Solved

MSN email

Posted on 2014-09-15
2
332 Views
Last Modified: 2014-09-20
From time to time I get a text message on my mobile phone to say that my "Microsoft Account  might have been accessed" and suggesting that I go into my account with the link provided.  Of course I would not do that.  But is this sort of message real, or is to catch some unwitting sleepy head off his or her guard.  Thank u for your advise.
0
Comment
Question by:jegajothy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
macarrillo1 earned 500 total points
ID: 40323743
Your instincts are right.  This is not real.  If in doubt, enter the url into the browser yourself, never click the link provided in anything you are suspect of.

These days links can be made to look like they are legitimate, when in fact they are not.
0
 

Author Closing Comment

by:jegajothy
ID: 40334386
Thank u for the confirmation of what I had in mind.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Make the most of your online learning experience.
With the rising number of cyber attacks in recent years, keeping your personal data safe has become more important than ever. The tips outlined in this article will help you keep your identitfy safe.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question