How to protect yourself from support scams
A clear guide to spotting fake support claims, pressure tactics, and unsafe contact attempts.
Still need help?
Use the help form to share the affected platform, timeline, prior attempts, and the support you need.
What to expect
Short, practical guidance with next steps.
Start here
This article explains the account issue in plain language and shows the safest next step.
What to do now
Support scams succeed by adding urgency, authority, and a fake recovery shortcut. The safer path is to verify the contact source before you hand over any account details.
Start here
How to protect yourself from support scams
This article explains the account issue in plain language and shows the safest next step.
Understand the issue
How to protect yourself from support scams
Support scams succeed by adding urgency, authority, and a fake recovery shortcut. The safer path is to verify the contact source before you hand over any account details.
What to do now
Verify the support source before responding to any message or call.
Ignore requests for passwords, codes, or remote access.
Use the official support page or help form only after the source is confirmed.
Prevention tips
Verify contact sources, never share secrets, and keep official support pages separate from any unsolicited outreach.
Real examples
How this usually shows up
Most the account problems become easier to solve after the issue is named precisely: lost access, suspicious change, code failure, disabled status, payment problem, or business access loss.
The strongest requests use dates, visible messages, device context, and steps already attempted. Vague requests create extra back-and-forth because they do not show the account state.
Connected products can change the next step. A Facebook profile may control a Page, an Instagram account may be linked to Threads, and a payment issue may require account-security review.
Mistakes to avoid
Trusting urgency
Scammers copy the pressure of real account problems. Slow down before opening links, sharing codes, or granting remote access.
Sharing secrets
Passwords, one-time codes, backup codes, full card numbers, and identity numbers should never be shared with an unsolicited contact.
Skipping source checks
Verify where the message came from before treating it like a real support response.
Related support pages
Use these support pages when the article points to a direct recovery or review step.
Related articles
Keep reading if you need more background before taking the next step.
Still need help?
Use the help form to share the affected platform, timeline, prior attempts, and the support you need.
Questions people ask
Useful answers before you continue
What is the safest rule?+
Do not share secrets with a contact you have not verified.
Why do scams work so often?+
Because they copy the urgency of a real account problem.
What details make the next step easier?+
Use the exact error, date, account identifier, recovery-channel status, device used, and steps already attempted.
When should I move from reading to a support page?+
Move when the issue is blocking access, money is involved, or the same recovery attempt keeps failing.