Yahoo Canada Web Search

Search results

  1. Apr 24, 2021 · All such messages are scams. Do not interact with the message or the sender. Close the offending page and avoid sites that are involved in such bogus advertising tactics. Recognize and avoid phishing messages, phony support calls, and other scams - Apple Support.

  2. Feb 23, 2022 · Opened link on text message I received a text from my sister with a link in it. Of course stupid me clicked the link and it took me to a dirty picture. It was a joke, but now I am worried my phone either has a virus or been hacked. How do I know if it has been?

  3. Dec 16, 2021 · While your iPad is unlikely to be directly infected by malware, it is still possible to easily download an “infected” file to the iPad - which if transferred elsewhere still has the capacity to infect other computer systems with malware.

  4. Jan 25, 2022 · If you’re running iOS 15 or earlier, use this checklist to see who has access to your device or accounts. If you’re running iOS 16 or later, see How Safety Check on iPhone works to keep you safe. Check which devices are signed in to your account by going to Settings > [ your name ].

    • Overview
    • How to protect your Apple account and devices
    • How to report suspicious emails, messages, and calls
    • More information about phishing and other scams

    Use these tips to avoid scams and learn what to do if you receive suspicious emails, phone calls, or other messages.

    If you receive a suspicious email or SMS text message that looks like it's supposed to be from Apple, please email it to reportphishing@apple.com.1

    If you receive a suspicious FaceTime call or link to a FaceTime call in Messages or Mail, please email a screenshot of the call information or link to reportfacetimefraud@apple.com.

    Phishing refers to fraudulent attempts to get personal information from you, usually by email. But scammers use any means they can to trick you into sharing information or giving them money, including:

    •Fraudulent emails and other messages that look like they're from legitimate companies, including Apple

    •Misleading pop-ups and ads that say your device has a security problem

    Here are some things you can do to avoid scams that target your Apple account and devices.

    •Never share personal information like credit card numbers, unless you can verify the recipient is who they claim to be.

    •Protect your Apple ID. Use two-factor authentication, always keep your contact information secure and up to date, and never share your Apple ID password or verification codes with anyone. Apple never asks for this information to provide support.

    •Never use Apple Gift Cards to make other kinds of payments.

    •Learn how to identify legitimate Apple emails about your App Store or iTunes Store purchases. If you send or receive money with Apple Pay (U.S. only), treat it like any other private transaction.

    •Learn how to keep your Apple devices and data secure.

    •If you receive a suspicious email that looks like it's supposed to be from Apple, please forward it to reportphishing@apple.com.1

    •If you receive a suspicious FaceTime call (for example, from what looks like a bank or financial institution), email a screenshot of the call information to reportfacetimefraud@apple.com. To find the call information, open FaceTime and tap the More Info button next to the suspicious call.

    •If you receive a suspicious link to a FaceTime call in Messages or Mail, email a screenshot of the link to reportfacetimefraud@apple.com. The screenshot should include the phone number or email address that sent the link.

    •To report a suspicious SMS text message that looks like it's supposed to be from Apple, take a screenshot of the message and email the screenshot to reportphishing@apple.com.

    •To report spam or other suspicious emails that you receive in your iCloud.com, me.com, or mac.com Inbox, send them to abuse@icloud.com.

    •To report spam or other suspicious messages that you receive through Messages, tap Report Junk under the message. You can also block unwanted messages and calls.

    How to identify fraudulent emails and messages

    •The sender’s email or phone doesn’t match the name of the company that it claims to be from. •The email or phone they used to contact you is different from the one that you gave that company. •A link in a message looks right, but the URL doesn’t match the company’s website.2 •The message looks significantly different from other messages that you’ve received from the company. •The message requests personal information, like a credit card number or account password. •The message is unsolicited and contains an attachment.

    If you get a suspicious phone call or voicemail

    Scammers use fake Caller ID info to spoof phone numbers of companies like Apple and often claim that there's suspicious activity on your account or device to get your attention. Or they may use flattery or threats to pressure you into giving them information, money, and even Apple gift cards. If you get an unsolicited or suspicious phone call from someone claiming to be from Apple or Apple Support, just hang up. You can report scam phone calls to the Federal Trade Commission (U.S. only) at reportfraud.ftc.gov or to your local law enforcement agency.

    If you see suspicious Calendar events

    If you get an unwanted or suspicious calendar invitation in Mail or Calendar, you can report it as Junk in iCloud. If you might have unintentionally subscribed to a spam Calendar, you can delete it.

  5. Apr 17, 2024 · Look out for signs of a hacked device, like unexpected pop-ups, unknown apps, or fast battery drain. To confirm if your iPad is hacked, check for unusual activity or performance issues. To keep it safe, update to the latest iOS, use strong, unique passwords, and turn on two-factor authentication.

  6. People also ask

  7. Nov 8, 2023 · Signs that your Apple ID has been compromised. Apple notified you (notification or email) about accounty activity that you don't recognize (for example, if your Apple ID was used to sign in to a device that you don't recognize or your password was changed but you didn't change it).