Tech Support Scams: Why Microsoft Will Never Call You

Learn why legitimate tech companies never make unsolicited phone calls and how to protect yourself from tech support scams targeting seniors.

You receive a phone call from someone claiming to work for Microsoft, Apple, or your internet provider. They tell you there’s a serious problem with your computer that needs immediate attention. This scenario plays out thousands of times daily across the United States, and it’s always a scam.

Tech support scams are among the most common frauds targeting older adults, combining fear tactics with technical-sounding language to convince victims to provide remote access to their computers or pay for unnecessary “fixes.”

Understanding these scams is your best defense. In this guide, you’ll learn:

  • Why legitimate companies never make unsolicited support calls
  • How these scams work and what scammers typically say
  • Exactly what to do when you receive one of these calls

Let’s explore how to protect yourself from these increasingly sophisticated fraudsters.

What Are Tech Support Scams

Tech support scams occur when criminals call or email claiming to be from well-known technology companies, warning you about supposed computer problems that don’t actually exist. Think of it like someone calling to say your car has a dangerous problem, then offering to “fix” it for a fee—except they’re lying about both the problem and their ability to help.

These scams typically follow this pattern:

  • Unsolicited contact: Cold call claiming urgent computer security issue
  • Fear tactics: Warning about viruses, hackers, or system corruption
  • False legitimacy: Claiming to represent Microsoft, Apple, or your ISP
  • Remote access request: Asking to connect to your computer “to help”
  • Payment demand: Requiring payment for fake fixes or fake antivirus software

Why Tech Support Scams Work So Well

According to the Federal Trade Commission, Americans reported losing $347 million to tech support scams in 2021, with older adults accounting for the majority of victims. The average loss was $728 per victim.

⚠️ Important Truth: Microsoft, Apple, Google, and other legitimate tech companies will NEVER call you unsolicited about computer problems. If someone claims they will, it’s always a scam—no exceptions.

These scams are effective because they exploit common concerns:

  • Computer anxiety: Many people worry they lack technical knowledge to spot problems
  • Security fears: Concerns about viruses and hackers are widespread and justified
  • Authority deference: People trust claims from “official” company representatives
  • Urgency pressure: Scammers create artificial deadlines that prevent careful thinking

Common Scripts and Red Flags

Tech support scammers use proven scripts designed to sound official while creating urgency. Learning their common phrases helps you recognize them immediately:

Typical Opening Lines

Scammers often begin calls with statements designed to sound official while being vague enough to apply to any situation.

  • “This is Microsoft calling about your computer”
  • “We’ve detected suspicious activity on your Windows computer”
  • “Your computer has been sending us error reports”
  • “There’s a security breach associated with your IP address”
  • “Your computer license is about to expire”

Pressure Tactics

After getting your attention, scammers escalate to create urgency and prevent you from thinking clearly or consulting others.

tech support scam warning Microsoft never calls
Legitimate tech companies never make unsolicited phone calls about computer problems
  • False deadlines: “Your computer will be shut down in 24 hours”
  • Escalating consequences: “Hackers are accessing your personal files right now”
  • Social proof claims: “We’ve helped hundreds of people in your area with this problem”
  • Discount offers: “Normally this costs $300, but today we can fix it for $99”

Technical-Sounding Nonsense

Scammers use confusing technical terms to sound knowledgeable while making claims that are actually meaningless:

  • “Your firewall has been compromised by malicious IP addresses”
  • “We’re seeing multiple trojans in your system registry”
  • “Your computer is broadcasting your personal information”
  • “There are 47 critical vulnerabilities that need immediate patching”

What Happens If You Stay on the Line

If you don’t hang up immediately, scammers will guide you through steps designed to “prove” their claims and gain access to your computer or payment information.

Fake Problem “Proof”

They’ll have you open normal system tools that always show activity, claiming this “proves” your computer has problems:

  • Event Viewer (showing normal system logs as “errors”)
  • Task Manager (claiming normal processes are “malicious”)
  • Command prompt tools (misinterpreting normal network activity)

Remote Access Requests

Once they’ve “proven” problems exist, they’ll ask to connect to your computer remotely using software like TeamViewer, AnyDesk, or LogMeIn. This gives them complete control of your machine.

Practical Tips to Protect Yourself

  • Hang up immediately: The moment someone calls about computer problems you didn’t report
  • Never provide remote access: Legitimate companies don’t need to control your computer remotely
  • Don’t follow their instructions: Don’t open websites, download software, or press key combinations they suggest
  • Never pay for “fixes”: Real tech support issues should be handled through official channels
  • Write down the number: Note caller ID for reporting, but don’t call them back
  • Tell others: Warn friends and family about these tactics
  • Report the scam: File complaints with FTC and your state attorney general

Pros and Cons of Different Response Strategies

👍 Pros

Hanging up immediately is safest

You can’t be manipulated if you don’t engage with the scammer at all.

Easy to remember the rule

“Never accept unsolicited tech support calls” is simple and always correct.

Protects your computer

No remote access means no risk of malware installation or data theft.

👎 Cons

Might worry about missed real issues

Some people fear hanging up on a legitimate warning, though this never happens.

Scammers may call back

They often try multiple times or claim you “hung up accidentally.”

Frequently Asked Questions

Q1

What if they say they’re calling because I contacted Microsoft support?

This is still a scam. Microsoft support operates through their website and official phone numbers, not cold calls. If you did contact support, log into your Microsoft account online to check your actual service requests.

Q2

Can scammers actually see my computer remotely without permission?

No. Scammers can only access your computer if you download and run remote access software they direct you to install. They cannot see or control your computer just by calling you.

Q3

What should I do if I already gave them remote access to my computer?

Disconnect from the internet immediately, run a full antivirus scan, change all your passwords, and consider having a local computer technician check your system for malware or unauthorized changes.

Q4

How can I tell if my computer actually has problems?

If you have genuine computer concerns, contact tech support through official channels: visit the company’s website, call numbers listed on their official site, or visit a local computer repair shop you trust.

Final Thoughts

The golden rule for tech support calls is simple: if you didn’t initiate contact about a specific problem, hang up immediately. Legitimate tech companies will never call you out of the blue about computer issues, security problems, or license renewals.

Trust your instincts and remember that hanging up on a scammer costs you nothing, but staying on the line could cost you hundreds of dollars and compromise your computer’s security. When in doubt, always err on the side of caution.

Margaret Chen
Senior Editor at SenorSafe

SenorSafe — Your Complete Guide to Digital Safety

SenorSafe is an independent informational resource. We do not provide professional cybersecurity services. Content is for educational purposes only.

Privacy Policy | Terms | Contact | About

© 2026 SenorSafe. All rights reserved.