How to protect Apple ID and avoid scams - 9to5Mac (2024)

How to protect Apple ID and avoid scams - 9to5Mac (1)

Scams like phishing and social engineering are continuing to grow with some specifically targeting Apple users. With that in mind, Apple has shared a new support document with official tips on how to protect your Apple ID and other online accounts, how to spot and report scam emails, calls, and more.

We’ve seen a few different scams recently aimed at Apple users with a “smishing” iCloud link attack being the latest.

As it happens, Apple has shared a new support document on how to protect your account, avoid phishing, social engineering, scam calls, and more.

Along with being a valuable refresher for everyone, this is a great resource to share with less tech-savvy family and friends.

Apple’s advice on how to protect your Apple ID and avoid scams

Protecting your Apple account

Here are Apple’s 8 tips to make your Apple ID as secure as possible:

  • Never share personal data or security information like passwords or security codes, and never agree to enter them into a webpage that someone directs you to.
  • Protect your Apple ID. Usetwo-factor authentication, always keep your contact information secure and up to date, and never share your Apple ID password or verification codes with anyone. Apple never asks for this information to provide support.
  • Never use AppleGift Cardsto make payments to other people.
  • Learn how to identify legitimate Apple emails about yourApp Store or iTunes Store purchases. If yousend or receive money with Apple Cash(U.S. only), treat it like any other private transaction.
  • Learn how tokeep your Apple devices and data secure.
  • Download software only from sources you can trust.
  • Don’t follow links or open or save attachments in suspicious or unsolicited messages.
  • Don’t answer suspicious phone calls or messages claiming to be from Apple. Instead, contact Apple directly through ourofficial support channels.

Apple also has a dedicated support document on getting help with security if you run into trouble with passwords/purchases, lost or stolen products, personal safety, and more.

How to handle suspicious emails, messages, and calls

How to protect Apple ID and avoid scams - 9to5Mac (2)
  • If you receive a suspicious email that looks like it’s supposed to be from Apple, please forward it toreportphishing@apple.com.
  • If you receive a suspicious FaceTime call (for example, from what looks like a bank or financial institution), email a screenshot of the call information toreportfacetimefraud@apple.com. To find the call information, open FaceTime and tap theMore Info button “i”next to the suspicious call.
  • If you receive a suspicious link to a FaceTime call in Messages or Mail, email a screenshot of the link toreportfacetimefraud@apple.com. The screenshot should include the phone number or email address that sent the link.
  • To report a suspicious SMS text message that looks like it’s supposed to be from Apple,take a screenshotof the message and email the screenshot toreportphishing@apple.com.
  • To report spam that you receive in your iCloud.com, me.com, or mac.com Inbox, mark the spam emails as Junk or move them to your iCloud Junk folder. When you mark an email as junk, you help improve iCloud Mail filtering and reduce future spam.
  • To report harassment, impersonation, or other types of abuse that you receive in your iCloud.com, me.com, or mac.com Inbox, send them toabuse@icloud.com.
  • To report spam or other suspicious messages that you receive through Messages, tap Report Junk under the message. You can alsoblock unwanted messagesand calls.
  • Report scam phone calls to the Federal Trade Commission (U.S. only) atreportfraud.ftc.govor to your local law enforcement agency.

How to catch social engineering, phishing, and other scams

Social engineering attackers use impersonation and manipulation to first gain your confidence and trust. Then, they trick you into handing over sensitive data or providing them with access to your account information. They use a variety of tactics to impersonate a trusted company, entity, or someone that you know.

Watch for these signs to help identify if you’re being targeted as part of a social engineering attack:

  • A scammer may call you from what appears to be a legitimate phone number for Apple or another trusted company. This is called “spoofing.” If the call seems suspicious, consider hanging up and dialing the vetted number for the company yourself.
  • Scammers often mention personal information about you in an attempt to build trust and seem legitimate. They may refer to information that you consider private, such as your home address, place of employment, or even your Social Security number.
  • They will often convey a desire to help you resolve an immediate problem. For example, they may claim that someone broke into your iPhone or iCloud account, or made unauthorized charges using Apple Pay. The scammer will claim they want to help you stop the attacker or reverse the charges.
  • The scammer usually creates a strong sense of urgency to avoid giving you time to think and to dissuade you from contacting Apple yourself, directly. For example, the scammer may say that you’re free to call Apple back, but the fraudulent activities will continue and you will be liable. This is false, and designed to prevent you from hanging up.
  • Eventually scammers will request your account information or security codes. Typically they will send you to a fake website that looks like a real Apple sign-in page and insist that you verify your identity. Apple will never ask you to log in to any website, or to tap Accept in the two-factor authentication dialog, or to provide your password, device passcode, or two-factor authentication code or to enter it into any website.
  • Sometimes, scammers will ask you to disable security features liketwo-factor authenticationorStolen Device Protection. They will claim that this is necessary to help stop an attack or to allow you to regain control of your account. However, they are trying to trick you into lowering your security so that they can carry out their own attack. Apple will never ask you to disable any security feature on your device or on your account.

How to catch scam texts and emails

Scammers try to copy email and text messages from legitimate companies to trick you into giving them your personal information and passwords. These signs can help you identify phishing emails:

  • The sender’s email or phone doesn’t match the name of the company that it claims to be from.
  • The email or phone they used to contact you is different from the one that you gave that company.
  • A link in a message looks right, but the URL doesn’t match the company’s website.
  • The message looks significantly different from other messages that you’ve received from the company.
  • The message requests personal information, like a credit card number or account password.
  • The message is unsolicited and contains an attachment.

Downloading apps

Apple also warns about downloading software, highlighting that the safest way to install apps is through its official App Store or directly from a developer’s website.

Apple ID password reset attack

How to protect Apple ID and avoid scams - 9to5Mac (3)

One recent scam that Apple didn’t cover in this support document is the Apple ID password reset attack that resurfaced this year.

We’ve got a full explainer on how to handle that:

  • Here’s how to protect against iPhone password reset attacks

Have you been seeing more scams this year? Share your experience in the comments!

FTC: We use income earning auto affiliate links. More.

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

How to protect Apple ID and avoid scams - 9to5Mac (2024)

FAQs

What to do about Apple scams 2024? ›

If you receive a suspicious email that looks like it's supposed to be from Apple, please forward it to reportphishing@apple.com. next to the suspicious call. If you receive a suspicious link to a FaceTime call in Messages or Mail, email a screenshot of the link to reportfacetimefraud@apple.com.

What can scammer do with Apple ID? ›

If scammers gain access to your Apple ID, they can find all sorts of sensitive information that could be used to steal your identity. Take over your Apple ID email and request password resets to other accounts. With access to your iCloud email, scammers can request password resets for any of your linked accounts.

Does Apple text you about your Apple ID? ›

No, they do not. That seems to be a scam/phishing email/text. Apple won't send you an email/text telling you your account is disabled/restricted or will be disabled/restricted.

How can I help Apple phishing? ›

Phishing and other scams

If you receive a suspicious email that's designed to look like it's from Apple, you can forward it to reportphishing@apple.com. Learn more about phishing and other scams.

How do I stop scams on my iPhone? ›

Go to Settings > Messages. Scroll down to Message Filtering, then turn on Filter Unknown Senders.

How to protect your Apple ID? ›

Apple requires that you use a strong password for your Apple ID—eight or more characters, including upper and lowercase letters and at least one number. Never share your Apple ID password, verification codes, or account security details with anyone. Don't use your Apple ID password with other online accounts.

How to check if your Apple ID has been hacked? ›

Signs that your Apple ID has been compromised

Apple has notified you (notification or email) about account activity that you don't recognise (for example, if your Apple ID was used to sign in to a device that you don't recognise or your password was changed but you didn't change it).

Can someone hack you if they have your Apple ID? ›

Your Apple ID gives hackers access to your devices, personal data, geographic location, payment methods, and more.

How do I check if my Apple ID is being used by someone else? ›

Sign in to the Apple ID website (https://appleid.apple.com) and review all the personal and security information in your account to see if there is any information that someone else has added. If you have two-factor authentication turned on, review trusted devices for any devices that you don't recognize.

What is an example of an Apple ID email? ›

An Apple ID gives you access to all Apple services, including the App Store, Apple Music, iCloud, iMessage, FaceTime and more. It consists of an email address (for example, daniel_rico1@icloud.com) and a password.

What does a fake Apple security alert look like? ›

If you receive a pop-up notification on your Mac saying it's been compromised or hacked, then it's a fake Apple security alert. First, don't call any numbers or click on any links associated with the fake pop-ups.

Can someone access your text messages with your Apple ID? ›

If someone else has access to your Apple ID, they can view information that is synced across devices, which may include such things as Messages and location. Learn here how to secure your Apple ID on iPad, iPhone, and Mac.

How do I see what devices are using my Apple ID? ›

From the Devices section of your Apple ID account page, you can find all of the devices you're currently signed in to with your Apple ID, including Android devices, consoles and smart TVs: Sign in to appleid.apple.com,* then select Devices.

Are the Apple warnings real? ›

Is the Apple Security Alert Real? If you're seeing pop-up messages warning you of security alerts or virus attacks against your Apple device, you're most likely worried. But while these messages may look real, they're almost certainly scams.

What to do if Apple keeps taking money? ›

Contact Apple for support and service ➞ "See a list of Apple phone numbers around the world." If you didn't receive an invoice from Apple and there's nothing in your purchase history, the charges were not from Apple. Contact your bank or credit card issuer and report fraud.

How will Apple refund me? ›

If you paid by credit or debit card, refunds will be sent to the card-issuing bank within five business days of receipt of the returned item or cancellation request. Please contact the card-issuing bank with questions about when the credit will be posted to your account.

Does Apple collect your information? ›

To process transactions, Apple must collect data such as your name, purchase, and payment information. Communicate with You.

References

Top Articles
12 Stunning Almond Acrylic Nails to Try in 2024 - Zohna
60 Best Haircuts and Hairstyles for Women Over 60 | Sixty and Me
The Advantages of Secure Single Sign-on on the BenQ Board
R/Honkaistarrail
Google Jobs Denver
Smsgt Promotion List
Watch After Ever Happy 123Movies
Tweaker Configuration
Best NBA 2K23 Builds for Every Position
Red Wing Boots Dartmouth Ma
What Was D-Day Weegy
Gasbuddy Costco Hawthorne
Blackboard Utoledo
Farmers And Merchants Bank Broadway Va
Finger Lakes 1 Police Beat
Ta Travel Center Las Cruces Photos
Busted Newspaper Randolph County
Tacos Diego Hugoton Ks
2006 Lebanon War | Summary, Casualties, & Israel
Overload RS3 Guide - Rune Fanatics
General Kearny Inn Motel & Event Center
Exploring IranProud: A Gateway to Iranian Entertainment
Antonios Worcester Menu
Gambler's Phrase Of Defeat
Danielle Moodie-Mills Net Worth
Www.statefarm
Pa Lottery Remaining Prizes Scratch Offs
Lufthansa LH456 (DLH456) from Frankfurt to Los Angeles
Kagtwt
Wolf Of Wallstreet 123 Movies
Gracex Rayne
How Much Does Hasa Pay For Rent 2022
Ups Customer Center Locations
Megan Eugenio Exposed
Duluth Craigslist Boats
10000 Divided By 5
Goodwill Southern California Store & Donation Center Montebello Photos
4225 Eckersley Way Roseville Ca
Barbarian Frenzy Build with the Horde of the Ninety Savages set (Patch 2.7.7 / Season 32)
Honda Fury Forums
Hyb Urban Dictionary
Diabetes Care - Horizon Blue Cross Blue Shield of New Jersey
Damaged car, damaged cars for sale
[PDF] (Indices und Systematiken) - Free Download PDF
Lowlifesymptoms Twitter
5 Pros & Cons of Massage Envy (VS Independent Massage Therapists)
Embu village mines precious coltan for years 'without knowing its value’
ᐅ Autoverhuur Rotterdam | Topaanbiedingen
Craigslist Farm And Garden Atlanta Georgia
A Man Called Otto Showtimes Near Cinemark Palace 20
Amanda Balionis Renner Talks Favorite Masters Interviews, the Evolution of Golf Twitter, and Netflix’s ‘Full Swing’
new hampshire real estate - craigslist
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 6189

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.