Recognise and avoid phishing letters, phony support calls and other scams

Apply these tips to avoid scams and discover out what to do if yous receive suspicious emails, telephone calls or other letters.

If y'all receive a suspicious e-mail or SMS text message that looks like it'southward supposed to be from Apple, delight e-mail information technology to reportphishing@apple.com.1

Phishing refers to fraudulent attempts to get personal information from yous, commonly by email. But scammers utilise any means they tin can to play tricks you into sharing data or giving them money, including:

  • Fraudulent emails and other letters that expect like they're from legitimate companies, including Apple
  • Misleading pop-ups and ads that say your device has a security problem
  • Scam telephone calls or voicemails that impersonate Apple Support
  • Imitation promotions that offering gratis products and prizes
  • Unwanted Agenda invitations and subscriptions

If you're suspicious nearly an unexpected message, phone call or request for personal data or money, information technology's safer to assume that it's a scam and contact that company direct if you need to. If you're concerned near a security issue with your Apple device, you can get help from Apple tree.


If you lot believe that your Apple tree ID has been compromised, or that you may have entered your countersign or other personal info on a scam website, modify your Apple ID password immediately.

How to protect your Apple account and devices

Here are some things yous can do to avoid scams that target your Apple tree account and devices.

  • Never share personal data such equally credit carte du jour numbers, unless you can verify the recipient is who they merits to be.
  • Protect your Apple ID. Use two-factor authentication, always keep your contact information secure and up to date, and never share your Apple tree ID password or verification codes with anyone. Apple never asks for this information to provide support.
  • Never use Apple Gift Cards to make other kinds of payments.
  • Observe out how to identify legitimate Apple emails about your App Shop or iTunes Shop purchases. If you send or receive money with Apple Pay (US but), treat it like any other individual transaction.
  • Learn how to keep your Apple tree devices and data secure.
  • Only download software from sources you can trust.
  • Don't follow links or open up or relieve attachments in suspicious or unsolicited messages.

How to written report suspicious emails, letters and calls

  • If you receive a suspicious email that looks like it's supposed to be from Apple, please forward information technology to reportphishing@apple.com.1
  • To report a suspicious SMS text bulletin that looks like information technology's supposed to be from Apple, have a screenshot of the bulletin and electronic mail the screenshot to reportphishing@apple tree.com.
  • To study spam or other suspicious emails that you receive in your iCloud.com, me.com or mac.com Inbox, ship them to abuse@icloud.com.
  • To written report spam or other suspicious messages that y'all receive through Messages, tap Written report Junk nether the message. Yous can also cake unwanted messages and calls.
  • Report scam phone calls to the Federal Trade Commission (U.s. only) at reportfraud.ftc.gov or to your local police force enforcement agency.

More information about phishing and other scams

Find out how to identify phishing letters, handle fraudulent phone calls and avert other online scams.

How to identify fraudulent emails and letters

Scammers try to copy email and text messages from legitimate companies to play tricks you into giving them your personal information and passwords. These signs can assist you identify phishing emails:

  • The sender'southward email accost or telephone number doesn't match the proper noun of the visitor information technology claims to be from.
  • The electronic mail address or phone number they used to contact yous is different from the one you gave that company.
  • A link in a message looks right, just the URL doesn't match the visitor'south website.2
  • The message looks significantly different from other letters you've received from the company.
  • The message requests personal data, such every bit a credit menu number or account password.
  • The message is unsolicited and contains an attachment.

If you get a suspicious phone call or voicemail

Scammers use faux Caller ID info to spoof phone numbers of companies such as Apple and often claim that there's suspicious activity on your account or device to become your attention. Or they may use flattery or threats to pressure you into giving them information, coin and even Apple gift cards.

If you get an unsolicited or suspicious phone call from someone challenge to exist from Apple or Apple tree Support, but hang upwards.

You lot can report scam phone calls to the Federal Trade Committee (U.s.a. merely) at reportfraud.ftc.gov or to your local law enforcement agency.

If yous see suspicious Calendar events

If you get an unwanted or suspicious calendar invitation in Post or Agenda, you can report it every bit Junk in iCloud. If you may have unintentionally subscribed to a spam Calendar, you lot tin can delete it.

If your spider web browser displays annoying pop-ups

While browsing the web, if you meet a popular-up or alarm that offers you a free prize or warns you nigh security problems or viruses on your device, don't believe it. These types of pop-ups are normally fraudulent advertisements, designed to trick you into downloading damaging software or giving the scammer personal information or money.

Don't telephone call the number or follow the links to claim the prize or set up the trouble. Ignore the bulletin and but navigate abroad from the folio or close the entire window or tab.

If you lot're prompted to download software

Employ extreme caution if you download content from the Internet. Some downloads found on the Net may not incorporate the software they claim to, or may contain software that you didn't wait or want. This includes apps that inquire to install configuration profiles that tin can and so control your device. If installed, unknown or unwanted software may become intrusive and annoying and could fifty-fifty damage your Mac and steal your data.

To avert unwanted, imitation or malicious software, install software from the App Store or get it directly from the programmer's website. Discover out how to safely open software on your Mac or remove unwanted configuration profiles from your iPhone, iPad or iPod touch.

ane. To report an SMS text message, have a screenshot of the message and transport it via e-mail. If you forwards a message from Postal service on your Mac, include the header information past selecting the message and choosing Forward As Attachment from the Bulletin menu.

2. To confirm the destination of a link on your Mac, hover your arrow over the link to come across the URL. If you lot can't see the URL in the status bar in Safari, choose View > Show Condition Bar. On your iOS device, y'all can impact and agree the link.

Information almost products non manufactured by Apple tree, or independent websites not controlled or tested past Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance or employ of third-party websites or products. Apple tree makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: