Warning for iPhone users .. Fraudulent calls from the electronic newspaper "Apple"



[ad_1]

Communication – Agencies:

IPhone users are exposed to phishing calls that appear to come from Apple, but to phishing calls in which fraudsters are trying to steal customer data.

In some attacks, some people seem to belong to Apple's customer service, company-owned phone numbers, know each other well before asking for information, and it's almost impossible to know that calls come from anywhere else.

These tips became so sophisticated that they tricked Jody Westby, CEO of Global Cyber ​​Risk, and announced the call to Judy Westby, who actually looked like Apple after all the information available on his iPhone. , Many iCloud servers have been hacked and their data will no longer be safe.

The call added that he had to stop all his device activities and immediately call another number to ensure the security of his data and contact the Apple Customer Service Representative, but did not contacted Apple to confirm the call, to respond to the employee that Apple's technical support service did not contact anyone and IKLOD's servers were not hacked, which suggests that the call was made by fraudsters who were seeking information and data.

According to the report, the call was linked to Apple's actual technical support number, indicating the company's Internet address, its street address and the actual technical support number, and the phone provider mobile and the iPhone were not able to identify the difference, Of course, these numbers are managed by crooks who ask for information such as login information, which they can then use to open iCloud accounts or to transfer money directly.

The attacks seem more detailed and credible, and the IOS operating system is unable to distinguish between the real call from Apple and phishing calls, and it's almost impossible for ordinary users to make sure that This type of phishing-based phishing call is a fake phishing call that makes it difficult to process, even for people who monitor and monitor such hints.

[ad_2]
Source link