Phishing and iTunes card scams

apple phishing

From time to time we want to remember that phishing or identity theft is still present. And is that this past week several users reported a increase in Apple phishingThese emails posing as Apple are not new and seem to have escalated this month's end.

Banks, bookmakers, blocked Apple IDs, email accounts or even iTunes cards are usually the bait to try to steal private information from a user. At Apple they have experience with cards from iTunes, App store and Mac App Store. 

Never share passwords or private data

As we always comment in these types of articles, it is important to be clear that you do not have to share personal data or card passwords with anyone, but this goes a step further in the network since it is increasingly difficult to see that these are attacks phishing. I recently received "a battery of emails" supposedly from Amazon in which they told me that my account was "hacked" to change the password by accessing from the link at the end of the email. Logically I did not agree but it is easy to fool an unaccustomed user.

In Apple the same thing happens with some emails and it is sometimes difficult to discover the deception if you are not attentive. For this reason, always before sharing data or accessing links, we have to calmly see the mail or message received and look for the details. We We always advise looking at the sender of the mail, in most cases there you realize that you are facing an identity theft since they show an address that has nothing to do with the company, with iTunes emails it happens frequently.

Be that as it may, stay alert for the increase in phishing or identity theft that these days it seems to be on the rise.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.