Yahoo Canada Web Search

Search results

  1. Aug 16, 2021 · Attach the scam email to your email to Apple do not forward the scam email. From: Recognize and avoid phishing messages, phony support calls, and other scams - Apple Support. "If you forward a message from Mail on your Mac, include the header information by selecting the message and choosing.

    • Overview
    • Passwords and purchases
    • Phishing and other scams
    • Lost or stolen products
    • Personal safety
    • Developer resources
    • Law enforcement
    • Journalists

    This page includes information about Apple product security for customers, developers, law enforcement personnel, and journalists.

    Apple is committed to protecting the security and privacy of our customers. You can learn more by visiting our Privacy pages, which include tips and information to help keep your devices and data safe. You can also ask us a question about privacy.

    If you believe you have discovered a security or privacy vulnerability in an Apple product, learn how to file a report.

    The information below may help with your security issue or question. If you need additional help, contact Apple Support.

    •If you believe that your Apple account (Apple ID) has been compromised, change your password immediately.

    •If you forgot your Apple ID password, learn how to reset it.

    If you receive a suspicious email that's designed to look like it’s from Apple, you can forward it to reportphishing@apple.com. Learn more about phishing and other scams.

    If you lose your device or think it might be stolen, these articles might help you find it and protect your information.

    •Learn what to do if your iPhone, iPad or iPod touch is lost or stolen.

    •Learn what to do if your Apple Watch is lost or stolen.

    •Learn what to do if your Mac is lost or stolen.

    If you’d like to revisit what you share with other people, or if you’re concerned that someone is accessing information you didn't share from your Apple device, the guide and the checklists below can help you understand what information you're sharing, how to identify risks, and how to make changes to protect your safety.

    •Download and read Device and Data Access when Personal Safety is At Risk.

    •Learn what to do if you want to see if anyone else has access to your device or accounts.

    •Learn what to do if you want to stop sharing with someone you previously shared with.

    Learn about security documentation and resources for developers.

    Contact Apple Developer Support to request assistance with certificate revocation or issuance.

    Please consult these guidelines for contacting Apple with law enforcement requests:

    •United States

    Journalists can contact Apple media relations at media.help@apple.com.

    Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

    Helpful?

    Yes No

    Character limit: 250

    Maximum character limit is 250.

  2. If you receive a suspicious FaceTime call (for example, from what looks like a bank or financial institution), email a screenshot of the call information to reportfacetimefraud@apple.com. To find the call information, open FaceTime and tap the More Info button next to the suspicious call.

  3. Dec 24, 2020 · If you receive a phishing email that's designed to look like it’s from Apple, send it to reportphishing@apple.com. If you forward a message from Mail on your Mac, include the header information by selecting the message and choosing Forward As Attachment from the Message menu.

  4. Sep 16, 2024 · On account.apple.com, select Devices and remove any devices associated with your Apple Account that you don't recognize. Check with your email provider and cellular carrier to make sure that you control every email address and phone number associated with your Apple Account.

  5. It can happen by email, phone, text message, or even through pop-up notifications when you’re browsing the web. Learn how to identify and report phishing emails and other suspicious messages. More ways to shop: Find an Apple Store or a retailer near you. Or call 18006927753.

  6. People also ask

  7. Sep 4, 2019 · Luckily, there are a lot of signs that you can look for in order to determine if someone is trying to illicitly obtain important credentials from you. Here's how you might be able to identify a phishing attack, and how to report one.