Identify and prevent phishing on your Apple device

Congratulations, you won a big cash prize! Enter your email address here to claim the prize. ‘ This is an obvious example of phishing, but the fraud method is getting more and more sneaky. In 4 questions and answers, we update you on phishing on your Apple device.

Identifying, preventing and addressing phishing scams on Apple devices

Have you ever received an email saying you won a big cash prize or another gift? All you have to do is tap on the enclosed link and enter your details to receive the reward. This is a glaring example of phishing, but the tactics to trick you are getting better and better. In these short questions and answers, we quickly update you on phishing on iOS.

1. What is phishing?

Malware, ransomware, adware, spyware: there are a lot of tactics that malicious parties use to defraud you. Phishing is easy to remember, however, because the name already reveals the meaning. With phishing, criminals try to get you in via a bait, such as the prospect of a big prize. They use fake emails, text messages and even WhatsApp messages for this.

2. What is the purpose of phishing?

There is not one standard example of phishing on your Apple device. Sometimes the ‘fishermen’ are looking for a copy of your identity card or passport, so that they can present themselves under your identity. Other times, the malicious parties are, for example, your credit card details or login details for a website.

Phishing Apple

3. How can I recognize it?

One thing is certain: phishing is becoming more and more sophisticated. For example, e-mails are copied with extreme precision so that it looks as if you have actually received a message from your bank, energy supplier or telecom provider. Text messages, LinkedIn messages and other forms of phishing are also getting better.

Sender

In any case, always pay close attention to the sender of a message. Malicious people often use addresses that resemble those of the original instance. Consider, for example, the fictitious e-mail address Klantenservicee@coolblue.nl instead of the real address customerservice@coolblue.nl.

Show

It is also wise to pay attention to the tone and content of the message. Phishers try to ‘catch you in’ with bait, or an attractive offer. They therefore promise you a nice gift, a luxury holiday or a large cash prize. All you have to do is tap the link. You should never do this, because then you will end up on their (also) counterfeit website and the problems really start.

Issues

There is also often a problem with phishing. The malicious parties try to play on your gut feeling and therefore there is often a problem. For example, you would not have paid your energy bill for months and would be closed within 24 hours, unless you immediately transfer the outstanding amount via the (counterfeit) website. A legitimate company would never communicate in this ad hoc manner.

Phishing Apple screen 1

Not personal

Furthermore, phishing messages are often not personal. The messages therefore do not have a personal salutation, but start with something like “Dear customer / colleague / subscription holder”. It is of course very unbelievable that a company does not bother to address you by name, especially when it concerns something important. Finally, never, really never just open attachments from dubious messages. These can contain all kinds of misery, such as malware or ransomware.

4. What to do about phishing on your Apple device?

As long as phishing continues to yield enough, the form of scam will continue to exist. You can, however, make it harder for criminals by raising phishing messages. Therefore, always forward the e-mail, text message or WhatsApp to the organization whose name is being misused. For example, your bank, energy provider or another body may be able to start an investigation.

You can also do phishing report it to the Fraud Help Desk. This foundation was created to tackle fraud. And not without success, because 70,000 phishing emails arrive every month. You can call the abuses via the website, chat or by telephone. Always send the phishing message to the authority. When sufficient complaints are received, a large-scale investigation can be started.

Secure Apple devices

Whether you use an iPhone, iPad, Mac or Apple Watch, chances are you keep a lot of personal files and data on it. Good security is therefore very important. So set the iPhone security options, get a good passwords app, and read our basic tips for securing your Mac.

  • Apple gives hackers special iPhones to check iOS security (23-12-2020)
  • Tip: recognize and prevent WhatsApp fraud in 6 steps (12-10-2020)
  • Secure your Twitter account with two-factor authentication: that’s how it works (7/26/2020)
  • Tip: Make your Mac’s hard drive (Book) more secure with FileVault (7/19/2020)
  • Make your Apple device more secure with two-factor authentication – that’s how it works (6/27/2020)

Recent Articles

Related Stories