Thursday, 19 March 2020

New Scam for iPhone Users


There’s a new phishing campaign that is targeting iPhone users with the use of a range of scams aimed at defrauding victims. While email scams are not new in the world of cyberthreats, attackers are getting craftier in the way they approach phishing through mobile email. Here are the telltale signs that the email you have received via your iPhone is a scam:

1.      The sender’s name is suspicious. If there are discrepancies in email sender usernames and addresses, think twice about opening the email. Anything that comes from an unknown sender—especially one that look’s suspicious should be handled with much thought.

2.      There are invalid recipients. Another telltale sign of an iPhone email scam is the presence of invalid recipients or email addresses that are undisclosed.

3.      The email body is a picture. Emails that contain photographs as the message body prevent you from copying content and pasting it elsewhere. They also force you to click on malicious links within the image or the message body.

4.      Subscription renewals. If you are not subscribed to whatever the email message is referring to, you should certainly not feel obliged to accept their invitation to “renew” your subscription, especially since there isn’t a subscription to renew in the first place.

5.      Shortened or clipped URL. Another telltale sign of a scam email is a shortened URL, which when copied and pasted elsewhere reveals a link behind the URL, which typically load in a background preview window, enabling the scam to unfold.

Apart from phishing emails, there are even newer breeds of scams that specifically target iPhone users, like dating app scams, slot machine scams, and free VPN app scams. Arming yourself with good knowledge of these security-threatening schemes is your best defense against the damages they can do to your online accounts and your device.

No comments:

Post a Comment

The Future of Managed IT Services: What Businesses Need to Know

As businesses increasingly adopt cloud solutions and the Internet of Things (IoT), IT security has become a critical priority for organizati...