Learn

    Before you respond

    Tech support messages and calls

    Learn how tech support scams work, what warning signs to watch for, and what to do before calling a number or giving remote access.

    Reviewed May 14, 2026

    Quick answer

    A tech support message or call may be a scam if it says your device is infected and tells you to call a number, download software, or give remote access.

    Close the message, stop the call, and contact the company through the official app or website if you need help.

    What it may look like

    "Microsoft security alert: your computer is infected. Call this number now and let the technician connect remotely."

    Signs to slow down

    • A pop-up, text, email, or caller says your device is infected or locked.
    • You are told to call a number shown in the warning.
    • Someone asks you to install remote access software or share your screen.
    • They ask for payment, gift cards, crypto, or account login details to fix the problem.

    What to do next

    • Do not call the number in a pop-up or message.
    • Do not install remote access software for someone who contacted you unexpectedly.
    • Close the browser tab or restart the device if the message will not go away.
    • Contact the company through its official support site if you need help.
    • If you gave remote access or payment information, contact your bank and change affected passwords.

    How Olevo can help

    Olevo can give you a calm second opinion before you respond.

    Trusted sources

    Related examples

    Common questions

    Will a real security warning tell me to call a phone number?

    Be careful. Real companies usually do not use sudden pop-ups to tell you to call a number for urgent support.

    Is remote access always unsafe?

    Remote access can be legitimate when you request help from a company you trust, but it is risky when someone unexpected asks for it.

    What if I already let someone connect?

    Disconnect from the internet, contact your bank if money or accounts were involved, and change passwords from a different trusted device.