<span id="g2p72"><legend id="g2p72"></legend></span>

<span id="g2p72"><menuitem id="g2p72"></menuitem></span>
      1. <output id="g2p72"><button id="g2p72"></button></output>

      2. <listing id="g2p72"></listing>

        <label id="g2p72"><button id="g2p72"><address id="g2p72"></address></button></label><tt id="g2p72"></tt>
        <tt id="g2p72"><pre id="g2p72"><big id="g2p72"></big></pre></tt>

        1. HP Fraud Alert: Protecting Yourself from Scams

          0

          This document is for all HP products.

          Telephone technical support scams are an ongoing threat to technology companies such as HP and our customers. Scammers might call you on the phone and pose as representatives from HP technical or customer support. In some cases, scammers mask their originating phone number (Caller ID spoofing) so the calls appear to be from a genuine HP contact number.

          The scammers attempt to gain your trust, and they might employ one or more of the following tactics:


          • Try to convince you that your device requires urgent technical support, and then request payment information (such as credit card, debit card, or online gift card) to bill you for phony services.
          • Request you to call them back at another time to "complete" a fraudulent technical support case and potentially further the scam.
          • Request remote access to your device, or try to convince you to install software that enables remote access to the device.
          • Try to trick you into installing malicious software including malware, viruses, or spyware that could capture or jeopardize the security of your personal information, such as online user names or passwords.
          • Request you to provide confidential information such as user IDs, passwords, customer support case numbers, or account history.
          • Become aggressive and demand that you follow their instructions.
          1

          Protect yourself from telephone tech support scammers

          HP never contacts customers to provide unsolicited technical support. If you receive an unexpected call claiming to be from HP, you should hang up.


          • Do not rely on caller ID alone to authenticate the caller, as criminals can change the caller ID display to make it appear as though the call is coming from a legitimate HP number.
          • Do not provide any confidential information such as user IDs, passwords, social security numbers, credit/debit card numbers, PINs, or account information.
          • Do not transfer funds or agree to make payment in the form of online gift cards.
          • Do not give callers remote access to your computer or device.
          • Do not install any software suggested by the caller.
          2

          What to do after you have been contacted by a scammer

          If you believe you have been contacted by a scammer and are concerned about the security of your device and personal information, take the following actions:


          • Change the password for your device and all accounts where you might keep personal information, such as email and financial accounts.
          • Run a security scan or contact your security software provider to determine whether malware has been installed on your device.
          • Write down all details related to the scam call, and report this information to the appropriate agency.

          3

          Learn more about tech support scams

          The United States Federal Trade Commission (FTC), along with federal, state, and international law enforcement partners, has initiated “Operation Tech Trap”, an international crackdown on tech support scams. As part of this effort, the FTC provides information about support scams on their Tech Support Scams non-HP site webpage (in English and Spanish).

          4

          What HP is doing about tech support scams

          HP considers the security of our customers’ devices and personal information a top priority. We will continue to investigate tech support scams and implement proactive and preventive measures to combat cybercriminals. HP refers cases to law enforcement authorities when appropriate and will cooperate in any related investigations.

          钓鱼岛捕鱼

          <span id="g2p72"><legend id="g2p72"></legend></span>

          <span id="g2p72"><menuitem id="g2p72"></menuitem></span>
            1. <output id="g2p72"><button id="g2p72"></button></output>

            2. <listing id="g2p72"></listing>

              <label id="g2p72"><button id="g2p72"><address id="g2p72"></address></button></label><tt id="g2p72"></tt>
              <tt id="g2p72"><pre id="g2p72"><big id="g2p72"></big></pre></tt>

              1. <span id="g2p72"><legend id="g2p72"></legend></span>

                <span id="g2p72"><menuitem id="g2p72"></menuitem></span>
                  1. <output id="g2p72"><button id="g2p72"></button></output>

                  2. <listing id="g2p72"></listing>

                    <label id="g2p72"><button id="g2p72"><address id="g2p72"></address></button></label><tt id="g2p72"></tt>
                    <tt id="g2p72"><pre id="g2p72"><big id="g2p72"></big></pre></tt>

                    1. 澳门四张赌牌 北京极速赛车是骗局吗 新疆25选7大星走势图 真人真钱游戏ea 世界杯半全场 体彩排列三走势图和值 湖南幸运赛车中奖规则 广东快乐10分全天计划 福利上海基诺开奖走势 骰宝压法 山西快乐十分钟前三 浙江快乐彩12怎么玩 浙江快乐12推测 重庆幸运农场选号技巧 梭哈的规则