Once you provide this access, the scammer may require payment for technical assistance, install malicious software, change settings to leave your computer vulnerable, and/or steal your financial information.Phishing is an attempt to obtain sensitive information such as usernames, passwords, and account details by posing as a reputable company via email, text message, phone call, or social media.
Your submissions help us work out what hoaxes and scams are circulating at a given time.
If required, we also contact companies, government departments, or other relevant entities directly to enquire about the veracity of particular messages.
Our articles include in-text hyperlinks and a separate reference list that allow you to check the information for yourself.
Email: Traditional phishing is usually a two-part scam involving email and may contain links to a fraudulent website that appears legitimate, but is actually a hoax designed to capture your personal or financial information.
Text message: A phishing attempt via text message to a mobile device to convince recipients to share sensitive information through a reply or link to a fraudulent website.