Warning: The fake Apple support unit calls to trick users into obtaining user information
A new trick in support of technology is happening to iPhone users that many people can't help but worry about. Specifically, bad guys have tricked users by making fake phone calls to Apple's own support, making many iPhone users trapped.
- Do not post photos of check-in tickets on the internet if you do not want to become a victim of a scam or a black society
BBB's CEO - Marjorie Stephens said, technology scams are increasingly appearing with sophisticated tricks. Scammers have worked professionally to deceive customers, even BBB executives have almost caught it.
Stephens also summarized the details of how this new scam appeared.
Stage 1: The user receives a phone call that the caller calls himself an Apple company. Even to gain your trust, the scammer can fake Apple's legitimate phone number. You will then receive a pre-recorded message with the content that your phone or computer is facing a serious threat. Specifically, Apple's server has been compromised and your information is at risk of being exposed or your iPhone is likely to be compromised. Scammers try to convince users to believe it.
Stage 2: Next, the scammer asks the user to press the number 1 key to connect the customer service or maybe he will call you back with another number. If the user follows, the fake customer service representative will ask you for personal information or payment information to fix the problem. Once you have obtained the necessary information, the fraudster will stop answering or blocking your number.
What do users need to do to protect themselves from technical support scams?
- The first thing to remember is that Apple never calls any user to expose data on a large scale.
- If you receive a suspicious call, find the customer service number on the company's official website and call back to confirm.
- Never provide personal information (including full name, address, ID / CCCD number, bank information or sensitive information) to strangers.
- If you get a call asking to do something from a stranger, don't trust and hang up immediately.
You should read it
- What is Spear Phishing?
- Phishing tricks are becoming more and more cunning
- How to block phishing attacks in Firefox 3
- 5 signs to identify phishing websites
- How to identify phishing emails
- How to protect yourself from phishing attacks via mobile phones
- [Infographic] How to recognize and prevent Phishing attacks
- Phishing attack: The most common techniques used to attack your PC
May be interested
- Viettel will provide eSIM on smart watchthe watch will have a separate phone number, allowing it to operate independently without having to use parallel with the smartphone.
- Windows 10 and Office 365 are prohibited from use in all schools in a German stateonce again microsoft infringes on the common european data protection regulation (gdpr).
- The fastest USB-C hub that Sony has ever built officially, provides transfer speeds of up to 1000MB / sthat's the usb-c mrw-s3 hub.
- Top 6 gaming laptops under 20 million worth buying most todayhere are the gaming laptops under 20 million vnd worth buying today, please consult.
- Programmers optimize their own 'classic' volume interface that has existed for 7 years on Windowsthis volume interface makes users feel uncomfortable because of the delayed response time, it does not have a shortcut button, but sometimes it does not turn itself off after the user has finished adjusting the volume.
- Twitter started deploying a new desktop experience based on PWAif you regularly visit the twitter site via the desktop, you'll notice a completely different interface, along with a few relatively new features.