They can create scenarios that the victim's computer is infected with viruses, experiencing security breaches, or facing legal issues.Ģ. They may pose as support agents, government officials, or employees from reputable firms to gain credibility. Initial Contact: Scammers initiate the process through various means, such as phone calls, emails, pop-up messages, or even social media. They can use your identity or manipulate your information as they want.ĪnyDesk scams usually involve social manipulation tactics to deceive and convince users into granting remote access or the unique pin.ġ. Regardless of which remote access software you use, a slight negligence can give scammers complete control of your computer.