We’ve recently heard that scammers are recycling an old phishing attempt. In this version, scammers, posing as a well-known tech company, email a phony invoice showing that you’ve recently bought music or apps from them. The email tells you to click on a link if you did not authorize the purchase. Stop – do not click on the link. That’s the new twist on an old scam.
More precisely, you just experienced a phishing attempt – that is, when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information. The scammers then use that information to commit fraud or identity theft.
Scammers also use phishing emails to get access to your computer or network – then they install programs like ransomware that can lock you out of important files on your computer.
Here are some tips to help keep your information secure:
- Be suspicious if a business, government agency, or organization asks you to click on a link that then asks for your username or password or other personal data. Instead, type in the web address for the organization or call them. The link in the email may look right, but if you click it you may go to a copycat website run by a scammer.
- Be cautious about opening attachments. A scammer could even pretend to be a friend or family member, sending messages with malware from a spoofed account.
- Set your security software to update automatically, and back up your files to an external hard drive or cloud storage. Back up your files regularly and use security software you trust to protect your data.
Lastly, report phishing emails and texts by forwarding them to spam@uce.gov and filing a report with the FTC.
63 Comments
In reply to Why don't you post example by TonyJ
In reply to On all cell phones should be by mamabear
In reply to On all cell phones should be by mamabear
In reply to I have recently received two by Bobby
In reply to I have recently received two by Bobby
In reply to I have recently received two by Bobby
In reply to I too got the same email and by greensyas
Sometimes scammers send messages that include malware, and when you click on a link it activates the malware.This FTC article about malware (malicious software) tells what to do if you start to notice problems with your computer.
Your information on watching scammers are insightful. As business adviser, I appreciate and value your inputs. Thank you for caring and having a watchful eyes, to protect small business
In reply to I too get alot of emails by Diane E
In reply to I received an e mail tonight by Scammed
This FTC article about malware (malicious software) tells how to detect and get rid of malware if you notice it on your computer.
In reply to Just like Almost Got Me above by l311
In reply to Just like Almost Got Me above by l311
My friend received an email early hours of this morning with my name as the sender.. Addressed to my friend and it said.. I am near Adelaide. This email was not sent by me plus the senders address is the email address above?? This is highly suspicious.. Does anybody know what this is.??
Does this look like a fake email..? What a Scam!
I am Mr Bamba Claude an Auditor Officer, PNC bank . I need your collaboration and your Services to disguise 2.5M dollars Euros from an account where we conceal the fund after Nicolas Sarkozy lost French election of 2011. The fund was part of the gift given by late Libyan president to the former French president Nicolas Sarkozy for his re-election. Pressure Under the current investigation on the issue, pushed me to contact you, nobody knows about this deposit in the bank. My intent is to contact you to aid in the safekeeping and to invest the fund with you, Reply strictly through my personal Email: bamba_ claude@ africamel. net for more details. Have a nice day, anticipating your communication. Regards, Mr. Bamba Claude Senior Audior Officer, PNC Bank
Pagination
Read Our Privacy Act Statement
It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.
Comment Policy
This is a moderated blog; we review all comments before they are posted. We expect participants to treat each other and the bloggers with respect. We will not post comments that do not comply with our commenting policy. We may edit comments to remove links to commercial websites or personal information before posting them.
We won’t post:
Comments submitted to this blog become part of the public domain. To protect your privacy and the privacy of others, please do not include personal information. Also, do not use this blog to report fraud; instead, file a complaint.