iPhone Users Being Targeted

According to a report today on News12 Long Island, cybersecurity expert warns of scam targeting iPhone users.  News12 reports that a new text message scam targeting Apple iPhone users could leave you with an empty bank account.

The newest scam is known as a phishing scam to access personal information after it sends a malicious message alerting that your account has been locked.

As reported from News12 Long Island’s source, Cybersecurity expert Matt Pascucci says thousands of text messages like that are sent out every day. He says the scam can be successful because the text message looks legitimate.

To refer to the report, click here:  http://longisland.news12.com/news/numbers-and-links/cybersecurity-expert-warns-of-scam-targeting-iphone-users-1.13346679

Here Are a Some Ways to Help You Spot Scam Texts:

Many banks try to avoid the risk of scamming opportunities by not sending texts.  If they do send texts you should find out what number they use to send the texts so you will know if they are legitimate. Most of the time scammers use spoofed alias numbers that look like they are from your bank, so you should be aware and not reply directly. You can check if the text was legitimate or not by contacting your bank.

If it is really your bank texting you, then they should know exactly what you are talking about when you call them using the phone number on your latest statement. If they say there are no issues with your account, then the text was some type of scam.

  • Review your bank’s and credit card company’s policy on sending text messages
  • Beware of messages that have a number that says it is from “5000”
  • Ask yourself if the suspicious text preys on the following fears:
    • Fear of someone stealing your money
    • Fear of being accused of a crime that you did not commit
    • Fear of someone doing harm to you or your family
    • Fear of something embarrassing being revealed about you (whether it is true or not)
  • Never reply to a suspicious text without doing research and verifying the source.