E-mail: I received an email that I won the microsoft Splash for 2010 promotion. Please check to see if this is correct or if it is a spam?

I received an email that I won the microsoft Splash for 2010 promotion. Please check to see if this is correct or if it is a spam? The name gicen is Mr. James Peterson.

I don't want to divulge personal information is that this isn't for real.

Thank you for your time and concern. I look forward to hear from you.

E-mail address is removed from the privacy *.


Avoid scams that use the Microsoft name fraudulently

Cybercriminals often include the names of well-known companies, such as ours, in their scams. They think it will convince you to give them money or your personal information. While they usually use e-mail to you wrong, that they sometimes use the phone instead.

Common scams that use the Microsoft name

  • "You have won the Microsoft Lottery"
  • Microsoft "requires credit card information to validate your copy of Windows.
  • Microsoft sends unsolicited e-mail with attached security updates
  • A person of "Microsoft Support" calls to fix your computer

Avoid these dangerous hoaxes

We do not send unsolicited e-mail or make unsolicited telephone calls asking for personal information or financial or repair your computer.

If you receive an unsolicited e-mail or phone call which is supposed to be from Microsoft, and request that you send personal information or click on the links,delete the email or hang up the phone .

You did not win the "Microsoft Lottery".

Microsoft customers are often the target of a scam that uses e-mail messages falsely promising money. Victims receive messages saying: 'You have won the Microsoft Lottery!' There is no Microsoft Lottery. Delete the message.

If you have lost money to this scam, report it . You can also send the police report to Microsoft and we will use it to help law enforcement catch criminals who send these e-mails.

For more information, see Microsoft report fraud Lottery . To protect yourself against these e-mail hoaxes, you can use the same general orientation you use to protect yourself from phishing scams to protect you from these e-mail hoaxes.

Microsoft do not ask for credit card information to validate your copy of Windows

We require that your copy of Windows is legitimate before you can obtain programs from the Microsoft Download Center and to receive software updates from Microsoft Update . Our online process that performs this validation is called the Genuine Advantage Program. at no time during the validation process we request your credit card information.

In fact, we collect any information that can be used to identify you, such as your name, e-mail address or other personal information.

For more information, read the Microsoft Genuine Advantage Privacy . To learn more about the program in general, see genuine Microsoft software .

Microsoft sends no communication unsolicited on security updates

When we publish information about a security software update or security incident, send us e-mail messages only to subscribers of our security communications program.

Unfortunately, Cybercriminals have benefited from this program. They sent fake security messages that appear to come from Microsoft. Some messages to attract the recipients to Web sites to download spyware or other malicious software. Others include an attachment that contains a virus . Delete the message. Do not open the attachment.

Legitimate security communications from Microsoft

  • Legitimate communications do not include software updates as attachments. We never attach software updates to our security communications. On the contrary, we refer customers to our Web site for more information on the update or the software security incident.
  • Legitimate communications are also on our websites. If we provide information about a security update, you can also find this information on our Web sites.

= Microsoft has none of the unsolicited telephone calls to help you fix your computer

In this type of scam cybercriminals are calling you and claim to be of Support technique Microsoft. They offer help with your computer problems. Once scammers have earned your trust, they try to steal and damage your computer with malicious software, including viruses and spyware.

Although the law enforcement can trace phone numbers, often authors use pay telephones, disposable cell phones or stolen cellular phone numbers. Better avoid fooling themselves rather than try to repair the damage afterwards.

Treat all unsolicited sceptically telephone calls. Don't provide personal information.

= If this post can help solve your problem, please click the 'Mark as answer"If you find it useful, mark it as useful by clicking the 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

Tags: Windows

Similar Questions

Maybe you are looking for

  • Uninstalling applications can help speed up my Macbook Pro?

    OS X Yosemite 10.10.5 15-inch, mid-2012 MacBook Pro (15-inch, mid-2012) 2.6 GHz Intel Core i7 16 GB 1600 MHz DDR3 Hello. I know that it is one of the most frequently asked questions, so I will try to provide as much information as possible. I got my

  • Equium A100-306 - using an LCD TV only

    My laptop has a broken LCD and I want to continue to use the computer with my Sony Bravia TV, acting as a monitor. I connected a VGA cable between the two devices and have not managed to get the computer to display on the TV screen despite pressing a

  • Electrify: Battery pull

    Is there a combination of button pushes/shims that does the same thing as a true "battery pull?

  • HP Pavilion 15-AB106AU: Wifi stall

    I bought my new laptop last week. Wifi is continually dropping out (we have several other devices at home and we have no problems with wifi for one any of them).  I tried to follow the HP support notes and tried to download the drivers from the HP si

  • Create a backup recovery

    Is this possible on a drive hard laptop usb or should it be a flash drive? I thought to partition my drive hard portable 1 TB and dedicate it to the backup recovery. Thank you