Warning: The fake Apple support unit calls to trick users into obtaining user information
A new trick in support of technology is happening to iPhone users that many people can't help but worry about. Specifically, bad guys have tricked users by making fake phone calls to Apple's own support, making many iPhone users trapped.
- Do not post photos of check-in tickets on the internet if you do not want to become a victim of a scam or a black society
BBB's CEO - Marjorie Stephens said, technology scams are increasingly appearing with sophisticated tricks. Scammers have worked professionally to deceive customers, even BBB executives have almost caught it.
Stephens also summarized the details of how this new scam appeared.
Stage 1: The user receives a phone call that the caller calls himself an Apple company. Even to gain your trust, the scammer can fake Apple's legitimate phone number. You will then receive a pre-recorded message with the content that your phone or computer is facing a serious threat. Specifically, Apple's server has been compromised and your information is at risk of being exposed or your iPhone is likely to be compromised. Scammers try to convince users to believe it.
Stage 2: Next, the scammer asks the user to press the number 1 key to connect the customer service or maybe he will call you back with another number. If the user follows, the fake customer service representative will ask you for personal information or payment information to fix the problem. Once you have obtained the necessary information, the fraudster will stop answering or blocking your number.
What do users need to do to protect themselves from technical support scams?
- The first thing to remember is that Apple never calls any user to expose data on a large scale.
- If you receive a suspicious call, find the customer service number on the company's official website and call back to confirm.
- Never provide personal information (including full name, address, ID / CCCD number, bank information or sensitive information) to strangers.
- If you get a call asking to do something from a stranger, don't trust and hang up immediately.
You should read it
- [Infographic] 4 types of Phishing are easy to trap users
- Identify popular online scams so as not to lose money unfairly
- What is Spear Phishing?
- Phishing tricks are becoming more and more cunning
- How to block phishing attacks in Firefox 3
- 5 signs to identify phishing websites
- How to identify phishing emails
- How to protect yourself from phishing attacks via mobile phones
- [Infographic] How to recognize and prevent Phishing attacks
- Phishing attack: The most common techniques used to attack your PC
- What are Smishing, Phishing and Vishing? How are they different?
- How to report phishing emails in Outlook.com
Maybe you are interested
What information can your ISP see when you turn on a VPN?
How to set up personal safety information on Android
What information does a VPN hide? How does it protect your data?
Instructions for changing and editing music file information using 3uTools
Detecting a new ransomware strain that specializes in stealing login information from the Chrome browser
Meta 'death' of CrowdTangle, tool to track false information