E7\u30F3Z\u306E\u4E16\u4EE3\u304C\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u3078\u306E\u906D\u9047\u7387\u304C\u6700\u3082\u9AD8\u304F\u3001\u30B7\u30CB\u30A2\u4E16\u4EE3\u304C\u88AB\u5BB3\u3092\u53D7\u3051\u308B\u5272\u5408\u304C\u6700\u3082\u9AD8\u3044\u3053\u3068\u304C\u793A\u3055\u308C\u305F\u30022021\u5E7410\u6708\u3001\u30CE\u30FC\u30C8\u30F3\u306F\u3001\u6D88\u8CBB\u8005\u306B\u5BFE\u3059\u308B\u30D5\u30A3\u30C3\u30B7\u30F3\u30B0\u8A50\u6B3A\u306B\u304A\u3051\u308B\u6700\u5927\u306E\u8105\u5A01\u3068\u3057\u3066\u3001\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u306E\u540D\u524D\u3092\u6319\u3052\u305F\u3002\u30DE\u30A4\u30AF\u30ED\u30BD\u30D5\u30C8\u306E\u8ABF\u67FB\u3067\u306F\u3001\u8ABF\u67FB\u306B\u53C2\u52A0\u3057\u305F\u6D88\u8CBB\u8005\u306E60%\u304C\u3001\u904E\u53BB12\u304B\u6708\u4EE5\u5185\u306B\u30B5\u30DD\u30FC\u30C8\u8A50\u6B3A\u306B\u906D\u9047\u3057\u3066\u3044\u305F\u3053\u3068\u3092\u660E\u3089\u304B\u306B\u3057\u3066\u3044\u308B\u3002\u3053\u3046\u3057\u305F\u8A50\u6B3A\u884C\u70BA\u306B\u5BFE\u6297\u3057\u3066\u3001\u30B3\u30FC\u30EB\u30BB\u30F3\u30BF\u30FC\u3092\u904B\u55B6\u3059\u308B\u4F01\u696D\u3078\u306E\u6C11\u4E8B\u8A34\u8A1F\u3084\u3001\u8A50\u6B3A\u5E2B\u306B\u9A19\u3055\u308C\u305F\u3075\u308A\u3092\u3057\u3066\u60C5\u5831\u53CE\u96C6\u3001\u307E\u305F\u306F\u3001\u5ACC\u304C\u3089\u305B\u3092\u884C\u3046\u3068\u547C\u3070\u308C\u308B\u30CD\u30C3\u30C8\u81EA\u8B66\u884C\u70BA\u304C\u884C\u308F\u308C\u3066\u3044\u308B\u3002"@ja , "Technical Support Scam (auch Tech-Support-Betrug) ist eine Art des telefonischen Betrugs, bei welchem der Betr\u00FCger vorgibt, f\u00FCr ein Unternehmen im Computerdienstleistungsbereich zu arbeiten.Ziel der Anrufe sind meist Nutzer von Microsoft Windows (oder seltener auch MacOS), gegen\u00FCber welchen der Betr\u00FCger oft angibt, entweder f\u00FCr Microsoft zu arbeiten oder f\u00FCr ein Dienstleistungsunternehmen in dessen Auftrag. Die Kontaktaufnahme geschieht entweder durch einen unverlangten und \u00FCberraschenden Telefonanruf durch den Betr\u00FCger (wobei die Telefonnummer durch Call ID Spoofing verschleiert wird) oder das Opfer wird dazu gebracht, den Betr\u00FCger unter einer meist kostenfreien Telefonnummer anzurufen (bspw. durch Anzeigen eines einsch\u00FCchternden Pop-ups im Webbrowser). Der Kriminelle versucht in der Regel Fernzugriff auf den Computer des Opfers zu erlangen, wodurch er m\u00F6glicherweise bereits Zugriff auf sensible Daten des Opfers wie Bankverbindungen, Versicherungsinformationen, Adressdaten und pers\u00F6nliche Dokumente erlangen kann. Danach versucht der Betr\u00FCger das Opfer mittels Tricks dazu zu bringen, einen Geldbetrag f\u00FCr das vermeintliche L\u00F6sen von angeblichen Problemen oder f\u00FCr vorgeblich n\u00F6tige Sicherheitssoftware zu bezahlen."@de . @prefix prov: . dbr:Technical_support_scam prov:wasDerivedFrom . @prefix xsd: . dbr:Technical_support_scam dbo:wikiPageLength "52420"^^xsd:nonNegativeInteger . @prefix wikipedia-en: . dbr:Technical_support_scam foaf:isPrimaryTopicOf wikipedia-en:Technical_support_scam .