{"id":1378,"date":"2023-02-13T21:43:54","date_gmt":"2023-02-13T21:43:54","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1378"},"modified":"2023-02-13T21:43:54","modified_gmt":"2023-02-13T21:43:54","slug":"lua-dao-ho-tro-ky-thuat","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/lua-dao\/lua-dao-ho-tro-ky-thuat\/","title":{"rendered":"L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt"},"content":{"rendered":"<p>Kh\u00f4ng c\u00f3 g\u00ec b\u00ed m\u1eadt khi Internet c\u00f3 th\u1ec3 l\u00e0 m\u1ed9t n\u01a1i nguy hi\u1ec3m. \u0110\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n, b\u1ea1n c\u1ea7n bi\u1ebft nh\u1eefng g\u00ec \u0111ang c\u00f3 ngo\u00e0i kia v\u00e0 c\u00e1ch n\u00f3 c\u00f3 th\u1ec3 nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o b\u1ea1n; l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ch\u1ec9 l\u00e0 m\u1ed9t trong nh\u1eefng r\u1ee7i ro \u0111\u00f3. Trong b\u00e0i \u0111\u0103ng blog n\u00e0y, ch\u00fang t\u00f4i s\u1ebd \u0111\u01b0a ra l\u1eddi khuy\u00ean th\u1ef1c t\u1ebf v\u1ec1 c\u00e1ch tr\u00e1nh tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n, c\u0169ng nh\u01b0 m\u1eb9o \u0111\u1ec3 gi\u1eef an to\u00e0n tr\u1ef1c tuy\u1ebfn trong t\u01b0\u01a1ng lai, \u0111\u1ec3 kh\u00f4ng c\u00f3 g\u00ec l\u00e0m b\u1ea1n b\u1ea5t ng\u1edd. V\u1edbi t\u1ea5t c\u1ea3 c\u00e1c t\u00e0i nguy\u00ean n\u00e0y trong t\u1ea7m tay, \u0111\u1eebng tr\u1edf th\u00e0nh m\u1ed9t con s\u1ed1 th\u1ed1ng k\u00ea kh\u00e1c trong \u0111\u1ea1i d\u1ecbch t\u1ed9i ph\u1ea1m m\u1ea1ng \u0111ang gia t\u0103ng!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"whatnbsparenbsptechnbspsupportnbspscams\"><strong>L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt l\u00e0 g\u00ec?<\/strong><\/h2>\n\n\n<p>L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt l\u00e0 m\u1ed9t lo\u1ea1i t\u1ed9i ph\u1ea1m m\u1ea1ng m\u00e0 ng\u01b0\u1eddi ta gi\u1ea3 v\u1edd l\u00e0 t\u1eeb b\u1ed9 ph\u1eadn h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c ti\u1ec1n t\u1eeb nh\u1eefng ng\u01b0\u1eddi kh\u00f4ng bi\u1ebft chuy\u1ec7n g\u00ec \u0111ang x\u1ea3y ra. Nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o n\u00e0y s\u1eed d\u1ee5ng nhi\u1ec1u chi\u1ebfn thu\u1eadt kh\u00e1c nhau, ch\u1eb3ng h\u1ea1n nh\u01b0 g\u1ecdi \u0111i\u1ec7n l\u1ea1nh, email l\u1eeba \u0111\u1ea3o ho\u1eb7c l\u00e2y nhi\u1ec5m thi\u1ebft b\u1ecb c\u1ee7a n\u1ea1n nh\u00e2n b\u1eb1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i. M\u1ee5c ti\u00eau cu\u1ed1i c\u00f9ng l\u00e0 tr\u00edch xu\u1ea5t th\u00f4ng tin nh\u1ea1y c\u1ea3m ho\u1eb7c t\u00e0i nguy\u00ean t\u00e0i ch\u00ednh t\u1eeb m\u1ee5c ti\u00eau c\u1ee7a h\u1ecd. \u0110i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i nh\u1eadn th\u1ee9c \u0111\u01b0\u1ee3c nh\u1eefng tr\u00f2 l\u1eeba \u0111\u1ea3o n\u00e0y v\u00e0 b\u1ea3o v\u1ec7 th\u00f4ng tin c\u00e1 nh\u00e2n v\u00e0 t\u00e0i s\u1ea3n t\u00e0i ch\u00ednh c\u1ee7a b\u1ea1n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"commonnbsptacticsnbspusednbspbynbspscammers\"><strong>C\u00e1c chi\u1ebfn thu\u1eadt ph\u1ed5 bi\u1ebfn \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi k\u1ebb l\u1eeba \u0111\u1ea3o<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/tech-support-scams-Common-tactics-used-by-scammers-1.jpg\" alt=\"C\u00e1c chi\u1ebfn thu\u1eadt ph\u1ed5 bi\u1ebfn \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi k\u1ebb l\u1eeba \u0111\u1ea3o\" class=\"wp-image-1407\"\/><\/figure>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111ang tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n, ch\u00fang th\u01b0\u1eddng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n th\u00f4ng qua c\u00e1c k\u1ef9 thu\u1eadt k\u1ef9 thu\u1eadt x\u00e3 h\u1ed9i nh\u01b0 g\u1ecdi \u0111i\u1ec7n l\u1ea1nh v\u00e0 email l\u1eeba \u0111\u1ea3o. Nh\u1eefng tr\u00f2 l\u1eeba \u0111\u1ea3o n\u00e0y c\u0169ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1c chi\u1ebfn thu\u1eadt h\u00f9 d\u1ecda, ch\u1eb3ng h\u1ea1n nh\u01b0 tuy\u00ean b\u1ed1 sai r\u1eb1ng m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n b\u1ecb x\u00e2m ph\u1ea1m r\u1ed3i \u0111\u1ec1 ngh\u1ecb \u201ch\u1ed7 tr\u1ee3\u201d c\u1ee7a h\u1ecd v\u1edbi m\u1ed9t m\u1ee9c gi\u00e1.<\/p>\n\n\n\n<p>Sau \u0111\u00e2y l\u00e0 c\u00e1c chi\u1ebfn l\u01b0\u1ee3c h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ph\u1ed5 bi\u1ebfn nh\u1ea5t:<\/p>\n\n\n\n<p><strong>G\u1ecdi \u0111i\u1ec7n l\u1ea1nh: <\/strong>M\u1ed9t trong nh\u1eefng chi\u1ebfn thu\u1eadt ph\u1ed5 bi\u1ebfn nh\u1ea5t \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt l\u00e0 g\u1ecdi \u0111i\u1ec7n l\u1ea1nh.<\/p>\n\n\n\n<p>\u0110i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng c\u00e1ch g\u1ecdi \u0111i\u1ec7n cho m\u1ecdi ng\u01b0\u1eddi m\u1ed9t c\u00e1ch ng\u1eabu nhi\u00ean, th\u01b0\u1eddng n\u00f3i r\u1eb1ng h\u1ecd \u0111\u1ebfn t\u1eeb m\u1ed9t c\u00f4ng ty c\u00f4ng ngh\u1ec7 ho\u1eb7c nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 th\u1ef1c s\u1ef1, v\u00e0 c\u1ed1 g\u1eafng thuy\u1ebft ph\u1ee5c h\u1ecd r\u1eb1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ho\u1eb7c ph\u1ea7n m\u1ec1m x\u1ea5u kh\u00e1c \u0111ang c\u00f3 tr\u00ean m\u00e1y t\u00ednh c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p>Sau \u0111\u00f3, h\u1ecd s\u1ebd \u0111\u1ec1 ngh\u1ecb s\u1eeda ch\u1eefa v\u1ea5n \u0111\u1ec1 v\u1edbi m\u1ed9t kho\u1ea3n ph\u00ed.<\/p>\n\n\n\n<p><strong>Qu\u1ea3ng c\u00e1o Pop-up: <\/strong>M\u1ed9t chi\u1ebfn thu\u1eadt kh\u00e1c \u0111\u01b0\u1ee3c nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt s\u1eed d\u1ee5ng l\u00e0 b\u1eadt l\u00ean qu\u1ea3ng c\u00e1o tr\u00ean c\u00e1c trang web ho\u1eb7c trong c\u00e1c \u1ee9ng d\u1ee5ng.<\/p>\n\n\n\n<p>Nh\u1eefng qu\u1ea3ng c\u00e1o n\u00e0y c\u00f3 th\u1ec3 tr\u00f4ng gi\u1ed1ng nh\u01b0 c\u1ea3nh b\u00e1o b\u1ea3o m\u1eadt gi\u1ea3 ho\u1eb7c th\u00f4ng b\u00e1o r\u1eb1ng c\u00f3 virus tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. H\u1ecd s\u1ebd y\u00eau c\u1ea7u b\u1ea1n g\u1ecdi m\u1ed9t s\u1ed1 trong qu\u1ea3ng c\u00e1o \u0111\u1ec3 \u0111\u01b0\u1ee3c gi\u00fap \u0111\u1ee1 lo\u1ea1i b\u1ecf virus.<\/p>\n\n\n\n<p><strong>Email l\u1eeba \u0111\u1ea3o<\/strong>: Email l\u1eeba \u0111\u1ea3o l\u00e0 m\u1ed9t c\u00e1ch kh\u00e1c m\u00e0 nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt c\u1ed1 g\u1eafng truy c\u1eadp v\u00e0o th\u00f4ng tin c\u00e1 nh\u00e2n v\u00e0 ti\u1ec1n t\u1eeb nh\u1eefng n\u1ea1n nh\u00e2n kh\u00f4ng nghi ng\u1edd.<\/p>\n\n\n\n<p>H\u1ea7u h\u1ebft th\u1eddi gian, c\u00e1c li\u00ean k\u1ebft trong nh\u1eefng email n\u00e0y d\u1eabn m\u1ecdi ng\u01b0\u1eddi \u0111\u1ebfn c\u00e1c trang web x\u1ea5u n\u01a1i h\u1ecd \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u cung c\u1ea5p th\u00f4ng tin nh\u1ea1y c\u1ea3m nh\u01b0 s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng ho\u1eb7c m\u1eadt kh\u1ea9u.<\/p>\n\n\n\n<p><strong>Ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt gi\u1ea3: <\/strong>Nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt c\u0169ng c\u00f3 th\u1ec3 c\u1ed1 g\u1eafng khi\u1ebfn m\u1ecdi ng\u01b0\u1eddi t\u1ea3i xu\u1ed1ng ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt gi\u1ea3 b\u1eb1ng c\u00e1ch n\u00f3i r\u1eb1ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd b\u1ecb nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 c\u1ea7n \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda kh\u00e1c.<\/p>\n\n\n\n<p>Ph\u1ea7n m\u1ec1m t\u1ef1 n\u00f3 c\u00f3 th\u1ec3 ch\u1ee9a m\u00e3 \u0111\u1ed9c h\u1ea1i, c\u00f3 th\u1ec3 g\u00e2y h\u1ea1i cho h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n h\u01a1n n\u1eefa. <\/p>\n\n\n\n<p><strong>T\u1ea5n c\u00f4ng k\u1ef9 thu\u1eadt x\u00e3 h\u1ed9i: <\/strong>T\u1ea5n c\u00f4ng k\u1ef9 thu\u1eadt x\u00e3 h\u1ed9i li\u00ean quan \u0111\u1ebfn vi\u1ec7c s\u1eed d\u1ee5ng c\u00e1c k\u1ef9 thu\u1eadt thao t\u00fang t\u00e2m l\u00fd nh\u01b0 t\u1ea1o ra s\u1ef1 s\u1ee3 h\u00e3i ho\u1eb7c kh\u1ea9n c\u1ea5p \u0111\u1ec3 thuy\u1ebft ph\u1ee5c ai \u0111\u00f3 t\u1eeb b\u1ecf th\u00f4ng tin b\u1ea3o m\u1eadt ho\u1eb7c th\u1ef1c hi\u1ec7n c\u00e1c h\u00e0nh \u0111\u1ed9ng nh\u1ea5t \u0111\u1ecbnh (ch\u1eb3ng h\u1ea1n nh\u01b0 tr\u1ea3 ti\u1ec1n).<\/p>\n\n\n\n<p>V\u00ed d\u1ee5, m\u1ed9t k\u1ebb l\u1eeba \u0111\u1ea3o c\u00f3 th\u1ec3 tuy\u00ean b\u1ed1 r\u1eb1ng m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n c\u1ea7n s\u1eeda ch\u1eefa kh\u1ea9n c\u1ea5p do nhi\u1ec5m virus, nh\u01b0ng h\u1ecd ph\u1ea3i \u0111\u01b0\u1ee3c tr\u1ea3 ti\u1ec1n tr\u01b0\u1edbc khi c\u00f4ng vi\u1ec7c c\u00f3 th\u1ec3 b\u1eaft \u0111\u1ea7u. <\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tech-support-scams\"><strong>B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt<\/strong><\/h2>\n\n\n<p>L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt l\u00e0 m\u1ed9t v\u1ea5n \u0111\u1ec1 ng\u00e0y c\u00e0ng gia t\u0103ng trong th\u1eddi \u0111\u1ea1i k\u1ef9 thu\u1eadt s\u1ed1, v\u00e0 \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i nh\u1eadn th\u1ee9c \u0111\u01b0\u1ee3c nh\u1eefng tr\u00f2 l\u1eeba \u0111\u1ea3o n\u00e0y v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi ch\u00fang. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 m\u1eb9o \u0111\u1ec3 tr\u00e1nh l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u0110\u1eebng cung c\u1ea5p th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c truy c\u1eadp m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 kh\u00f4ng x\u00e1c minh danh t\u00ednh c\u1ee7a ng\u01b0\u1eddi li\u00ean h\u1ec7 v\u1edbi b\u1ea1n tr\u01b0\u1edbc.<\/li>\n\n\n\n<li>H\u00e3y c\u1ea3nh gi\u00e1c v\u1edbi c\u00e1c email, cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i ho\u1eb7c tin nh\u1eafn v\u0103n b\u1ea3n kh\u00f4ng \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u tuy\u00ean b\u1ed1 r\u1eb1ng c\u00f3 v\u1ea5n \u0111\u1ec1 v\u1edbi thi\u1ebft b\u1ecb ho\u1eb7c t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n.<\/li>\n\n\n\n<li>\u0110\u1eebng nh\u1ea5p v\u00e0o c\u00e1c li\u00ean k\u1ebft trong email \u0111\u00e1ng ng\u1edd ho\u1eb7c t\u1ea3i xu\u1ed1ng t\u1ec7p \u0111\u00ednh k\u00e8m tr\u1eeb khi b\u1ea1n ch\u1eafc ch\u1eafn ch\u00fang l\u00e0 h\u1ee3p ph\u00e1p.<\/li>\n\n\n\n<li>N\u1ebfu ai \u0111\u00f3 li\u00ean h\u1ec7 v\u1edbi b\u1ea1n tuy\u00ean b\u1ed1 l\u00e0 t\u1eeb m\u1ed9t c\u00f4ng ty uy t\u00edn nh\u01b0 Microsoft, Apple, Google, v.v., h\u00e3y c\u00fap m\u00e1y v\u00e0 li\u00ean h\u1ec7 tr\u1ef1c ti\u1ebfp v\u1edbi c\u00f4ng ty s\u1eed d\u1ee5ng s\u1ed1 d\u1ecbch v\u1ee5 kh\u00e1ch h\u00e0ng ch\u00ednh th\u1ee9c \u0111\u01b0\u1ee3c li\u1ec7t k\u00ea tr\u00ean trang web c\u1ee7a h\u1ecd thay v\u00ec s\u1eed d\u1ee5ng b\u1ea5t k\u1ef3 s\u1ed1 n\u00e0o \u0111\u01b0\u1ee3c cung c\u1ea5p b\u1edfi ng\u01b0\u1eddi g\u1ecdi.<\/li>\n\n\n\n<li>H\u1ecfi v\u1ec1 ng\u01b0\u1eddi m\u00e0 h\u1ecd l\u00e0m vi\u1ec7c cho tr\u01b0\u1edbc khi cung c\u1ea5p b\u1ea5t k\u1ef3 th\u00f4ng tin n\u00e0o v\u1ec1 b\u1ea3n th\u00e2n ho\u1eb7c cho ph\u00e9p h\u1ecd truy c\u1eadp t\u1eeb xa v\u00e0o h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.<\/li>\n\n\n\n<li>Tin t\u01b0\u1edfng v\u00e0o b\u1ea3n n\u0103ng c\u1ee7a b\u1ea1n v\u00e0 \u0111\u1eebng cung c\u1ea5p b\u1ea5t k\u1ef3 th\u00f4ng tin c\u00e1 nh\u00e2n n\u00e0o cho \u0111\u1ebfn khi b\u1ea1n \u0111\u00e3 x\u00e1c minh danh t\u00ednh c\u1ee7a h\u1ecd tr\u01b0\u1edbc.<\/li>\n\n\n\n<li>H\u00e3y c\u00fap m\u00e1y ngay l\u1eadp t\u1ee9c n\u1ebfu ai \u0111\u00f3 c\u1ed1 g\u1eafng g\u00e2y \u00e1p l\u1ef1c bu\u1ed9c b\u1ea1n ph\u1ea3i cung c\u1ea5p d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m nh\u01b0 m\u1eadt kh\u1ea9u ho\u1eb7c s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng qua \u0111i\u1ec7n tho\u1ea1i m\u00e0 kh\u00f4ng x\u00e1c nh\u1eadn h\u1ecd l\u00e0 ai tr\u01b0\u1edbc.<\/li>\n\n\n\n<li>Nh\u1eadn ra c\u00e1c email v\u00e0 cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i \u0111\u00e1ng ng\u1edd b\u1eb1ng c\u00e1ch ch\u00fa \u00fd \u0111\u1ebfn c\u00e1c d\u1ea5u hi\u1ec7u \u0111\u1ecf nh\u01b0 li\u00ean h\u1ec7 kh\u00f4ng \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u, y\u00eau c\u1ea7u kh\u1ea9n c\u1ea5p v\u1ec1 th\u00f4ng tin c\u00e1 nh\u00e2n, h\u1ee9a h\u1eb9n d\u1ecbch v\u1ee5 ho\u1eb7c s\u1ea3n ph\u1ea9m mi\u1ec5n ph\u00ed \u0111\u1ec3 \u0111\u1ed5i l\u1ea5y thanh to\u00e1n tr\u01b0\u1edbc, v\u00e0 \u0111e d\u1ecda h\u00e0nh \u0111\u1ed9ng ph\u00e1p l\u00fd n\u1ebfu thanh to\u00e1n kh\u00f4ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n nhanh ch\u00f3ng. <\/li>\n\n\n\n<li>Ch\u00fa \u00fd \u0111\u1ebfn l\u1ed7i ch\u00ednh t\u1ea3 v\u00e0 ng\u1eef ph\u00e1p, \u0111i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 ch\u1ec9 ra r\u1eb1ng email kh\u00f4ng ph\u1ea3i l\u00e0 ch\u00ednh h\u00e3ng.<\/li>\n<\/ul>\n\n\n\n<p>B\u1eb1ng c\u00e1ch th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc n\u00e0y, b\u1ea1n c\u00f3 th\u1ec3 tr\u00e1nh tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt v\u00e0 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi gian l\u1eadn.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"reporting-tech-support-scams\"><strong>B\u00e1o c\u00e1o l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt<\/strong><\/h2>\n\n\n<p>N\u1ebfu b\u1ea1n t\u00ecnh c\u1edd g\u1eb7p ph\u1ea3i m\u1ed9t tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i c\u1ea3nh gi\u00e1c v\u00e0 h\u00e0nh \u0111\u1ed9ng \u0111\u1ec3 ng\u0103n ng\u01b0\u1eddi kh\u00e1c tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a t\u1ed9i ph\u1ea1m n\u00e0y. Th\u1eadt kh\u00f4ng may, m\u1ed9t s\u1ed1 ng\u01b0\u1eddi \u0111\u00e3 m\u1ea5t t\u1ea5t c\u1ea3 ti\u1ec1n ti\u1ebft ki\u1ec7m c\u1ee7a h\u1ecd do h\u1eadu qu\u1ea3 c\u1ee7a tr\u00f2 l\u1eeba \u0111\u1ea3o kh\u1ee7ng khi\u1ebfp n\u00e0y. \u0110\u1ec3 gi\u00fap ch\u1ed1ng l\u1ea1i v\u1ea5n \u0111\u1ec1 n\u00e0y, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 b\u1ea1n ph\u1ea3i b\u00e1o c\u00e1o b\u1ea5t k\u1ef3 tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt n\u00e0o b\u1ea1n g\u1eb7p ph\u1ea3i. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 b\u01b0\u1edbc b\u1ea1n c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n \u0111\u1ec3 b\u00e1o c\u00e1o m\u1ed9t tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>B\u00e1o c\u00e1o gian l\u1eadn tr\u1ef1c tuy\u1ebfn v\u00e0 n\u1ed7 l\u1ef1c l\u1eeba \u0111\u1ea3o<\/strong>: N\u1ebfu b\u1ea1n nghi ng\u1edd m\u1ed9t email ho\u1eb7c trang web l\u00e0 m\u1ed9t ph\u1ea7n c\u1ee7a tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt, h\u00e3y b\u00e1o c\u00e1o n\u00f3 cho c\u01a1 quan th\u1ef1c thi ph\u00e1p lu\u1eadt \u0111\u1ecba ph\u01b0\u01a1ng c\u1ee7a b\u1ea1n ho\u1eb7c \u1ee6y ban Th\u01b0\u01a1ng m\u1ea1i Li\u00ean bang (<a href=\"https:\/\/www.ftc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">FTC<\/a>). (FTC c\u0169ng cung c\u1ea5p c\u00e1c t\u00e0i nguy\u00ean cho n\u1ea1n nh\u00e2n c\u1ee7a h\u00e0nh vi tr\u1ed9m c\u1eafp danh t\u00ednh tr\u00ean trang web c\u1ee7a h\u1ecd).<\/li>\n\n\n\n<li><strong>B\u00e1o c\u00e1o cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i v\u00e0 tin nh\u1eafn v\u0103n b\u1ea3n<\/strong>: N\u1ebfu b\u1ea1n nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i ho\u1eb7c tin nh\u1eafn v\u0103n b\u1ea3n t\u1eeb ai \u0111\u00f3 tuy\u00ean b\u1ed1 l\u00e0 t\u1eeb h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt, h\u00e3y c\u00fap m\u00e1y ngay l\u1eadp t\u1ee9c v\u00e0 li\u00ean h\u1ec7 v\u1edbi nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 di \u0111\u1ed9ng c\u1ee7a b\u1ea1n.<\/li>\n\n\n\n<li><strong>B\u00e1o c\u00e1o c\u00e1c kho\u1ea3n ph\u00ed kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p<\/strong>: N\u1ebfu b\u1ea1n ph\u00e1t hi\u1ec7n c\u00e1c kho\u1ea3n ph\u00ed kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p tr\u00ean b\u1ea3ng sao k\u00ea th\u1ebb t\u00edn d\u1ee5ng ho\u1eb7c t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng c\u1ee7a m\u00ecnh do m\u1ed9t tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt, h\u00e3y li\u00ean h\u1ec7 ngay l\u1eadp t\u1ee9c v\u1edbi t\u1ed5 ch\u1ee9c t\u00e0i ch\u00ednh c\u1ee7a b\u1ea1n. C\u1ed1 g\u1eafng l\u1ea5y b\u1eb1ng ch\u1ee9ng mua h\u00e0ng, ch\u1eb3ng h\u1ea1n nh\u01b0 s\u1ed1 h\u00f3a \u0111\u01a1n, \u0111\u1ec3 gi\u00fap \u0111i\u1ec1u tra.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"staying-safe-online\"><strong>Gi\u1eef an to\u00e0n tr\u1ef1c tuy\u1ebfn <\/strong><\/h2>\n\n\n<p>C\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng nh\u01b0 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111\u1eb7t ra m\u1ed9t r\u1ee7i ro \u0111\u00e1ng k\u1ec3, v\u00ec v\u1eady \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i b\u1ea3o v\u1ec7 thi\u1ebft b\u1ecb v\u00e0 t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 th\u1ef1c ti\u1ec5n t\u1ed1t nh\u1ea5t \u0111\u1ec3 gi\u1eef an to\u00e0n tr\u1ef1c tuy\u1ebfn:<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"securing-devices-and-accounts\">B\u1ea3o m\u1eadt thi\u1ebft b\u1ecb v\u00e0 t\u00e0i kho\u1ea3n<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Gi\u1eef t\u1ea5t c\u1ea3 c\u00e1c thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i internet, ch\u1eb3ng h\u1ea1n nh\u01b0 m\u00e1y t\u00ednh, \u0111i\u1ec7n tho\u1ea1i v\u00e0 m\u00e1y t\u00ednh b\u1ea3ng, \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt v\u1edbi c\u00e1c b\u1ea3n v\u00e1 b\u1ea3o m\u1eadt m\u1edbi nh\u1ea5t.<\/li>\n\n\n\n<li>C\u00e0i \u0111\u1eb7t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus \u0111\u00e1ng tin c\u1eady v\u00e0 t\u01b0\u1eddng l\u1eeda tr\u00ean m\u1ed7i thi\u1ebft b\u1ecb \u0111\u1ec3 b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i.<\/li>\n\n\n\n<li>K\u00edch ho\u1ea1t x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 b\u1ea5t c\u1ee9 khi n\u00e0o c\u00f3 th\u1ec3 \u0111\u1ec3 t\u0103ng c\u01b0\u1eddng b\u1ea3o v\u1ec7.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"creating-strong-passwords\">T\u1ea1o m\u1eadt kh\u1ea9u m\u1ea1nh<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Khi t\u1ea1o m\u1eadt kh\u1ea9u, h\u00e3y \u0111\u1ea3m b\u1ea3o ch\u00fang m\u1ea1nh v\u00e0 kh\u00f4ng th\u1ec3 d\u1ec5 d\u00e0ng \u0111o\u00e1n \u0111\u01b0\u1ee3c.<\/li>\n\n\n\n<li>S\u1eed d\u1ee5ng k\u1ebft h\u1ee3p c\u00e1c ch\u1eef c\u00e1i vi\u1ebft hoa, ch\u1eef c\u00e1i vi\u1ebft th\u01b0\u1eddng, s\u1ed1 v\u00e0 k\u00fd hi\u1ec7u \u0111\u1ec3 t\u1ea1o m\u1eadt kh\u1ea9u \u0111\u1ed9c \u0111\u00e1o.<\/li>\n\n\n\n<li>C\u00e2n nh\u1eafc s\u1eed d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u \u0111\u1ec3 t\u1ea1o v\u00e0 l\u01b0u tr\u1eef an to\u00e0n m\u1eadt kh\u1ea9u ng\u1eabu nhi\u00ean.<\/li>\n<\/ul>\n\n\n\n<p>Lu\u00f4n c\u1eadp nh\u1eadt v\u00e0 nh\u1eadn th\u1ee9c v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n v\u1eabn an to\u00e0n. T\u1eadn d\u1ee5ng c\u00e1c t\u00e0i nguy\u00ean c\u00f3 s\u1eb5n \u0111\u1ec3 t\u00ecm hi\u1ec3u th\u00eam v\u1ec1 an to\u00e0n m\u1ea1ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"resources-for-learning-more-about-cybersecurity-and-safety-online\"><strong>T\u00e0i nguy\u00ean \u0111\u1ec3 t\u00ecm hi\u1ec3u th\u00eam v\u1ec1 an ninh m\u1ea1ng v\u00e0 an to\u00e0n tr\u1ef1c tuy\u1ebfn<\/strong><\/h2>\n\n\n<p>Ch\u00ednh ph\u1ee7 Hoa K\u1ef3 cung c\u1ea5p m\u1ed9t s\u1ed1 t\u00e0i nguy\u00ean \u0111\u1ec3 gi\u00fap c\u00e1c c\u00e1 nh\u00e2n t\u00ecm hi\u1ec3u v\u1ec1 an ninh m\u1ea1ng v\u00e0 an to\u00e0n tr\u1ef1c tuy\u1ebfn. B\u1ed9 An ninh N\u1ed9i \u0111\u1ecba cung c\u1ea5p chi\u1ebfn d\u1ecbch <a href=\"https:\/\/www.stopthinkconnect.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">D\u1eebngL\u1ea1iSuyNgh\u0129K\u1ebftN\u1ed1i<\/a> , n\u00e2ng cao nh\u1eadn th\u1ee9c c\u00f4ng ch\u00fang v\u1ec1 c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng v\u00e0 cung c\u1ea5p c\u00e1c m\u1eb9o v\u1ec1 an to\u00e0n. S\u00e1ng ki\u1ebfn <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month#:~:text=Since%202004%2C%20the%20President%20of,confidential%20data%20become%20more%20commonplace.\" target=\"_blank\" rel=\"noreferrer noopener\">Th\u00e1ng Nh\u1eadn th\u1ee9c An ninh m\u1ea1ng Qu\u1ed1c gia<\/a> \u0111\u01b0\u1ee3c t\u1ed5 ch\u1ee9c v\u00e0o th\u00e1ng 10 h\u00e0ng n\u0103m, gi\u00e1o d\u1ee5c c\u00f4ng d\u00e2n v\u1ec1 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"professional-organizations-dedicated-to-cybersecurity-education-and-research\">C\u00e1c t\u1ed5 ch\u1ee9c chuy\u00ean nghi\u1ec7p d\u00e0nh ri\u00eang cho gi\u00e1o d\u1ee5c v\u00e0 nghi\u00ean c\u1ee9u an ninh m\u1ea1ng<\/h3>\n\n\n<p>Hi\u1ec7p h\u1ed9i Ki\u1ec3m to\u00e1n v\u00e0 Ki\u1ec3m so\u00e1t H\u1ec7 th\u1ed1ng Th\u00f4ng tin (<a href=\"https:\/\/www.isaca.org\/\">ISACA<\/a>) l\u00e0 m\u1ed9t t\u1ed5 ch\u1ee9c phi l\u1ee3i nhu\u1eadn to\u00e0n c\u1ea7u cung c\u1ea5p h\u01b0\u1edbng d\u1eabn v\u1ec1 c\u00e1c th\u1ef1c ti\u1ec5n t\u1ed1t nh\u1ea5t cho qu\u1ea3n l\u00fd an ninh th\u00f4ng tin, \u0111\u00e1nh gi\u00e1 r\u1ee7i ro, k\u1ef9 thu\u1eadt ki\u1ec3m to\u00e1n, ti\u00eau chu\u1ea9n tu\u00e2n th\u1ee7, bi\u1ec7n ph\u00e1p b\u1ea3o v\u1ec7 quy\u1ec1n ri\u00eang t\u01b0 v\u00e0 c\u00f4ng c\u1ee5 ph\u00e2n t\u00edch d\u1eef li\u1ec7u. H\u1ecd c\u0169ng cung c\u1ea5p c\u00e1c chi\u1ebfn l\u01b0\u1ee3c ph\u1ea3n \u1ee9ng s\u1ef1 c\u1ed1 th\u00f4ng qua c\u00e1c \u1ea5n ph\u1ea9m c\u1ee7a h\u1ecd v\u00e0 ch\u01b0\u01a1ng tr\u00ecnh ch\u1ee9ng nh\u1eadn Ki\u1ec3m to\u00e1n vi\u00ean H\u1ec7 th\u1ed1ng Th\u00f4ng tin Ch\u1ee9ng nh\u1eadn.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u1ebft lu\u1eadn<\/strong><\/h2>\n\n\n<p>L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111e d\u1ecda an ninh th\u00f4ng tin k\u1ef9 thu\u1eadt s\u1ed1 c\u1ee7a ch\u00fang ta. \u0110\u1ec3 t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh, ch\u00fang ta ph\u1ea3i lu\u00f4n nh\u1eadn th\u1ee9c v\u1ec1 an ninh m\u1ea1ng, \u0111\u1ea7u t\u01b0 v\u00e0o ph\u1ea7n m\u1ec1m ch\u1ed1ng virus v\u00e0 duy tr\u00ec m\u00e1y t\u00ednh c\u1ee7a ch\u00fang ta \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt. B\u1eb1ng c\u00e1ch th\u1ef1c hi\u1ec7n c\u00e1c th\u1ee7 t\u1ee5c n\u00e0y, ch\u00fang ta c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt v\u00e0 duy tr\u00ec an ninh internet. H\u00e3y ki\u1ec3m so\u00e1t an ninh m\u1ea1ng c\u1ee7a b\u1ea1n ngay l\u1eadp t\u1ee9c v\u00e0 b\u1eaft \u0111\u1ea7u b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"faqs\"><strong>C\u00e2u h\u1ecfi th\u01b0\u1eddng g\u1eb7p<\/strong><\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1676323085725\"><strong class=\"schema-faq-question\">L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o?<\/strong> <p class=\"schema-faq-answer\">Nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt gi\u1ea3 danh l\u00e0 \u0111\u1ea1i di\u1ec7n t\u1eeb c\u00e1c c\u00f4ng ty n\u1ed5i ti\u1ebfng, ch\u1eb3ng h\u1ea1n nh\u01b0 Microsoft ho\u1eb7c Apple, v\u00e0 c\u1ed1 g\u1eafng truy c\u1eadp v\u00e0o m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n. H\u1ecd c\u00f3 th\u1ec3 y\u00eau c\u1ea7u thanh to\u00e1n ho\u1eb7c c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i m\u1ed9t khi h\u1ecd c\u00f3 quy\u1ec1n truy c\u1eadp.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323342074\"><strong class=\"schema-faq-question\">L\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 t\u00f4i b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt?<\/strong> <p class=\"schema-faq-answer\">\u0110\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt, \u0111\u1eebng bao gi\u1edd cung c\u1ea5p th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c chi ti\u1ebft thanh to\u00e1n qua \u0111i\u1ec7n tho\u1ea1i ho\u1eb7c tr\u1ef1c tuy\u1ebfn. \u0110\u1eebng nh\u1ea5p v\u00e0o c\u00e1c li\u00ean k\u1ebft t\u1eeb email ho\u1eb7c trang web \u0111\u00e1ng ng\u1edd. N\u1ebfu b\u1ea1n ngh\u0129 r\u1eb1ng m\u00e1y t\u00ednh c\u1ee7a m\u00ecnh \u0111\u00e3 b\u1ecb nhi\u1ec5m, h\u00e3y ch\u1ea1y qu\u00e9t ch\u1ed1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 x\u00f3a b\u1ea5t k\u1ef3 t\u1ec7p \u0111\u1ed9c h\u1ea1i n\u00e0o \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y. Gi\u1eef t\u1ea5t c\u1ea3 ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt \u0111\u1ec3 ph\u00e1t hi\u1ec7n v\u00e0 lo\u1ea1i b\u1ecf m\u1ed1i \u0111e d\u1ecda t\u1ed1t h\u01a1n.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323372090\"><strong class=\"schema-faq-question\">Nh\u1eefng tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ph\u1ed5 bi\u1ebfn l\u00e0 g\u00ec?<\/strong> <p class=\"schema-faq-answer\">Nh\u1eefng tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ph\u1ed5 bi\u1ebfn li\u00ean quan \u0111\u1ebfn t\u1ed9i ph\u1ea1m gi\u1ea3 danh l\u00e0 \u0111\u1ea1i di\u1ec7n h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt h\u1ee3p ph\u00e1p v\u00e0 s\u1eed d\u1ee5ng c\u00e1c chi\u1ebfn thu\u1eadt nh\u01b0 g\u1ecdi \u0111i\u1ec7n l\u1ea1nh, tin nh\u1eafn pop-up v\u00e0 trang web gi\u1ea3 \u0111\u1ec3 truy c\u1eadp v\u00e0o th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c ti\u1ec1n.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323467317\"><strong class=\"schema-faq-question\">L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111\u1ebfn t\u1eeb \u0111\u00e2u?<\/strong> <p class=\"schema-faq-answer\">L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111\u1ebfn t\u1eeb c\u00e1c trang web \u0111\u1ed9c h\u1ea1i, email l\u1eeba \u0111\u1ea3o v\u00e0 cu\u1ed9c g\u1ecdi l\u1ea1nh. Nh\u1eefng k\u1ebb l\u1eeba \u0111\u1ea3o c\u00f3 th\u1ec3 t\u1ea1o ra c\u00e1c trang web gi\u1ea3, g\u1eedi email h\u00e0ng lo\u1ea1t ho\u1eb7c g\u1ecdi tr\u1ef1c ti\u1ebfp cho ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng nghi ng\u1edd, tuy\u00ean b\u1ed1 r\u1eb1ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd b\u1ecb nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i.<\/p> <\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Kh\u00f4ng c\u00f3 g\u00ec b\u00ed m\u1eadt khi Internet c\u00f3 th\u1ec3 l\u00e0 m\u1ed9t n\u01a1i nguy hi\u1ec3m. \u0110\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n, b\u1ea1n c\u1ea7n bi\u1ebft nh\u1eefng g\u00ec \u0111ang di\u1ec5n ra v\u00e0 c\u00e1ch ch\u00fang c\u00f3 th\u1ec3 nh\u1eafm v\u00e0o b\u1ea1n; l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/lua-dao\/lua-dao-ho-tro-ky-thuat\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1380,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Yourself From Tech Support Scams - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/lua-dao\/lua-dao-ho-tro-ky-thuat\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Yourself From Tech Support Scams - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/lua-dao\/lua-dao-ho-tro-ky-thuat\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T21:43:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tech support scams\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"wordCount\":1537,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"articleSection\":[\"scams\"],\"inLanguage\":\"vi\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"name\":\"Protect Yourself From Tech Support Scams - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"description\":\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\"}],\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Tech support scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech support scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"name\":\"How do tech support scams work?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"name\":\"How do I protect myself from tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"name\":\"What are common tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"name\":\"Where do tech support scams come from?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt - Securitybriefing.net","description":"Gi\u1eef an to\u00e0n tr\u1ef1c tuy\u1ebfn v\u00e0 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt v\u1edbi h\u01b0\u1edbng d\u1eabn an ninh m\u1ea1ng to\u00e0n di\u1ec7n n\u00e0y.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/lua-dao\/lua-dao-ho-tro-ky-thuat\/","og_locale":"vi_VN","og_type":"article","og_title":"Protect Yourself From Tech Support Scams - Securitybriefing.net","og_description":"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.","og_url":"https:\/\/securitybriefing.net\/vi\/lua-dao\/lua-dao-ho-tro-ky-thuat\/","og_site_name":"Security Briefing","article_published_time":"2023-02-13T21:43:54+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"8 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tech support scams","datePublished":"2023-02-13T21:43:54+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"wordCount":1537,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","articleSection":["scams"],"inLanguage":"vi"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","name":"B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","datePublished":"2023-02-13T21:43:54+00:00","description":"Gi\u1eef an to\u00e0n tr\u1ef1c tuy\u1ebfn v\u00e0 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt v\u1edbi h\u01b0\u1edbng d\u1eabn an ninh m\u1ea1ng to\u00e0n di\u1ec7n n\u00e0y.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317"}],"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","width":662,"height":327,"caption":"Tech support scams"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tech support scams"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","position":1,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","name":"L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","position":2,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","name":"L\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 t\u00f4i b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","position":3,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","name":"Nh\u1eefng tr\u00f2 l\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt ph\u1ed5 bi\u1ebfn l\u00e0 g\u00ec?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","position":4,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","name":"L\u1eeba \u0111\u1ea3o h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt \u0111\u1ebfn t\u1eeb \u0111\u00e2u?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.","inLanguage":"vi"},"inLanguage":"vi"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1378"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1380"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}