Recognize and avoid phishing messages, phony support calls, and other scams

Employ these tips to avert scams and acquire what to practise if y'all receive suspicious emails, phone calls, or other messages.

If you receive a suspicious email or SMS text message that looks like it'southward supposed to be from Apple tree, please e-mail it to reportphishing@apple.com.one

Phishing refers to fraudulent attempts to get personal information from y'all, usually by email. Simply scammers use whatever ways they tin to trick you into sharing data or giving them money, including:

  • Fraudulent emails and other messages that look like they're from legitimate companies, including Apple
  • Misleading pop-ups and ads that say your device has a security problem
  • Scam telephone calls or voicemails that impersonate Apple Support
  • Fake promotions that offer complimentary products and prizes
  • Unwanted Calendar invitations and subscriptions

If you're suspicious about an unexpected bulletin, telephone call, or request for personal information or money, information technology's safer to presume information technology's a scam and contact that company directly if you need to. If y'all're concerned virtually a security outcome with your Apple device, you lot can go help from Apple.


If you believe that your Apple tree ID has been compromised, or if you lot might take entered your password or other personal info on a scam website, change your Apple tree ID countersign immediately.

How to protect your Apple account and devices

Here are some things you tin practice to avoid scams that target your Apple account and devices.

  • Never share personal data like credit card numbers, unless yous can verify the recipient is who they claim to be.
  • Protect your Apple ID. Utilise 2-cistron authentication, ever keep your contact information secure and upwards to date, and never share your Apple ID password or verification codes with anyone. Apple never asks for this information to provide back up.
  • Never utilize Apple Souvenir Cards to make other kinds of payments.
  • Learn how to identify legitimate Apple tree emails most your App Store or iTunes Store purchases. If you lot send or receive money with Apple tree Pay (U.Southward. just), treat it like any other individual transaction.
  • Learn how to keep your Apple tree devices and information secure.
  • Download software only from sources you can trust.
  • Don't follow links or open or save attachments in suspicious or unsolicited messages.

How to written report suspicious emails, messages, and calls

  • If you receive a suspicious e-mail that looks similar information technology'south supposed to be from Apple, please forrard it to reportphishing@apple.com.ane
  • To report a suspicious SMS text message that looks similar it'south supposed to exist from Apple, take a screenshot of the bulletin and electronic mail the screenshot to reportphishing@apple.com.
  • To report spam or other suspicious emails that you receive in your iCloud.com, me.com, or mac.com Inbox, send them to abuse@icloud.com.
  • To study spam or other suspicious messages that you receive through Letters, tap Report Junk nether the message. You lot tin can also cake unwanted letters and calls.
  • Report scam telephone calls to the Federal Trade Commission (U.S. just) at reportfraud.ftc.gov or to your local law enforcement agency.

More information virtually phishing and other scams

Larn how to identify phishing messages, handle fraudulent telephone calls, and avert other online scams.

How to identify fraudulent emails and messages

Scammers try to re-create email and text messages from legitimate companies to trick y'all into giving them your personal information and passwords. These signs tin aid you identify phishing emails:

  • The sender'southward email or phone doesn't lucifer the name of the company that information technology claims to exist from.
  • The email or phone they used to contact you is different from the i that you gave that company.
  • A link in a message looks right, only the URL doesn't match the company'south website.ii
  • The message looks significantly unlike from other messages that y'all've received from the visitor.
  • The bulletin requests personal information, similar a credit card number or account password.
  • The bulletin is unsolicited and contains an attachment.

If you get a suspicious phone call or voicemail

Scammers use fake Caller ID info to spoof telephone numbers of companies like Apple and often merits that there's suspicious activity on your business relationship or device to go your attention. Or they may employ flattery or threats to pressure you into giving them data, coin, and even Apple gift cards.

If you get an unsolicited or suspicious phone call from someone claiming to be from Apple or Apple Support, but hang up.

You tin can report scam telephone calls to the Federal Trade Commission (U.S. simply) at reportfraud.ftc.gov or to your local constabulary enforcement agency.

If you run into suspicious Calendar events

If you lot get an unwanted or suspicious calendar invitation in Postal service or Calendar, you lot can report it as Junk in iCloud. If y'all might have unintentionally subscribed to a spam Calendar, you lot can delete it.

If your web browser displays annoying popular-ups

While browsing the web, if you see a pop-up or alarm that offers you a costless prize or warns you lot virtually security problems or viruses on your device, don't believe it. These types of pop-ups are usually fraudulent advertisements, designed to trick yous into downloading damaging software or giving the scammer personal data or money.

Don't call the number or follow the links to claim the prize or gear up the problem. Ignore the message and just navigate abroad from the page or shut the entire window or tab.

If you lot're prompted to download software

Use extreme caution if you lot download content from the internet. Some downloads found on the internet may non contain the software they claim to, or may contain software that you didn't look or want. This includes apps that ask to install configuration profiles that can then control your device. If installed, unknown or unwanted software may go intrusive and annoying and could fifty-fifty damage your Mac and steal your data.

To avoid unwanted, fake, or malicious software, install software from the App Store or go it direct from the developer'due south website. Learn how to safely open software on your Mac or remove unwanted configuration profiles from your iPhone, iPad, or iPod bear on.

1. To study an SMS text bulletin, take a screenshot of the message and transport it via email. If you forrad a bulletin from Mail on your Mac, include the header information by selecting the message and choosing Frontwards As Attachment from the Bulletin menu.

ii. To confirm the destination of a link on your Mac, hover your pointer over the link to encounter the URL. If you can't see the URL in the status bar in Safari, choose View > Show Status Bar. On your iOS device, you can touch on and hold the link.

Information about products not manufactured past Apple tree, or independent websites non controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the choice, performance, or apply of third-political party websites or products. Apple makes no representations regarding 3rd-party website accurateness or reliability. Contact the vendor for additional information.

Published Date: