iPhone 14: Kaspersky warns of fraud attempts

Phishing with new iPhones

Even before the official start of sales of the iPhone 14, numerous phishing sites were in circulation, primarily targeting sensitive user data.


Kaspersky warning: Fake iPhone 14 sweepstakes
Kaspersky shows an example of a phishing page in German: You should receive an iPhone 14 Pro for participating in an alleged loyalty program.
© Kaspersky

The release of the iPhone 14 and the associated Pro versions is just around the corner: the new smartphones are to be presented on September 7th and will probably be available for pre-order shortly. However, the hype surrounding the new iPhones also means that fraudsters with various phishing sites see their chance – the security experts at Kaspersky warn against this.

Fake shop websites or sweepstakes lure iPhone 14

The new iPhone 14 is offered on the fraudulent websites either for sale or as a prize in a raffle. Bank details should then be entered via online banking, which the fraudsters then use to debit an amount – but the victim does not receive a device.

Personal data is also at risk from the phishing scam: These sites can also request the entry of the Apple login data via a fake login mask, which can be intercepted after sending and potentially used for further compromise. The iCloud would then also be in the hands of the attackers.

These would not only try to get hold of the sensitive information via such websites. The cybercriminals also become active via “vishing” (short for voice phishing): Sites suggest an immediate blocking of the Apple ID, which can only be averted by calling a fake Apple hotline. The scammers then use this phone call to try to obtain personal data.

How do I protect myself from the scam?

To protect against such fraud attempts, Kaspersky recommends a basic verification of the pages for authenticity. URL formats and the spelling of company names should be checked several times before personal data is entered. In addition, links in emails should not be clicked if users do not know the sender; instead, the corresponding URL should be entered manually into the address bar.

31.8.2022 von Jusuf Hatic

Continue to home page

more on the subject

iphone 12 mini size comparison

child protection

Controversial feature planned: photo surveillance in iOS 15?

With the introduction of iOS 15, Apple plans to use “CSAM scanning” to monitor criminal content – security researchers are concerned.

iOS 15

iOS 15.0.2 and watchOS 8.0.1

Important iPhone update: Apple closes security hole

The next update for iOS 15 is in the starting blocks. In addition to bug fixes, iOS 15.0.2 also closes a security hole that is already being exploited.

Apple iPhone SE 2022

With the cell phone switched off

iPhone: Researchers discover security vulnerability despite empty…

With the help of a faulty chip firmware, researchers were able to crack iPhones even when they were switched off. The vulnerability is supposed to…

Photo scanning news app

protection of minors

iOS 16 beta: Photo scanning now also activated in Germany

The beta version of Apple’s iOS 16 operating system has a new function: it is now possible to monitor nude photos in Messenger…


Updates for iPhone and iPad

iOS 15.6.1: Apple closes security gaps

Apple has released updates for iPhone and iPad with iOS 15.6.1 and iPadOS 15.6.1. The new versions close security gaps that have already…

Source: RSS Feed: Connect – News by www.connect.de.

*The article has been translated based on the content of RSS Feed: Connect – News by www.connect.de. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!