Recognize and avoid social engineering schemes including phishing messages, phony support calls, and other scams

Use these tips to avoid scams and learn what to do if you receive suspicious emails, phone calls, or other messages. Social engineering is a type of targeted attack that relies on impersonation, deception, and manipulation to gain access to your personal data. In this attack, scammers will pretend to be representatives of a trusted company or entity over the phone or through other communication methods. They will often use sophisticated tactics to persuade you to hand over personal details such as sign-in credentials, security codes, and financial information.

If you're suspicious about an unexpected message, call, or request for personal information, such as your email address, phone number, password, security code, or money, it's safer to presume that it's a scam — contact that company directly if you need to.

If you're concerned about a security issue with your Apple device or account, these resources provide more information that can help.

If you believe that your Apple ID has been compromised, or if you might have entered your password or other personal information on a scam website, change your Apple ID password immediately and ensure that two-factor authentication is enabled.

How to protect your Apple account and devices

Here are some things you can do to avoid scams that target your Apple account and devices.

How to report suspicious emails, messages, and calls

More information about social engineering attacks, phishing and other scams

Learn how to identify social engineering attacks, recognize phishing messages, handle fraudulent phone calls, and avoid other online scams.

Social engineering attackers use impersonation and manipulation to first gain your confidence and trust. Then, they trick you into handing over sensitive data or providing them with access to your account information. They use a variety of tactics to impersonate a trusted company, entity, or someone that you know.

Watch for these signs to help identify if you’re being targeted as part of a social engineering attack:

How to identify fraudulent emails and messages

Scammers try to copy email and text messages from legitimate companies to trick you into giving them your personal information and passwords. These signs can help you identify phishing emails:

If you get a suspicious phone call or voicemail

Scammers use fake Caller ID info to spoof phone numbers of companies like Apple and often claim that there's suspicious activity on your account or device to get your attention. Or they may use flattery or threats to pressure you into giving them information, money, and even Apple gift cards.

If you get an unsolicited or suspicious phone call from someone claiming to be from Apple or Apple Support, just hang up.

You can report scam phone calls to the Federal Trade Commission (U.S. only) at reportfraud.ftc.gov or to your local law enforcement agency.

If you see suspicious Calendar events

If you get an unwanted or suspicious calendar invitation in Mail or Calendar, you can report it as Junk in iCloud. If you might have unintentionally subscribed to a spam Calendar, you can delete it.

If your web browser displays annoying pop-ups

While browsing the web, if you see a pop-up or alert that offers you a free prize or warns you about security problems or viruses on your device, don't believe it. These types of pop-ups are usually fraudulent advertisements, designed to trick you into downloading damaging software or giving the scammer personal information or money.

Don't call the number or follow the links to claim the prize or fix the problem. Ignore the message and simply navigate away from the page or close the entire window or tab.

If you're prompted to download software

Use extreme caution if you download content from the internet. Some downloads found on the internet may not contain the software they claim to, or may contain software that you didn't expect or want. This includes apps that ask to install configuration profiles that can then control your device. If installed, unknown or unwanted software may become intrusive and annoying and could even damage your Mac and steal your data.

To avoid unwanted, fake, or malicious software, install software from the App Store or get it directly from the developer's website. Learn how to safely open software on your Mac or remove unwanted configuration profiles from your iPhone, iPad, or iPod touch.

1. To report an SMS text message, take a screenshot of the message and send it via email. If you forward a message from Mail on your Mac, include the header information by selecting the message and choosing Forward As Attachment from the Message menu.

2. To confirm the destination of a link on your Mac, hover your pointer over the link to see the URL. If you can't see the URL in the status bar in Safari, choose View > Show Status Bar. On your iOS device, you can touch and hold the link.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.