Getting iPhony Messages?

Been reading up on Apple’s newly unveiled iPhone 5? So have scammers.

For months leading up to the announcement, scammers have already been finding ways to cash in on iPhone 5 buzz — through phishing emails promising sneak peeks if you just clicked on a link, or phony texts offering a chance to get your hands on one. According to news reports, clicking the links installed malware on your computer, or took you to a phony site asking for your personal information.

Today it’s the iPhone 5, tomorrow it will be something else. But if it’s hot news, scammers will try and use it to steal your personal information — and your money. That’s why you need to:

Treat your personal information like cash: Your Social Security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name.

Delete email and text messages that ask you to confirm or provide personal information: Legitimate companies don't ask for information like your account numbers or passwords by email or text.

Don’t reply, and don’t click on links provided in the message: Links can install malware on your computer and take you to spoof sites that look real but whose purpose is to steal your information.

Want to know more? Read about Computer Security, Phishing, and Malware.

Comments

my email is not opening

Hi, omosimua, you might want to try resetting your password. If that doesn't work, contact your email service provider. Go to their homepage and look for a "contact us" link.

Having problem with my yahoo account

Leave a Comment

Commenting Policy

Read Our Privacy Act Statement

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.