{"id":1378,"date":"2023-02-13T21:43:54","date_gmt":"2023-02-13T21:43:54","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1378"},"modified":"2023-02-13T21:43:54","modified_gmt":"2023-02-13T21:43:54","slug":"%e3%83%86%e3%82%af%e3%83%8b%e3%82%ab%e3%83%ab%e3%82%b5%e3%83%9d%e3%83%bc%e3%83%88%e8%a9%90%e6%ac%ba","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ja\/%e8%a9%90%e6%ac%ba\/%e3%83%86%e3%82%af%e3%83%8b%e3%82%ab%e3%83%ab%e3%82%b5%e3%83%9d%e3%83%bc%e3%83%88%e8%a9%90%e6%ac%ba\/","title":{"rendered":"\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a"},"content":{"rendered":"<p>It\u2019s no secret that the Internet can be a dangerous place. To protect yourself, you need to know what\u2019s out there and how it might target you; tech support scams are just one of those risks. In this blog post, we will give practical advice on how to avoid becoming a victim, as well as tips for staying safe online going forward, so nothing catches you by surprise. With all these resources at your disposal, don\u2019t become another statistic in the growing epidemic of cybercrime!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"whatnbsparenbsptechnbspsupportnbspscams\"><strong>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u3068\u306f\u4f55\u3067\u3059\u304b\uff1f<\/strong><\/h2>\n\n\n<p>Tech support scams are a type of cybercrime where people pretend to be from technical support in order to steal personal information or money from people who don\u2019t know what\u2019s going on. These scammers employ various tactics, such as cold calling, phishing emails, or infecting a victim\u2019s device with malware. The ultimate objective is to extract sensitive information or financial resources from their targets. It is crucial to be aware of these scams and to protect your personal information and financial assets.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"commonnbsptacticsnbspusednbspbynbspscammers\"><strong>\u8a50\u6b3a\u5e2b\u304c\u4f7f\u7528\u3059\u308b\u4e00\u822c\u7684\u306a\u624b\u53e3<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/tech-support-scams-Common-tactics-used-by-scammers-1.jpg\" alt=\"\u8a50\u6b3a\u5e2b\u304c\u4f7f\u7528\u3059\u308b\u4e00\u822c\u7684\u306a\u624b\u53e3\" class=\"wp-image-1407\"\/><\/figure>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Tech support scams are becoming more common, they are frequently carried out via social engineering techniques such as cold calls and phishing emails. These scams may also employ scare tactics, such as falsely claiming that the victim\u2019s computer is compromised then offering their \u201cassistance\u201d for a price.<\/p>\n\n\n\n<p>\u4ee5\u4e0b\u306f\u6700\u3082\u983b\u7e41\u306b\u4f7f\u7528\u3055\u308c\u308b\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u6226\u7565\u3067\u3059\uff1a<\/p>\n\n\n\n<p><strong>\u30b3\u30fc\u30eb\u30c9\u30b3\u30fc\u30eb\uff1a <\/strong>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u5e2b\u304c\u4f7f\u7528\u3059\u308b\u6700\u3082\u4e00\u822c\u7684\u306a\u624b\u53e3\u306e\u4e00\u3064\u306f\u30b3\u30fc\u30eb\u30c9\u30b3\u30fc\u30eb\u3067\u3059\u3002.<\/p>\n\n\n\n<p>\u3053\u308c\u306f\u3001\u30e9\u30f3\u30c0\u30e0\u306b\u4eba\u3005\u306b\u96fb\u8a71\u3092\u304b\u3051\u3001\u672c\u7269\u306e\u6280\u8853\u4f1a\u793e\u3084\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u304b\u3089\u306e\u3082\u306e\u3067\u3042\u308b\u3068\u4e3b\u5f35\u3057\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u3084\u4ed6\u306e\u60aa\u8cea\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u304c\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306b\u3042\u308b\u3068\u4fe1\u3058\u8fbc\u307e\u305b\u3088\u3046\u3068\u3059\u308b\u3082\u306e\u3067\u3059\u3002.<\/p>\n\n\n\n<p>\u305d\u306e\u5f8c\u3001\u5f7c\u3089\u306f\u554f\u984c\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u306e\u6599\u91d1\u3092\u63d0\u793a\u3057\u307e\u3059\u3002.<\/p>\n\n\n\n<p><strong>\u30dd\u30c3\u30d7\u30a2\u30c3\u30d7\u5e83\u544a\uff1a <\/strong>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u5e2b\u304c\u4f7f\u7528\u3059\u308b\u3082\u3046\u4e00\u3064\u306e\u624b\u53e3\u306f\u3001\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3084\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u5185\u3067\u5e83\u544a\u3092\u30dd\u30c3\u30d7\u30a2\u30c3\u30d7\u3055\u305b\u308b\u3053\u3068\u3067\u3059\u3002.<\/p>\n\n\n\n<p>\u3053\u308c\u3089\u306e\u5e83\u544a\u306f\u3001\u507d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8b66\u544a\u3084\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306b\u30a6\u30a4\u30eb\u30b9\u304c\u3042\u308b\u3068\u3044\u3046\u901a\u77e5\u306e\u3088\u3046\u306b\u898b\u3048\u308b\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002\u5f7c\u3089\u306f\u30a6\u30a4\u30eb\u30b9\u3092\u53d6\u308a\u9664\u304f\u305f\u3081\u306e\u652f\u63f4\u3092\u5f97\u308b\u305f\u3081\u306b\u5e83\u544a\u5185\u306e\u756a\u53f7\u306b\u96fb\u8a71\u3059\u308b\u3088\u3046\u306b\u6307\u793a\u3057\u307e\u3059\u3002.<\/p>\n\n\n\n<p><strong>\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\uff1a<\/strong>\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u306f\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u5e2b\u304c\u7121\u9632\u5099\u306a\u88ab\u5bb3\u8005\u304b\u3089\u500b\u4eba\u60c5\u5831\u3084\u304a\u91d1\u3092\u5f97\u3088\u3046\u3068\u3059\u308b\u3082\u3046\u4e00\u3064\u306e\u65b9\u6cd5\u3067\u3059\u3002.<\/p>\n\n\n\n<p>\u307b\u3068\u3093\u3069\u306e\u5834\u5408\u3001\u3053\u308c\u3089\u306e\u30e1\u30fc\u30eb\u5185\u306e\u30ea\u30f3\u30af\u306f\u60aa\u8cea\u306a\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306b\u4eba\u3005\u3092\u8a98\u5c0e\u3057\u3001\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\u756a\u53f7\u3084\u30d1\u30b9\u30ef\u30fc\u30c9\u306a\u3069\u306e\u6a5f\u5bc6\u60c5\u5831\u3092\u6c42\u3081\u3089\u308c\u307e\u3059\u3002.<\/p>\n\n\n\n<p><strong>\u507d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff1a <\/strong>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u5e2b\u306f\u3001\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u304c\u30de\u30eb\u30a6\u30a7\u30a2\u306b\u611f\u67d3\u3057\u3066\u304a\u308a\u3001\u3055\u3089\u306a\u308b\u8105\u5a01\u304b\u3089\u4fdd\u8b77\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3068\u4e3b\u5f35\u3057\u3066\u3001\u507d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3055\u305b\u3088\u3046\u3068\u3059\u308b\u3053\u3068\u3082\u3042\u308a\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u81ea\u4f53\u306b\u306f\u5b9f\u969b\u306b\u60aa\u610f\u306e\u3042\u308b\u30b3\u30fc\u30c9\u304c\u542b\u307e\u308c\u3066\u3044\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u3001\u30b7\u30b9\u30c6\u30e0\u306b\u3055\u3089\u306b\u640d\u5bb3\u3092\u4e0e\u3048\u308b\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002. <\/p>\n\n\n\n<p><strong>\u30bd\u30fc\u30b7\u30e3\u30eb\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u653b\u6483\uff1a <\/strong>\u30bd\u30fc\u30b7\u30e3\u30eb\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u653b\u6483\u306f\u3001\u6050\u6016\u3084\u7dca\u6025\u6027\u3092\u4f5c\u308a\u51fa\u3059\u306a\u3069\u306e\u5fc3\u7406\u7684\u64cd\u4f5c\u6280\u8853\u3092\u4f7f\u7528\u3057\u3066\u3001\u6a5f\u5bc6\u60c5\u5831\u3092\u63d0\u4f9b\u3055\u305b\u305f\u308a\u3001\u7279\u5b9a\u306e\u884c\u52d5\uff08\u304a\u91d1\u3092\u652f\u6255\u3046\u306a\u3069\uff09\u3092\u53d6\u3089\u305b\u305f\u308a\u3059\u308b\u3053\u3068\u3092\u542b\u307f\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u4f8b\u3048\u3070\u3001\u8a50\u6b3a\u5e2b\u306f\u30a6\u30a4\u30eb\u30b9\u611f\u67d3\u306e\u305f\u3081\u306b\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u304c\u7dca\u6025\u4fee\u7406\u3092\u5fc5\u8981\u3068\u3057\u3066\u3044\u308b\u3068\u4e3b\u5f35\u3059\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u304c\u3001\u4f5c\u696d\u3092\u958b\u59cb\u3059\u308b\u524d\u306b\u652f\u6255\u3044\u304c\u5fc5\u8981\u3067\u3059\u3002. <\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tech-support-scams\"><strong>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u8eab\u3092\u5b88\u308b\u65b9\u6cd5<\/strong><\/h2>\n\n\n<p>Tech support scams are a growing problem in the digital age, and it\u2019s important to be aware of these scams and take steps to protect yourself from them. Here are some tips for avoiding tech support scams:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Don\u2019t give out personal information or access your computer without verifying the identity of the person contacting you first.<\/li>\n\n\n\n<li>\u30c7\u30d0\u30a4\u30b9\u3084\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u554f\u984c\u304c\u3042\u308b\u3068\u4e3b\u5f35\u3059\u308b\u672a\u627f\u8afe\u306e\u30e1\u30fc\u30eb\u3001\u96fb\u8a71\u3001\u307e\u305f\u306f\u30c6\u30ad\u30b9\u30c8\u30e1\u30c3\u30bb\u30fc\u30b8\u306b\u306f\u6ce8\u610f\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>Don\u2019t click on links in suspicious emails or download attachments unless you are sure they are legitimate.<\/li>\n\n\n\n<li>Microsoft\u3001Apple\u3001Google\u306a\u3069\u306e\u4fe1\u983c\u3067\u304d\u308b\u4f1a\u793e\u304b\u3089\u306e\u3082\u306e\u3067\u3042\u308b\u3068\u4e3b\u5f35\u3059\u308b\u4eba\u304b\u3089\u9023\u7d61\u3092\u53d7\u3051\u305f\u5834\u5408\u3001\u96fb\u8a71\u3092\u5207\u308a\u3001\u516c\u5f0f\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306b\u63b2\u8f09\u3055\u308c\u3066\u3044\u308b\u30ab\u30b9\u30bf\u30de\u30fc\u30b5\u30fc\u30d3\u30b9\u756a\u53f7\u3092\u4f7f\u7528\u3057\u3066\u76f4\u63a5\u4f1a\u793e\u306b\u9023\u7d61\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>\u81ea\u5206\u81ea\u8eab\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u63d0\u4f9b\u3057\u305f\u308a\u3001\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30b7\u30b9\u30c6\u30e0\u3078\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u3092\u8a31\u53ef\u3059\u308b\u524d\u306b\u3001\u5f7c\u3089\u304c\u3069\u3053\u3067\u50cd\u3044\u3066\u3044\u308b\u306e\u304b\u8cea\u554f\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>Trust your instincts and don\u2019t provide any personal information until you have verified their identity first.<\/li>\n\n\n\n<li>\u8ab0\u304b\u304c\u96fb\u8a71\u3067\u30d1\u30b9\u30ef\u30fc\u30c9\u3084\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\u756a\u53f7\u306a\u3069\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3092\u63d0\u4f9b\u3059\u308b\u3088\u3046\u5727\u529b\u3092\u304b\u3051\u3066\u304d\u305f\u5834\u5408\u3001\u3059\u3050\u306b\u96fb\u8a71\u3092\u5207\u3063\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>Recognize suspicious emails and phone calls by looking out for red flags such as unsolicited contact, urgent requests for personal information, promises of free services or products in exchange for payment upfront, and threats of legal action if payment isn\u2019t made quickly. <\/li>\n\n\n\n<li>\u30b9\u30da\u30eb\u30df\u30b9\u3084\u6587\u6cd5\u306e\u8aa4\u308a\u306b\u6ce8\u610f\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u3053\u308c\u3089\u306f\u30e1\u30fc\u30eb\u304c\u672c\u7269\u3067\u306a\u3044\u3053\u3068\u3092\u793a\u3057\u3066\u3044\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002.<\/li>\n<\/ul>\n\n\n\n<p>\u3053\u308c\u3089\u306e\u30b9\u30c6\u30c3\u30d7\u3092\u8e0f\u3080\u3053\u3068\u3067\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306e\u88ab\u5bb3\u8005\u306b\u306a\u308b\u3053\u3068\u3092\u907f\u3051\u3001\u8a50\u6b3a\u304b\u3089\u8eab\u3092\u5b88\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"reporting-tech-support-scams\"><strong>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306e\u5831\u544a<\/strong><\/h2>\n\n\n<p>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306b\u906d\u9047\u3057\u305f\u5834\u5408\u3001\u8b66\u6212\u3092\u6020\u3089\u305a\u3001\u3053\u306e\u72af\u7f6a\u306e\u88ab\u5bb3\u8005\u306b\u306a\u308b\u4eba\u3092\u9632\u3050\u305f\u3081\u306b\u884c\u52d5\u3092\u8d77\u3053\u3059\u3053\u3068\u304c\u91cd\u8981\u3067\u3059\u3002\u6b8b\u5ff5\u306a\u304c\u3089\u3001\u3053\u306e\u6050\u308d\u3057\u3044\u8a50\u6b3a\u306e\u7d50\u679c\u3068\u3057\u3066\u5168\u8ca1\u7523\u3092\u5931\u3063\u305f\u4eba\u3082\u3044\u307e\u3059\u3002\u3053\u306e\u554f\u984c\u306b\u5bfe\u6297\u3059\u308b\u305f\u3081\u306b\u3001\u906d\u9047\u3057\u305f\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u3092\u5831\u544a\u3059\u308b\u3053\u3068\u304c\u91cd\u8981\u3067\u3059\u3002\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u3092\u5831\u544a\u3059\u308b\u305f\u3081\u306b\u53d6\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u30b9\u30c6\u30c3\u30d7\u306f\u4ee5\u4e0b\u306e\u901a\u308a\u3067\u3059\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>\u30aa\u30f3\u30e9\u30a4\u30f3\u8a50\u6b3a\u3068\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u8a66\u307f\u3092\u5831\u544a\u3059\u308b<\/strong>\uff1a\u30e1\u30fc\u30eb\u3084\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u304c\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306e\u4e00\u90e8\u3067\u3042\u308b\u3068\u7591\u308f\u308c\u308b\u5834\u5408\u3001\u5730\u5143\u306e\u6cd5\u57f7\u884c\u6a5f\u95a2\u307e\u305f\u306f\u9023\u90a6\u53d6\u5f15\u59d4\u54e1\u4f1a\uff08<a href=\"https:\/\/www.ftc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u9023\u90a6\u53d6\u5f15\u59d4\u54e1\u4f1a<\/a>\uff09\u306b\u5831\u544a\u3057\u3066\u304f\u3060\u3055\u3044\u3002\uff08FTC\u306f\u307e\u305f\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u76d7\u96e3\u306e\u88ab\u5bb3\u8005\u306e\u305f\u3081\u306e\u30ea\u30bd\u30fc\u30b9\u3092\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3067\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\uff09\u3002.<\/li>\n\n\n\n<li><strong>\u96fb\u8a71\u3068\u30c6\u30ad\u30b9\u30c8\u30e1\u30c3\u30bb\u30fc\u30b8\u3092\u5831\u544a\u3059\u308b<\/strong>\uff1a\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u304b\u3089\u306e\u3082\u306e\u3067\u3042\u308b\u3068\u4e3b\u5f35\u3059\u308b\u96fb\u8a71\u3084\u30c6\u30ad\u30b9\u30c8\u30e1\u30c3\u30bb\u30fc\u30b8\u3092\u53d7\u3051\u53d6\u3063\u305f\u5834\u5408\u3001\u3059\u3050\u306b\u96fb\u8a71\u3092\u5207\u308a\u3001\u643a\u5e2f\u96fb\u8a71\u306e\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u306b\u9023\u7d61\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li><strong>\u4e0d\u6b63\u306a\u8acb\u6c42\u3092\u5831\u544a\u3059\u308b<\/strong>\uff1a\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306b\u3088\u308b\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\u660e\u7d30\u66f8\u3084\u9280\u884c\u53e3\u5ea7\u306b\u4e0d\u6b63\u306a\u8acb\u6c42\u304c\u3042\u308b\u5834\u5408\u3001\u3059\u3050\u306b\u91d1\u878d\u6a5f\u95a2\u306b\u9023\u7d61\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u8cfc\u5165\u8a3c\u660e\u66f8\uff08\u8acb\u6c42\u66f8\u756a\u53f7\u306a\u3069\uff09\u3092\u53d6\u5f97\u3057\u3066\u3001\u8abf\u67fb\u3092\u652f\u63f4\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"staying-safe-online\"><strong>\u30aa\u30f3\u30e9\u30a4\u30f3\u3067\u5b89\u5168\u3092\u4fdd\u3064 <\/strong><\/h2>\n\n\n<p>Cyber threats like tech support scams pose a significant risk, so it\u2019s critical to protect your devices and accounts. Here are some best practices for remaining safe online:<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"securing-devices-and-accounts\">\u30c7\u30d0\u30a4\u30b9\u3068\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u3001\u96fb\u8a71\u3001\u30bf\u30d6\u30ec\u30c3\u30c8\u306a\u3069\u306e\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u63a5\u7d9a\u30c7\u30d0\u30a4\u30b9\u3092\u3059\u3079\u3066\u6700\u65b0\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d1\u30c3\u30c1\u3067\u66f4\u65b0\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>\u5404\u30c7\u30d0\u30a4\u30b9\u306b\u4fe1\u983c\u3067\u304d\u308b\u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30d7\u30ed\u30b0\u30e9\u30e0\u3068\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u3001\u60aa\u610f\u306e\u3042\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u304b\u3089\u4fdd\u8b77\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>\u53ef\u80fd\u306a\u9650\u308a\u4e8c\u8981\u7d20\u8a8d\u8a3c\u3092\u6709\u52b9\u306b\u3057\u3066\u3001\u8ffd\u52a0\u306e\u4fdd\u8b77\u3092\u884c\u3063\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"creating-strong-passwords\">\u5f37\u529b\u306a\u30d1\u30b9\u30ef\u30fc\u30c9\u306e\u4f5c\u6210<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3059\u308b\u969b\u306b\u306f\u3001\u5f37\u529b\u3067\u7c21\u5358\u306b\u63a8\u6e2c\u3055\u308c\u306a\u3044\u3088\u3046\u306b\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>\u5927\u6587\u5b57\u3001\u5c0f\u6587\u5b57\u3001\u6570\u5b57\u3001\u8a18\u53f7\u3092\u7d44\u307f\u5408\u308f\u305b\u3066\u30e6\u30cb\u30fc\u30af\u306a\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f5c\u6210\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n\n\n\n<li>\u30e9\u30f3\u30c0\u30e0\u306a\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u751f\u6210\u3057\u3001\u5b89\u5168\u306b\u4fdd\u7ba1\u3059\u308b\u305f\u3081\u306b\u30d1\u30b9\u30ef\u30fc\u30c9\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u4f7f\u7528\u3092\u691c\u8a0e\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/li>\n<\/ul>\n\n\n\n<p>\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u4fdd\u3064\u305f\u3081\u306b\u3001\u6700\u65b0\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c8\u30ec\u30f3\u30c9\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5e38\u306b\u628a\u63e1\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30fc\u30d5\u30c6\u30a3\u306b\u3064\u3044\u3066\u5b66\u3076\u305f\u3081\u306e\u30ea\u30bd\u30fc\u30b9\u3092\u6d3b\u7528\u3057\u3066\u304f\u3060\u3055\u3044\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"resources-for-learning-more-about-cybersecurity-and-safety-online\"><strong>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30aa\u30f3\u30e9\u30a4\u30f3\u306e\u5b89\u5168\u6027\u306b\u3064\u3044\u3066\u5b66\u3076\u305f\u3081\u306e\u30ea\u30bd\u30fc\u30b9<\/strong><\/h2>\n\n\n<p>\u7c73\u56fd\u653f\u5e9c\u306f\u3001\u500b\u4eba\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30aa\u30f3\u30e9\u30a4\u30f3\u306e\u5b89\u5168\u6027\u306b\u3064\u3044\u3066\u5b66\u3076\u305f\u3081\u306e\u3044\u304f\u3064\u304b\u306e\u30ea\u30bd\u30fc\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u306f <a href=\"https:\/\/www.stopthinkconnect.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u30b9\u30c8\u30c3\u30d7\u30fb\u30b7\u30f3\u30af\u30fb\u30b3\u30cd\u30af\u30c8<\/a> \u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u3092\u63d0\u4f9b\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306b\u95a2\u3059\u308b\u516c\u5171\u306e\u610f\u8b58\u3092\u9ad8\u3081\u3001\u5b89\u5168\u6027\u306b\u95a2\u3059\u308b\u30d2\u30f3\u30c8\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002 <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month#:~:text=Since%202004%2C%20the%20President%20of,confidential%20data%20become%20more%20commonplace.\" target=\"_blank\" rel=\"noreferrer noopener\">\u5168\u56fd\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5553\u767a\u6708\u9593<\/a> \u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u306f\u6bce\u5e7410\u6708\u306b\u958b\u50ac\u3055\u308c\u3001\u5e02\u6c11\u306b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304b\u3089\u8eab\u3092\u5b88\u308b\u65b9\u6cd5\u3092\u6559\u80b2\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"professional-organizations-dedicated-to-cybersecurity-education-and-research\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6559\u80b2\u3068\u7814\u7a76\u306b\u5c02\u5ff5\u3059\u308b\u5c02\u9580\u7d44\u7e54<\/h3>\n\n\n<p>\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u76e3\u67fb\u30fb\u7d71\u5236\u5354\u4f1a\uff08<a href=\"https:\/\/www.isaca.org\/\">\u30e1\u30f3\u30bf\u30fc\u30b7\u30c3\u30d7\u306e\u6a5f\u4f1a<\/a>\uff09\u306f\u3001\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u3001\u30ea\u30b9\u30af\u8a55\u4fa1\u3001\u76e3\u67fb\u6280\u8853\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u57fa\u6e96\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\u63aa\u7f6e\u3001\u30c7\u30fc\u30bf\u5206\u6790\u30c4\u30fc\u30eb\u306b\u95a2\u3059\u308b\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306e\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u975e\u55b6\u5229\u56e3\u4f53\u3067\u3059\u3002\u5f7c\u3089\u306f\u307e\u305f\u3001\u51fa\u7248\u7269\u3084\u8a8d\u5b9a\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u76e3\u67fb\u4eba\u8cc7\u683c\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u901a\u3058\u3066\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u6226\u7565\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>\u7d50\u8ad6<\/strong><\/h2>\n\n\n<p>\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306f\u3001\u79c1\u305f\u3061\u306e\u30c7\u30b8\u30bf\u30eb\u60c5\u5831\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5371\u967a\u306b\u3055\u3089\u3057\u307e\u3059\u3002\u79c1\u305f\u3061\u81ea\u8eab\u3092\u5b88\u308b\u305f\u3081\u306b\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u610f\u8b58\u3092\u9ad8\u3081\u3001\u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306b\u6295\u8cc7\u3057\u3001\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u3092\u6700\u65b0\u306e\u72b6\u614b\u306b\u4fdd\u3064\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u624b\u9806\u3092\u8e0f\u3080\u3053\u3068\u3067\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3057\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u306e\u5b89\u5168\u6027\u3092\u7dad\u6301\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3059\u3050\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u7ba1\u7406\u3057\u3001\u81ea\u5206\u81ea\u8eab\u3092\u5b88\u308a\u59cb\u3081\u307e\u3057\u3087\u3046\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"faqs\"><strong>\u3088\u304f\u3042\u308b\u8cea\u554f<\/strong><\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1676323085725\"><strong class=\"schema-faq-question\">\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306f\u3069\u306e\u3088\u3046\u306b\u6a5f\u80fd\u3057\u307e\u3059\u304b\uff1f<\/strong> <p class=\"schema-faq-answer\">ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim\u2019s computer. They may ask for payment or install malicious software once they have access.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323342074\"><strong class=\"schema-faq-question\">\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u306b\u306f\u3069\u3046\u3059\u308c\u3070\u3044\u3044\u3067\u3059\u304b\uff1f<\/strong> <p class=\"schema-faq-answer\">To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don\u2019t click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323372090\"><strong class=\"schema-faq-question\">\u4e00\u822c\u7684\u306a\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u3068\u306f\u4f55\u3067\u3059\u304b\uff1f<\/strong> <p class=\"schema-faq-answer\">\u4e00\u822c\u7684\u306a\u6280\u8853\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306b\u306f\u3001\u72af\u7f6a\u8005\u304c\u6b63\u5f53\u306a\u6280\u8853\u30b5\u30dd\u30fc\u30c8\u62c5\u5f53\u8005\u3092\u88c5\u3044\u3001\u51b7\u305f\u3044\u96fb\u8a71\u3001\u30dd\u30c3\u30d7\u30a2\u30c3\u30d7\u30e1\u30c3\u30bb\u30fc\u30b8\u3001\u507d\u306e\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306a\u3069\u306e\u6226\u8853\u3092\u4f7f\u7528\u3057\u3066\u500b\u4eba\u60c5\u5831\u3084\u304a\u91d1\u306b\u30a2\u30af\u30bb\u30b9\u3057\u3088\u3046\u3068\u3059\u308b\u3082\u306e\u304c\u3042\u308a\u307e\u3059\u3002.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323467317\"><strong class=\"schema-faq-question\">\u6280\u8853\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306f\u3069\u3053\u304b\u3089\u6765\u308b\u306e\u304b\uff1f<\/strong> <p class=\"schema-faq-answer\">\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306f\u60aa\u610f\u306e\u3042\u308b\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3001\u305d\u3057\u3066\u7121\u4f5c\u70ba\u306a\u96fb\u8a71\u304b\u3089\u767a\u751f\u3057\u307e\u3059\u3002\u8a50\u6b3a\u5e2b\u306f\u507d\u306e\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3092\u4f5c\u6210\u3057\u305f\u308a\u3001\u5927\u91cf\u306e\u30e1\u30fc\u30eb\u3092\u9001\u4fe1\u3057\u305f\u308a\u3001\u4f55\u3082\u77e5\u3089\u306a\u3044\u30e6\u30fc\u30b6\u30fc\u306b\u76f4\u63a5\u96fb\u8a71\u3092\u304b\u3051\u305f\u308a\u3057\u3066\u3001\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u304c\u30de\u30eb\u30a6\u30a7\u30a2\u306b\u611f\u67d3\u3057\u3066\u3044\u308b\u3068\u4e3b\u5f35\u3059\u308b\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002.<\/p> <\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u304c\u5371\u967a\u306a\u5834\u6240\u3067\u3042\u308b\u3053\u3068\u306f\u5468\u77e5\u306e\u4e8b\u5b9f\u3067\u3059\u3002\u81ea\u5206\u3092\u5b88\u308b\u305f\u3081\u306b\u306f\u3001\u4f55\u304c\u5b58\u5728\u3057\u3066\u3044\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u305d\u308c\u304c\u3069\u306e\u3088\u3046\u306b\u3042\u306a\u305f\u3092\u72d9\u3046\u53ef\u80fd\u6027\u304c\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059; \u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ja\/%e8%a9%90%e6%ac%ba\/%e3%83%86%e3%82%af%e3%83%8b%e3%82%ab%e3%83%ab%e3%82%b5%e3%83%9d%e3%83%bc%e3%83%88%e8%a9%90%e6%ac%ba\/\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1380,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Yourself From Tech Support Scams - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ja\/\u8a50\u6b3a\/\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Yourself From Tech Support Scams - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ja\/\u8a50\u6b3a\/\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T21:43:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tech support scams\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"wordCount\":1537,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"articleSection\":[\"scams\"],\"inLanguage\":\"ja\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"name\":\"Protect Yourself From Tech Support Scams - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"description\":\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\"}],\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Tech support scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech support scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ja\/author\/cesarbarreto\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"name\":\"How do tech support scams work?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.\",\"inLanguage\":\"ja\"},\"inLanguage\":\"ja\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"name\":\"How do I protect myself from tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.\",\"inLanguage\":\"ja\"},\"inLanguage\":\"ja\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"name\":\"What are common tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.\",\"inLanguage\":\"ja\"},\"inLanguage\":\"ja\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"name\":\"Where do tech support scams come from?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.\",\"inLanguage\":\"ja\"},\"inLanguage\":\"ja\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u8eab\u3092\u5b88\u308b - Securitybriefing.net","description":"\u5305\u62ec\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u3067\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u3067\u5b89\u5168\u3092\u4fdd\u3061\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u81ea\u5206\u3092\u5b88\u308a\u307e\u3057\u3087\u3046\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ja\/\u8a50\u6b3a\/\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\/","og_locale":"ja_JP","og_type":"article","og_title":"Protect Yourself From Tech Support Scams - Securitybriefing.net","og_description":"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.","og_url":"https:\/\/securitybriefing.net\/ja\/\u8a50\u6b3a\/\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\/","og_site_name":"Security Briefing","article_published_time":"2023-02-13T21:43:54+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"C\u00e9sar Daniel Barreto","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"8\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tech support scams","datePublished":"2023-02-13T21:43:54+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"wordCount":1537,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","articleSection":["scams"],"inLanguage":"ja"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","name":"\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u8eab\u3092\u5b88\u308b - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","datePublished":"2023-02-13T21:43:54+00:00","description":"\u5305\u62ec\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u3067\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u3067\u5b89\u5168\u3092\u4fdd\u3061\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u81ea\u5206\u3092\u5b88\u308a\u307e\u3057\u3087\u3046\u3002.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317"}],"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","width":662,"height":327,"caption":"Tech support scams"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tech support scams"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\u30bb\u30b5\u30eb\u30fb\u30c0\u30cb\u30a8\u30eb\u30fb\u30d0\u30ec\u30c3\u30c8","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30e9\u30a4\u30bf\u30fc\u3067\u3042\u308a\u5c02\u9580\u5bb6\u3068\u3057\u3066\u5c0a\u656c\u3092\u96c6\u3081\u3066\u304a\u308a\u3001\u305d\u306e\u6df1\u3044\u77e5\u8b58\u3068\u8907\u96d1\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30c8\u30d4\u30c3\u30af\u3092\u5358\u7d14\u5316\u3059\u308b\u80fd\u529b\u3067\u77e5\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30c7\u30fc\u30bf\u4fdd\u8b77\u306e\u5206\u91ce\u3067\u8c4a\u5bcc\u306a\u7d4c\u9a13\u3092\u6301\u3061\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6700\u65b0\u52d5\u5411\u306b\u95a2\u3059\u308b\u6d1e\u5bdf\u306b\u6e80\u3061\u305f\u8a18\u4e8b\u3084\u5206\u6790\u3092\u5b9a\u671f\u7684\u306b\u5bc4\u7a3f\u3057\u3001\u5c02\u9580\u5bb6\u3068\u4e00\u822c\u5e02\u6c11\u306e\u4e21\u65b9\u3092\u6559\u80b2\u3057\u3066\u3044\u308b\u3002","url":"https:\/\/securitybriefing.net\/ja\/author\/cesarbarreto\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","position":1,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","name":"\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306f\u3069\u306e\u3088\u3046\u306b\u6a5f\u80fd\u3057\u307e\u3059\u304b\uff1f","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.","inLanguage":"ja"},"inLanguage":"ja"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","position":2,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","name":"\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u306b\u306f\u3069\u3046\u3059\u308c\u3070\u3044\u3044\u3067\u3059\u304b\uff1f","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.","inLanguage":"ja"},"inLanguage":"ja"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","position":3,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","name":"\u4e00\u822c\u7684\u306a\u30c6\u30af\u30cb\u30ab\u30eb\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u3068\u306f\u4f55\u3067\u3059\u304b\uff1f","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.","inLanguage":"ja"},"inLanguage":"ja"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","position":4,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","name":"\u6280\u8853\u30b5\u30dd\u30fc\u30c8\u8a50\u6b3a\u306f\u3069\u3053\u304b\u3089\u6765\u308b\u306e\u304b\uff1f","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.","inLanguage":"ja"},"inLanguage":"ja"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/1378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/comments?post=1378"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/1378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media\/1380"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media?parent=1378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/categories?post=1378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/tags?post=1378"}],"curies":[{"name":"\u30ef\u30fc\u30c9\u30d7\u30ec\u30b9","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}