Pinterest Stumbleupon Whatsapp
Ads by Google

One of the most difficult threats to avoid is the phishing scam What Exactly Is Phishing & What Techniques Are Scammers Using? What Exactly Is Phishing & What Techniques Are Scammers Using? I’ve never been a fan of fishing, myself. This is mostly because of an early expedition where my cousin managed to catch two fish while I caught zip. Similar to real-life fishing, phishing scams aren’t... Read More , which attempts to scam users by mimicking a trusted website, service or company. Fortunately, such attacks usually give themselves away with poorly written emails or badly executed fake sites, but a recent scam targeting Apple’s customers has gained attention for the opposite reason.

Victims are hooked by an official-looking fake email informing them they need to update their billing information with Apple. A link that appears to point to the Apple Store 8 Tips On Getting The Most Out Of The Apple Mac App Store 8 Tips On Getting The Most Out Of The Apple Mac App Store I've been downloading, using, and reviewing Apple software and third-party related software for over ten years, and I have to say that the new Apple Mac App Store is probably one of the most convenient... Read More is included, but when clicked it re-directs users to a fake website that is apparently hosted on its own server.

To make matters worse, the fake site looks like a legitimate Apple login page. Only a support number that begins with a 0 instead of a 1 might alert users that something strange is going on. The site otherwise appears professional and is free of the grammar issues and improper or missing images that often give away such facades like this.

So what can you do to protect yourself? You could just avoid clicking email links, though that may not always be practical. Another idea is to pay attention to your URL bar to make sure that the proper URL appears when you visit a site. In the case of the fake site, the URL shows the IP address of the scammer’s server rather than the real Apple Store address. You could also use a security suite with built-in anti-phishing features.

For more tips on how to avoid these sorts of attacks, check out Danny’s article on common tactics that can help you avoid being phished 4 General Methods You Can Use To Detect Phishing Attacks 4 General Methods You Can Use To Detect Phishing Attacks A "phish" is a term for a scam website that tries to look like a site that you know might well and visit often. The act of all these sites trying to steal your account... Read More .

Ads by Google

Source: CNET

  1. James Bruce
    December 29, 2011 at 9:17 am

    Waaaah~ Macs have malware tooo! See!! SEE! 

    (lol, just kidding, just thought I'd add that before some other buffoon does)

    • Aibek
      January 12, 2012 at 11:32 am

      good one! )

Leave a Reply

Your email address will not be published. Required fields are marked *