Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

It started like any other day. I was going about my routine, working from home on my MacBook, when I received a phone call from an unfamiliar number. I usually let these go to voicemail, but for some reason, I picked this one up. The person on the other end spoke in a calm, robotic tone and told me something along the lines of:
“Hello sir, we have detected a serious issue with your computer. We need to fix it immediately.”
And that was my first red flag.
Now, I work in a corporate environment where we have an internal IT department. If anything ever goes wrong with our systems, they either email us directly or create a ticket in our internal helpdesk system. The idea that some random third-party person would “detect” an issue with my personal or work computer—without any context, logs, or request from me—was already suspicious.
So, I decided to play along, at least for a bit, just to see how far they would go.
The caller kept insisting that I needed to act fast. There was supposedly malware, or a corrupted file, or some kind of network breach—his explanation kept shifting. What didn’t change was the pressure: he kept saying “This needs to be fixed now, before your data is compromised.”
I asked him which company he was calling from. He dodged the question.
I told him we had an internal IT department. “Why would I need you?” I asked, genuinely curious how he’d answer.
He didn’t have a clear response. He just repeated, “We are here to help you. You are in danger.”
That’s when I hung up.
And that should have been the end of it. I got another call a few days later. Different number. Different voice. Same script.
The second caller did the same exact thing. He said. “We have detected unusual activity on your Windows PC. Your system is infected.”
At this point, I didn’t even need to engage. I was working on a MacBook. There was no Windows PC in sight. I pointed that out to him—he immediately ended the call to avoid wasting his time.
Looking back, both calls followed the same structure—a playbook, if you will:
I didn’t let either caller get to step five, but I’ve read enough and spoken to enough people to know how this scam ends. And sadly, not everyone gets off the phone as easily.
It’s easy to think, “Who would fall for that?” But the truth is, these scams continue because they still work.
What’s at stake if you fall for one of these?
So, if you ever receive a call like this, here are a few rules to live by:
It’s worth repeating:
After I hung up on the second caller, I spent a few minutes reflecting on how easy it would be for someone else to get caught in that trap. I’ve worked in environments with IT departments, help desks, system alerts, and corporate training sessions about phishing and scam detection.
But what about someone who doesn’t?
What about a retiree using their home computer for email and news? Or a college student with a laptop full of assignments and no regular backups?
These scammers prey on fear and unfamiliarity. The best weapon we have against them is awareness.
So I called up a couple of relatives and just asked, “Hey, if someone called and said your computer had a problem, what would you do?” It sparked some interesting conversations and hopefully planted the right seeds of skepticism.
I didn’t lose anything in the scam calls I received—other than a few minutes of my day. But the experience left me thinking about the thousands of people who get targeted every day and do lose something.
Whether it’s money, data, or peace of mind, scams like these are more than just annoying—they’re dangerous.
So the next time your phone rings with a strange number and someone says they’ve detected an issue with your computer, you can confidently respond with:
“No thanks. I’ve got an IT department—and common sense.”
And then, hang up.