What to do if your Apple product
has been stolen?
Types of Scams
-
Email Scams
How to recognise a fraudulent email:
- Apple will never ask you to provide personal or sensitive information via email e.g. passwords or credit card numbers.
- The sender’s email address does not match that of the company it is claiming to be.
- Although the link provided may seem to be legitimate, when you click on it, it takes you to a website that does not match the company that it says it is.
- The http of the website link that you click on is not secure. It should have a ’s’ in the URL, for example, https://www.companyname.com.
- The email begins with a generic greeting, most companies will address you by name.
- The email looks different from other emails that you have received from the same company previously.
How to avoid email scams:
- Never click on a link unless you can verify the sender.
- Do not open or save attachments from an unknown sender.
- Use a strong password for your Apple ID and always keep this information secure and up to date.
- Use two-factor authentication. This means that your Apple ID can only be accessed on devices that you trust (such as your iPad, Mac and iPhone). If you log into another device for the first time you will be asked to provide your Apple ID password as well as a verification code that appears on one of your trusted devices.
-
SMS Scams
How to recognise a fraudulent SMS:
- You receive a text message, that appears official, references the specific model of your stolen iPhone.
- The message prompts you to click on a link to verify and sign in with your Apple ID.
- It takes you to a page that looks very much like Apple’s page. The only way that you can recognise that it is, in fact, a fake is to scrutinise the URL. You will notice that it is different to an Apple URL, even though it appears to be secure (https://)
- This confidential account information will now get sent to the scammers who as a result have access to your Apple ID account.
How to avoid SMS scams:
- Double-check unfamiliar numbers or messages. Legitimate organisations often use recognisable sender IDs.
- Refrain from clicking on links in unexpected texts. Hover over links to preview URLs, and only open them if certain of their legitimacy.
- Never disclose sensitive information like passwords or financial details via SMS. Legitimate entities won't request such data through text messages.
- Block suspicious numbers and report them to your mobile carrier. This helps prevent further scam attempts.
-
Fake iPhone Scams
How to recognise a fake iPhone:
- It is lighter than a regular iPhone.
- The font appears different to that of the font on a genuine iPhone.
- The operating system is Android, not iOS.
- The App Store looks different, but you will notice that it does have iCloud options.
- The Touch ID does not work properly, it is often just an ordinary button.
- The screen is not as clear, it appears to be more pixelated.
- Siri only works on a genuine iPhone.
How to avoid fake iPhone scams:
- Physically inspect the iPhone.
- Ask the dealer if you can take it to a technician of your choice to inspect the iPhone.
- The seller may provide you with a proof of purchase for the device. Take special note of the details on the invoice, how it is laid out and what information is included.
- Contact the store to check if the invoice is legitimate and whether the device was in fact purchased from the store.
- Remain wary of purchasing any items online until you have inspected the device or done all the necessary checks.
-
Gift Card & iTunes Card Scams
How to recognise a Gift card and iTunes card scams:
- You will receive a call from someone requesting that they make an urgent payment by purchasing an iTunes Gift Card from their nearest retailer.
- You will be asked to share the 16-digit code on the back of the card with the caller.
How to avoid a Gift card and iTunes card scams:
- Remember that you can only use your iTunes Gift Card to purchase goods and services on the iTunes Store, App Store, iBooks Store, or for an Apple Music membership. If asked to purchase anything other than these, you are most likely being targeted by a scam.
- Never provide the numbers on the back of your iTunes Gift Card to someone you do not know.
-
Access to iCloud details through ‘verify’ your account communication
How to recognise iCloud scams:
- Be wary of unsolicited emails or messages claiming to be from Apple or iCloud. Legitimate communications are typically initiated by the user.
- Legitimate communications from Apple usually address you by your full name. Be suspicious of generic greetings like "Dear Customer" or "Dear User.”
- If you receive an unexpected email about a password reset for your Apple ID, verify its authenticity before taking any action.
How to avoid iCloud scams:
- Create strong, unique passwords for your Apple ID. Avoid using easily guessable information and consider using a reliable password manager.
- Instead of clicking on links in emails or messages, go directly to the official Apple website by typing the URL into your browser.
- Verify the legitimacy of the sender's email address. Scammers often use email addresses that resemble official ones but with slight variations.
Ways to protect your accounts
Exclusions and Limitation of our Liability for Stolen Device Advice Service
This page is designed to provide you with immediate steps you can take in the event your device is lost or stolen, such as contacting your bank, using device tracking, blocking services, and notifying your service provider.
Please Read Carefully:
- No Liability upon us for Actions Taken: The advice and steps provided through this service are suggestions based on general best practices. We do not guarantee the security of your device or personal information after following this advice. You acknowledge that all actions you take as a result of this advice are your sole responsibility. iStore accepts no liability for any loss or damage arising directly or indirectly from actions taken based on the information provided by this service or iStore’ s failure to provide any advice or any other omission of iStore.
- No Professional Advice: The information offered by this service does not constitute professional, legal or security advice. It should not be used as the sole basis for any decision or action regarding the security of your device or personal information. We strongly recommend consulting with a professional if you require specialised advice tailored to your situation.
- Changes and Accuracy: While we strive to provide timely and accurate information, iStore reserves the right to make changes to this service without notice. We cannot guarantee the completeness or accuracy of the information provided and accept no responsibility for errors or omissions.
- Use at Your Own Risk: Your use of this service and any information provided is entirely at your own risk. iStore does not accept liability for any special, direct, indirect, incidental, consequential, or punitive damages arising out of your access to, use of, or inability to use this service, or any errors or omissions in the content of this service.
By using this service, you acknowledge that you have read, understood, and agree to be bound by this disclaimer. If you do not agree with any part of this disclaimer, please refrain from this service.