Back to Blog
Phone Scams
4 min read

Tech Support Scams: Why Microsoft Will Never Call You

Tech support scams trick people into paying for fake computer repairs. Learn how these scams work, what they want, and how to protect yourself and your family.

ScamShield Team
|March 9, 2026

Your phone rings. The caller says they're from Microsoft, and they've detected a virus on your computer. They sound professional, maybe even a little worried for you. They ask you to open your computer so they can "help you fix it."

Here's the truth: Microsoft will never call you. Neither will Apple, Google, or any other tech company. That call is a scam, and if you follow their instructions, you could lose hundreds or thousands of dollars — and hand a stranger full access to your computer.

How Tech Support Scams Work

Tech support scams come in several flavors, but they all follow the same basic script:

The Cold Call

You receive an unsolicited phone call from someone claiming to be from Microsoft, Apple, Norton, or your internet provider. They tell you your computer has a virus, has been hacked, or is "sending error reports." They sound urgent and knowledgeable.

The Pop-Up Warning

You're browsing the internet and suddenly a full-screen alert appears: "YOUR COMPUTER HAS BEEN INFECTED. CALL THIS NUMBER IMMEDIATELY." The pop-up might play an alarm sound, lock your browser, or display a fake "Microsoft" logo. It looks terrifying — and that's the point.

The Email Alert

You receive an email claiming your antivirus subscription is about to renew for $399.99 (a price you'd definitely want to cancel), with a phone number to call to "cancel" the charge.

What Happens If You Engage

Once they have you on the phone, here's the typical progression:

Step 1: They gain your trust. They use technical jargon, reference your "Windows license," and sound like a real support agent. They might even give you a fake employee ID or case number.

Step 2: They get remote access. They'll ask you to download a remote desktop tool like AnyDesk, TeamViewer, or UltraViewer. Once installed, they can see and control your entire computer.

Step 3: They "show you the problem." With remote access, they'll open your Event Viewer (a normal Windows tool that always shows warnings and errors) and tell you these are signs of hacking or viruses. They're not. Every computer has these logs.

Step 4: They demand payment. Now comes the sales pitch. They need $200-$800 to "fix" your computer. They'll ask for payment via gift cards, wire transfer, or by accessing your bank account directly while they have remote access.

Step 5: They steal everything they can. While "fixing" your computer, they may install actual malware, steal saved passwords, access your email, or transfer money from your bank account.

Why These Scams Are So Effective

Tech support scams prey on fear and unfamiliarity. Not everyone is a tech expert, and that's perfectly okay. Scammers exploit this by:

  • Creating urgency — "Your computer will be permanently damaged if you don't act now"
  • Using authority — Impersonating trusted brands like Microsoft
  • Leveraging fear — Making you think hackers are watching you right now
  • Being helpful — They're friendly and patient, which makes them seem legitimate

These scams disproportionately target older adults, but anyone can fall for them. The scammers are smooth, the pop-ups look real, and fear makes people act before they think.

How to Protect Yourself

If You Get a Call

  • Hang up immediately. You don't owe them an explanation.
  • Real tech companies don't make unsolicited support calls. Ever.
  • Don't press any buttons they suggest — just end the call.

If You See a Pop-Up

  • Don't call the number. It's part of the scam.
  • Close the browser. If it won't close, press Ctrl+Alt+Delete (Windows) or Cmd+Option+Esc (Mac) to force-quit.
  • Restart your computer. The pop-up will be gone.
  • A pop-up cannot infect your computer by itself — it's just a scary webpage.

If You Get an Email

  • Don't call the number in the email. If you're worried about a charge, log into your actual account on the company's real website.
  • Forward suspicious emails to the company being impersonated (e.g., reportphishing@microsoft.com).
  • Paste the email text into ScamShield's free scanner to get an instant analysis.

What to Do If You've Already Been Scammed

If you gave someone remote access to your computer:

  1. 1.Disconnect from the internet immediately
  2. 2.Uninstall any remote access software they had you install
  3. 3.Change all your passwords from a different device
  4. 4.Run a legitimate antivirus scan (Windows Defender is built in and free)
  5. 5.Contact your bank if you shared financial information
  6. 6.Report it to the FTC at reportfraud.ftc.gov

Protect the People You Love

The best thing you can do is have this conversation with your parents, grandparents, and anyone who might not be tech-savvy. Let them know:

  • Microsoft/Apple/Google will never call you
  • Those scary pop-ups are fake — just close the browser
  • Never let a stranger access your computer remotely
  • When in doubt, scan it with ScamShield — paste the message or describe what happened, and our AI will tell you if it's a scam

Tech support scammers succeed because people don't know what to expect. Now you do. Spread the word.

Think you've received a scam?

Paste any suspicious text, email, or URL into ScamShield's free scanner. Our AI analyzes 10+ signals and gives you a plain-English verdict in under 2 seconds.

Scan Something Suspicious — Free