Tagged: Apple Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on November 26, 2024 Permalink | Reply
    Tags: , Apple, , ,   

    Beware of the Latest Apple Phishing Scam 

    Beware of the Latest Apple Phishing Scam

    By Greg Collier

    In the ever-evolving landscape of cyber threats, phishing emails remain a persistent and dangerous tactic employed by hackers to steal personal information. The latest target? Apple account holders. A deceptive email claiming to be from Apple Support is making the rounds, aiming to trick recipients into handing over their login credentials and other sensitive data. However, this email isn’t from Apple’s headquarters. It’s a cleverly crafted scam designed to exploit trust and urgency.

    The email is designed to mimic legitimate correspondence from Apple, using familiar formatting and branding to appear authentic. The message claims that your Apple ID has been suspended due to unusual activity or that it’s missing information. It features a blue button labeled ‘Go to Apple ID’, urging you to verify your account to restore access. The sense of urgency is palpable, since it might warn you that failure to act within 24 hours will result in your account being permanently locked.

    While the email may seem convincing at first glance, a closer inspection reveals the hallmarks of a phishing scam. For instance, the sender’s email address doesn’t come from an official Apple domain. Instead, it might originate from a suspicious overseas domain. Additionally, the grammar and phrasing in the email are often awkward or incorrect, a red flag that something is amiss.

    Falling victim to such a scam can have serious consequences. If your Apple account is compromised, scammers could use the payment information stored in your account to purchase expensive Apple products, leaving you with the bill. To avoid such a scenario, it’s critical to scrutinize every email you receive.

    When examining emails, always verify the sender’s address and ensure it matches the official domain of the purported sender. Be wary of any links included in the message, particularly if the email is unexpected or seems suspicious. Legitimate organizations, including Apple, will never ask you to verify sensitive information through an email link. Instead, they’ll direct you to their official website or app to manage your account securely.

    Two-factor authentication (2FA) is another essential tool for protecting your accounts. By requiring a second form of verification, such as a code sent to your phone or another trusted device, 2FA can stop hackers from accessing your account even if they manage to obtain your login credentials.

    By remaining cautious, verifying the authenticity of communications, and enabling robust security measures, you can safeguard your digital identity and prevent scammers from succeeding. Always think twice before clicking, and remember: when in doubt, go directly to the source to verify the legitimacy of any request.

     
  • Geebo 9:00 am on November 18, 2024 Permalink | Reply
    Tags: Apple, , , ,   

    Fake Apple Email Led to a $430,000 Gold Bar Scam 

    Fake Apple Email Led to a $430,000 Gold Bar Scam

    By Greg Collier

    In the quiet town of Prescott, Wisconsin, a woman’s financial nightmare began with what appeared to be a legitimate email from Apple. The message warned her that her IP address had been compromised, prompting her to call a number provided. That call set off a chain of events that ultimately drained her retirement savings, costing her more than $430,000. The funds, which she converted into gold bars at the direction of scammers, vanished without a trace.

    Her story is one of nearly 50 reported cases in Wisconsin, where victims have collectively lost approximately $13 million to similar scams. These schemes are highly sophisticated, targeting older individuals with significant savings by exploiting their trust in well-known companies and government agencies.

    The email appeared harmless, a routine security alert from Apple. Trusting the brand, the woman dialed the number provided and was connected to someone claiming to be the head of the Federal Trade Commission (FTC). The imposter warned her that her identity had been stolen, and her bank accounts were at risk. To protect her funds, he advised her to liquidate her savings and purchase gold bars. These, he assured her, would be safeguarded by the Federal Reserve.

    The scammers maintained an air of urgency, keeping constant contact and coaching her to lie to bank tellers, claiming she was helping a family member with business investments. After purchasing the gold, couriers arrived at her home to collect it. They promised the gold was secure, but it was gone for good.

    In this instance, couriers were pivotal. Tasked with retrieving the gold bars, they traveled extensively, their movements spanning multiple states. Fortunately, some were apprehended during coordinated sting operations, but these arrests only touched the surface of a broader, more insidious network. Such schemes often originate overseas, beyond the reach of local law enforcement.

    For victims, justice offers little consolation. The Prescott woman has yet to recover a dime of her stolen savings, and the chances of restitution are slim. The emotional and financial toll persists, leaving her fearful of even basic financial activities.

    Scammers often impersonate trusted brands like Apple or even government officials to manipulate their victims. It’s crucial to remember that legitimate companies such as Apple, Google, Microsoft, and Facebook will never tell you if your bank account has been compromised. They do not have access to that information. Likewise, the FTC and its officials will never demand immediate financial actions or direct you to purchase gold.

    If you receive a suspicious call or email, hang up or delete it immediately. Contact the company or organization directly using verified contact information from their official website. If someone claims to be from your bank, end the call and dial your bank’s official number to confirm the legitimacy of the request. Scammers rely on fear and urgency, but taking a moment to verify can protect you from becoming their next victim.

     
  • Geebo 8:00 am on September 11, 2024 Permalink | Reply
    Tags: Apple, , , , ,   

    Crypto Scammers Exploit Apple’s iPhone 16 Event 

    By Greg Collier

    On September 9, as Apple enthusiasts eagerly tuned in for the launch of the iPhone 16 during the ‘Glowtime’ event, scammers took advantage of the hype by launching an elaborate crypto scam. Using deepfake technology, the scammers created videos that impersonated Apple CEO Tim Cook, promoting fraudulent cryptocurrency giveaways and investment schemes. These videos, which were posted on YouTube, lured unsuspecting viewers into participating in crypto transactions by flashing QR codes on the screen. Viewers were asked to send their cryptocurrency to fake websites that closely resembled Apple’s official site.

    This isn’t the first time scammers have deployed deepfake technology to impersonate prominent figures. Earlier this year, similar tactics were used to imitate Elon Musk, spreading false crypto giveaways.

    The deepfake videos on YouTube managed to garner thousands of views before being taken down, but not before several people flagged them on platforms like X (formerly Twitter). Social media users expressed concern over the growing misuse of advanced technologies like artificial intelligence (AI) for fraudulent purposes.

    This event serves as a chilling reminder of the increasing sophistication of cryptocurrency scams. With cryptocurrencies’ volatile nature and the difficulty of tracing transactions, hackers have found fertile ground for fraud. The FBI has warned that crypto scammers are using ever more advanced techniques, with members of the crypto community losing over $5.6 billion to such scams last year.

    It’s important to remember that celebrity endorsements of cryptocurrency schemes are usually fake. Scammers often exploit the likeness and voices of well-known figures, like Tim Cook or Elon Musk, to create a false sense of trust and credibility. These endorsements are rarely, if ever, legitimate. Instead, they are sophisticated traps designed to manipulate and deceive people into investing in fraudulent schemes. When it comes to crypto, always exercise caution and verify information through trusted sources before making any transactions. If something seems too good to be true, it probably is.

     
  • Geebo 9:00 am on January 8, 2024 Permalink | Reply
    Tags: Apple, , ,   

    Apple settles lawsuit over gift card scams 

    Apple settles lawsuit over gift card scams

    By Greg Collier

    There’s a phrase we often use when discussing gift card scams, and that is gift cards are the currency of scammers. What we mean by that is, unless you’re presenting someone with a gift card as an actual gift, if someone asks you for payment in gift cards, you’re more than likely being scammed. However, it’s not just scammers who make money from gift card scams. The issuers of these cards make money as well.

    Apple Computers were one of the pioneers in modern gift card sales. The company introduced its first gift card, the iTunes Gift Card, in 2003. Initially, it was designed for users to purchase and download music, movies, TV shows, and other digital content from the iTunes Store.

    Over the years, as Apple expanded its product and service offerings, the gift cards evolved to cover a broader range of Apple services and products. The iTunes Gift Card was eventually rebranded as the Apple Gift Card to reflect its versatility across various Apple platforms.

    Apple gift cards can be used to purchase not only music and movies but also apps, games, books, iCloud storage, and even hardware products like iPhones, iPads, Macs, and accessories.

    Since Apple hardware can be purchased, the gift cards have become highly coveted among scammers. They’ll purchase the high-end items before selling them for a substantial profit.

    According to a recent lawsuit, Apple is also allegedly making money from these scams. When an Apple gift card is purchased, Apple keeps 30% of that purchase price. Like many gift card issuers, Apple has been reluctant to assist victims who have lost money to Apple gift card scams.

    That lawsuit was recently settled, although a settlement amount has yet to be disclosed. However, the settlement affects anyone who lost money to an Apple gift card scam from 2015 to July 31, 2020, and did not receive a refund from Apple.

    Unless you’re actually giving someone a gift, gift cards should never be used as a form of payment to people you don’t know. No legitimate company, agency, or online seller, will ever ask for gift cards as payment. Another reason we call them the currency of the scammer is they’re virtually untraceable once the card is depleted.

     
  • Geebo 9:05 am on December 15, 2023 Permalink | Reply
    Tags: Apple, , , , ,   

    New scam sends you a bill from Apple 

    New scam sends you a bill from Apple

    By Greg Collier

    Whenever you see a headline that says there’s a new scam, the odds are it’s an old scam in new clothing. It’s just more efficient to say there’s a new scam in the headline in order to better educate the reader. Today’s scam is no different.

    Security experts are saying scammers are sending bills to their victims that appear to look like a bill from Apple Computers. The bill says the recipient is being charged close to $300 for security ‘upgradation’. Upgradation is an English word, however, it is not used in American English. That should be someone’s first clue the bill is fraudulent.

    The bill contains a phone number to call in case the recipient has any questions. Once a victim calls the number, they’re told they’ll be issued a refund if they allow the phony customer service agent to have remote access to the victim’s device. Red flags do not get any redder than this. Once a user allows remote access to their device, bad actors can install malware on to the device, or gain access to your online accounts.

    A similar scam to this one is when victims receive an email that claims someone just made a large purchase on their Amazon account, prompting the victim to call a customer service included in the email.

    In this instance, the scammers are posing as Apple because Apple users have a reputation of being more affluent since Apple devices are more expensive than competitors’ devices. The scammers don’t actually know who owns an Apple device. They send out these email invoices en masse, hoping they snag an Apple using victim. It’s almost certain some Windows and Android users received phony Apple emails too.

    With these email scams, never call the phone number included. Instead, manually check your account from that vendor or service to make sure you haven’t been charged. If you still feel the need to call them, use the customer service number from their website.

     
  • Geebo 8:00 am on September 11, 2023 Permalink | Reply
    Tags: , Apple, , , , , ,   

    Scammers use AirTags to steal cars 

    Scammers use AirTags to steal cars

    By Greg Collier

    If you’re not familiar with AirTags, they’re a device sold by Apple that is essentially a tracking device. AirTags are intended to be used on things you don’t want to lose, such as keys and luggage. Some have even attached AirTags to their pets’ collars, so they can be located quickly if they get out. However, bad actors have used AirTags for more nefarious purposes. Unfortunately, there have been numerous instances of stalkers using AirTags to track their victims. Car thieves are also infamous users of AirTags.

    One such car thief was recently arrested in Minnesota, after a potential victim discovered his scam. The thief allegedly stole cars, then sold them to unsuspecting buyers on Facebook Marketplace. The cars would have an AirTag planted on them, so the thief could go back after the sale and steal the car back to sell it again.

    The Minnesota buyer felt like something was wrong with the sale when they were given a freshly cut key and a car title that felt like it was printed on the wrong type of paper. The risk in using AirTags in a scam like this is anyone nearby with an iPhone will be notified there’s an AirTag in their vicinity. The buyer’s wife did have an iPhone and received one of these notices. The buyer notified police, who apprehended the alleged scammer.

    Car thieves will also use AirTags to mark cars they want to steal at a later time. For example, a car thief could spot a car in a parking lot. Then, after attaching an AirTag somewhere on the vehicle, the thief can wait until the car is parked somewhere it would be easier to steal.

    If you use an iPhone and receive an AirTag notification, you’ll also be given an option to have the AirTag make a noise, This way, you’ll hopefully be able to locate the AirTag, and stop it from tracking you or your vehicle.

    If you’re thinking you’re out of luck because you have an Android Phone, we have some good news for you. Android also has an ant-stalking feature that will detect AirTags and similar trackers. Navigate to the Settings menu, select “Safety and Emergency,” and then access the “Unknown Tracker Alerts” option. Here, you have the option to toggle automatic scanning on or off and manually initiate a scan to check for the presence of any unidentified AirTags that might have been accompanying you.

     
  • Geebo 9:00 am on February 8, 2023 Permalink | Reply
    Tags: Apple, , , , macOS, , ,   

    Scam Round Up: Scammers entering seniors’ homes and more 

    By Greg Collier

    This week in the Round Up, we have an old scam that homeowners should still be aware of. We also have two new scams, with one of them having chilling implications.

    ***

    Do you know why we’re always talking about Windows pop-up scams and not Apple ones? It’s not because macOS is any more secure than Windows. It’s mainly because Apple only has 17.2% of the market share when it comes to computers. Essentially, it’s not worth it for scammers and hackers to target Mac users. That doesn’t mean that macOS is completely free of scams.

    Recently, at least one Mac user has reported getting a scam pop-up on their Mac. It was disguised as one of macOS’ notification pop-ups. It was even complete with the system settings icon. The pop-up says that your iCloud account has been hacked and asks the user to click here to remove the virus. Your iCloud account being hacked and having a virus are two separate things. Never click on anything that says click here now when it comes to potential security risks on your Mac.

    If history is any indicator, if you click the notification, you’ll either have malware injected into your device, or you’ll be taken to a scam site that will ask for your personal information.

    ***

    Minnesota’s homeowners are being warned about letters that tell them their home warranty is about to expire. These are scam letters which are trying to get you to divulge your credit or debit card information to the scammers. According to the Minnesota Department of Commerce, these scammers will try to tell you that they have some kind of arrangement with the mortgage company, HOA, or county deeds office.

    If you receive a letter like this, just dispose of it. If you’re looking to purchase a home warranty, always check for reviews and complaints to make sure the company is legitimate.

    ***

    Lastly, the residents of Pulaski County in Virginia are being warned of a disturbing scam that’s targeting seniors. Authorities there have reported that a number of seniors have had scammers showing up to their homes posing as agents of the state’s Department of Health. Once inside the home, the scammers are asking victim’s for personal information and taking pictures of the homes’ interiors.

    If someone like this approaches your home, always ask to see their identification. Also, don’t be hesitant to call police if they start pressuring you to enter your home.

    ***

    As always, just because these scams aren’t currently happening in your area, doesn’t mean they won’t come there eventually. Now you have the knowledge to protect yourself from them.

     
  • Geebo 9:00 am on December 6, 2022 Permalink | Reply
    Tags: Apple, , , ,   

    Beware when buying gift cards for the holidays 

    Beware when buying gift cards for the holidays

    By Greg Collier

    Gift cards are one of the most talked about topics on this blog. Typically, it’s because gift cards are the currency of scammers. If someone asks you to pay them in gift cards, you’re likely being scammed. However, there is another problem with gift cards, even if you’re buying them for their intended purpose.

    Scammers and other cybercriminals will go into stores and record the information from the back of gift cards. They’ll then wait for someone to put funds on those cards. Once that’s done, the scammers will use the funds on those cards for themselves.

    This recently happened to a mother from the San Francisco Bay Area who was trying to buy Apple gift cards for her daughter. She bought a card at a supermarket and put $100 on it. When her daughter went to use the card, the funds were already gone. The mother then went to a pharmacy to get another Apple gift card, and again by the time she gave the card to her daughter it was already empty. She was eventually able to get a legitimate card from an Apple Store.

    Gift card scammers will often go into various stores and scratch the security strip from the card. They’ll document the card number before replacing the security strip with a sticker.

    There are some ways to protect yourself against this scam. First, you should always make sure the card has not been tampered with by inspecting the back of the card. Take a handful of cards from the rack and make sure they’re similarly marked on the back. Scammers will often place tampered cards up front to get the money quicker. Try purchasing a card from the middle of the pack instead.

    When buying gift cards, pay for them with a credit card whenever possible. A credit card will give you better protection against loss than if you had paid for the cards with cash or a debit card.

    If you receive a card that’s been emptied, you can try to contact the customer service number that’s on the back of the card. However, they can rarely ever get the money back or offer a refund.

     
  • Geebo 8:00 am on September 22, 2022 Permalink | Reply
    Tags: Apple, bing, , , fake ads, , ,   

    iPhone scam is symptom of bigger problem 

    iPhone scam is symptom of bigger problem

    By Greg Collier

    Recently, an iPhone user was locked out of her new iPhone. On her husband’s phone, she did a Google search for ‘Apple Customer Service’ and called the number she found. The person on the other end of the call said they’d be happy to help her out. Except, the woman hadn’t really called Apple. Instead, she had called a phony customer support number run by scammers. These scammers had accessed her iPhone and were able to use her Zelle app to steal $1500. However, this scam is not exclusive to either Apple or Google.

    This scam is a version of the tech support scam. Instead of trying to trick victims into believing there’s a virus on their device, this scam waits for someone with a tech problem to call the scammers. In these cases, the scammers take out ads on popular search engines. Not just Google, but Bing and Duck Duck Go as well. The scammers will submit a flurry of ads to these companies in hopes just a handful get through the vetting process. If the ads get approved, they can be listed at the top of the search engine rankings. While the search engine companies claim to be on top of the problem, scammers continue to have their ads for phony customer services approved.

    There are ways to protect yourself from this scam. The first is when you’re doing a web search, make sure the listing you’re about to click on doesn’t have a tiny ad indicator near it. These are usually little text boxes that say ‘Ad’, but sometimes have a color that’s similar to the page’s background. Another way to protect yourself is by going to the manufacturer’s website directly. For example, instead of doing a web search for Apple Customer Service, just go directly to apple.com in your device’s web browser. From there you should be able to find the customer support number if the company has one.

     
  • Geebo 8:00 am on July 28, 2022 Permalink | Reply
    Tags: Apple, , , ,   

    Couple loses $350K In Apple scam 

    By Greg Collier

    To be honest, there’s not a lot of information about this story. The report that we’ve read spends more time discussing the amount lost to the scammers, which, to be fair, is a lot. However, we can assume how the scam worked from previous scams in a similar vein. But, we’re getting ahead of ourselves.

    An elderly couple from the state of Michigan are said to have lost $350,000 to a tech support scam. The couple reportedly withdrew money from several different accounts to send money to the scammers through a Bitcoin ATM.

    The county sheriff’s office where this scam took place says that they are familiar with scams like this, but this is the largest amount lost they’ve ever seen.

    What we do know about the scam is that the couple received a message on their computer that appeared to come from Apple Computers with a phone number to call.

    This sounds a lot like the pop-up scams that claim to be from Microsoft. These pop-ups, which can lock up your computer, say things like your computer has a virus, or is in danger of being hacked. These pop-ups usually also instruct victims to call a phone number to resolve the issue.

    When a victim calls one of these phony customer service numbers, they’ll be told some outlandish tale about how their computer is being hacked, and the hackers are about to steal all the victim’s money. The victim will then be instructed that in order to protect their money, they need to move it somewhere safe. This is when the scammers will direct the victim to withdraw their money from their bank accounts and send it to the scammers in the forms of gift cards, cryptocurrency, or some other form of untraceable payment.

    What many victims don’t know is that companies like Apple, Microsoft, or Google don’t really know whether your computer has been compromised or not. If you receive one of these pop-up messages, turn your computer off. Hold down the power button until it turns off, if you need to. If the pop-ups continue, you may need to run a malware scan using a product like Malwarebytes. Malware and viruses are more likely to affect computers that run Microsoft Windows than Apple computers.

    If you still can’t get your computer to function properly, try taking the device to a computer repair store. It will cost you a lot less in the end than sending the money to scammers.

    But whatever you do, do not call the phone number in the pop-up message.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel