<span id="g2p72"><legend id="g2p72"></legend></span>

<span id="g2p72"><menuitem id="g2p72"></menuitem></span>
      1. <output id="g2p72"><button id="g2p72"></button></output>

      2. <listing id="g2p72"></listing>

        <label id="g2p72"><button id="g2p72"><address id="g2p72"></address></button></label><tt id="g2p72"></tt>
        <tt id="g2p72"><pre id="g2p72"><big id="g2p72"></big></pre></tt>

        1. HP Fraud Alert: Protecting Yourself from Scams

          0

          This document is for all HP products.

          Telephone technical support scams are an ongoing threat to technology companies such as HP and our customers. Scammers might call you on the phone and pose as representatives from HP technical or customer support. In some cases, scammers mask their originating phone number (Caller ID spoofing) so the calls appear to be from a genuine HP contact number.

          The scammers attempt to gain your trust, and they might employ one or more of the following tactics:


          • Try to convince you that your device requires urgent technical support, and then request payment information (such as credit card, debit card, or online gift card) to bill you for phony services.
          • Request you to call them back at another time to "complete" a fraudulent technical support case and potentially further the scam.
          • Request remote access to your device, or try to convince you to install software that enables remote access to the device.
          • Try to trick you into installing malicious software including malware, viruses, or spyware that could capture or jeopardize the security of your personal information, such as online user names or passwords.
          • Request you to provide confidential information such as user IDs, passwords, customer support case numbers, or account history.
          • Become aggressive and demand that you follow their instructions.
          1

          Protect yourself from telephone tech support scammers

          HP never contacts customers to provide unsolicited technical support. If you receive an unexpected call claiming to be from HP, you should hang up.


          • Do not rely on caller ID alone to authenticate the caller, as criminals can change the caller ID display to make it appear as though the call is coming from a legitimate HP number.
          • Do not provide any confidential information such as user IDs, passwords, social security numbers, credit/debit card numbers, PINs, or account information.
          • Do not transfer funds or agree to make payment in the form of online gift cards.
          • Do not give callers remote access to your computer or device.
          • Do not install any software suggested by the caller.
          2

          What to do after you have been contacted by a scammer

          If you believe you have been contacted by a scammer and are concerned about the security of your device and personal information, take the following actions:


          • Change the password for your device and all accounts where you might keep personal information, such as email and financial accounts.
          • Run a security scan or contact your security software provider to determine whether malware has been installed on your device.
          • Write down all details related to the scam call, and report this information to the appropriate agency.

          3

          Learn more about tech support scams

          The United States Federal Trade Commission (FTC), along with federal, state, and international law enforcement partners, has initiated “Operation Tech Trap”, an international crackdown on tech support scams. As part of this effort, the FTC provides information about support scams on their Tech Support Scams non-HP site webpage (in English and Spanish).

          4

          What HP is doing about tech support scams

          HP considers the security of our customers’ devices and personal information a top priority. We will continue to investigate tech support scams and implement proactive and preventive measures to combat cybercriminals. HP refers cases to law enforcement authorities when appropriate and will cooperate in any related investigations.

          钓鱼岛捕鱼

          <span id="g2p72"><legend id="g2p72"></legend></span>

          <span id="g2p72"><menuitem id="g2p72"></menuitem></span>
            1. <output id="g2p72"><button id="g2p72"></button></output>

            2. <listing id="g2p72"></listing>

              <label id="g2p72"><button id="g2p72"><address id="g2p72"></address></button></label><tt id="g2p72"></tt>
              <tt id="g2p72"><pre id="g2p72"><big id="g2p72"></big></pre></tt>

              1. <span id="g2p72"><legend id="g2p72"></legend></span>

                <span id="g2p72"><menuitem id="g2p72"></menuitem></span>
                  1. <output id="g2p72"><button id="g2p72"></button></output>

                  2. <listing id="g2p72"></listing>

                    <label id="g2p72"><button id="g2p72"><address id="g2p72"></address></button></label><tt id="g2p72"></tt>
                    <tt id="g2p72"><pre id="g2p72"><big id="g2p72"></big></pre></tt>

                    1. 新11选5开奖走势图 广西快乐10分开奖分布图开奖结果 女足法甲联赛巴黎 七星彩走势图表近50期 改制前排球比分规则 6码复式三中三复试图片 山西11选5走势图任选基本走势图 斯诺克世界排名 北京快3一定牛形 幸运农场开奖号 围棋棋盘共有几个交叉点 网络版五子棋 北京快乐8计划a 广西快乐双彩一等奖 双色球基本走势图彩票大赢家