Connect with us

Technology

Real Apple support emails used in new phishing scam

Published

on

Real Apple support emails used in new phishing scam

NEWYou can now listen to Fox News articles!

A new phishing scam is getting a lot of attention because it uses real Apple Support tickets to trick people into giving up their accounts. Broadcom’s Eric Moret shared how he nearly lost his entire Apple account after trusting what looked like official communication. He described the full experience in a detailed post on Medium, where he walked through the scam step by step.

This scheme stands out because the scammers relied on Apple’s own support system to make their messages look legitimate. They created an experience that felt polished and professional from the first alert to the final phone call. Here’s how the scam unfolded.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR

Advertisement

Scammers are exploiting real Apple Support tickets to trick users into handing over their accounts, experts warn. (Photo by STR/NurPhoto via Getty Images)

How the scam starts

Moret first received a flood of alerts. These included two-factor authentication notifications that claimed someone was trying to access his iCloud account. Within minutes, he got phone calls from calm, helpful callers who claimed to be Apple agents ready to fix the issue.

The twist is how convincing the entire setup felt. The scammers were able to exploit a flaw in Apple’s Support system that lets anyone create a genuine support ticket without verification. They opened a real Apple Support case in his name, which triggered official emails from an Apple domain. This built instant trust and lowered Moret’s guard.

How scammers gained access to the account

During a 25-minute call, the fake agents guided Moret through what they said would secure his account. They walked him through the steps to reset his iCloud password. They also told him a link would follow so he could close the case.

That link took him to a fake site called appeal apple dot com. The page looked official and claimed his account was being secured. It then told him to enter a six-digit code sent by text to finish the process.

Advertisement

When Moret entered that code, the scammers got exactly what they needed to sign into his account.

He then got an alert that his Apple ID had been used to sign into a Mac mini he did not own. That confirmed the takeover attempt. Even though the scammer on the phone said this was normal, he trusted his instinct. He reset his password again, which kicked them out and stopped the attack.

BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS

A Broadcom executive says he nearly lost access to his Apple ID after trusting a fraudulent support call that looked legitimate. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

How to protect yourself from the Apple Support ticket scam

This type of scam works because it feels real. The messages look official, and the callers sound trained. Still, you can stay safer by watching out for signs that something is off.

Advertisement

1) Verify support tickets inside your Apple account

Scammers created a real-looking ticket to make the entire experience seem legitimate. You can confirm what’s real by checking directly with Apple. Sign in at appleid.apple.com or open the Apple Support app to view your recent cases. If the case number isn’t listed there, the message is fake, even if the email comes from an Apple domain.

2) Hang up and call Apple yourself

Never stay on a call that you did not initiate. Scammers rely on long conversations to build trust and pressure you into quick decisions. Hang up right away and call Apple Support directly at 1-800-275-2273 or through the Support app. A real agent will quickly confirm whether anything is wrong.

3) Check your Apple ID device list

If something feels off, look at the devices signed into your account. Go to Settings, tap your name and scroll to see all devices linked to your Apple ID. Remove anything you don’t recognize. This step can stop attackers fast if they’ve managed to get in.

4) Never share verification codes

No real support agent will ever ask for your two-factor authentication codes. Treat any request for these codes as a major warning.

5) Check every link carefully

Look closely at URLs. Fake sites often add extra words or change formatting to appear real. Apple will never send you to a site like appeal apple dot com.

Advertisement

SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

Criminals are using Apple’s own support system to generate real case emails that build false confidence with victims. (Photo by Fairfax Media via Getty Images via Getty Images)

6) Use strong antivirus software

Strong antivirus software can spot dangerous links, unsafe sites, and fake support messages before you tap them. Anti-phishing tools are especially important with scams like this one since the attackers used a fake site and real ticket emails to trick victims.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Advertisement

7) Use a data removal service

Data brokers collect your phone number, home address, email, and other details that scammers use to personalize attacks. A data removal service can wipe much of that information from broker sites, which makes you a harder target for social engineering attempts like the one described in this article.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

8) Turn on strong multi-layer protection

Keep two-factor authentication (2FA) on for every major account.  This creates a barrier that quickly stops attackers.

Advertisement

9) Slow down before reacting

Scammers want you to panic. Pause before you act. Trust your instinct when something feels rushed or strange. A short delay could save your entire account.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

This scam shows how convincing criminals can be when they exploit real systems. Even careful users can fall for messages that look official and calls that sound professional. The best defense is to stay alert and take a moment before responding to anything unexpected. When you slow down, double-check support tickets, and never share verification codes, you make yourself far harder to fool. Adding layers like antivirus protection and data removal services also gives you more control over what attackers can access. These simple habits can stop even the most polished scams before they get to your accounts.

What would you do if you got a support call that felt real but didn’t seem right? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

The Polaroid Flip, my favorite retro instant camera, is cheaper than ever

Published

on

The Polaroid Flip, my favorite retro instant camera, is cheaper than ever

I love instant cameras because of how they help me slow down and be creative without the distractions of a phone. Holding a real print also feels grounding in a screen-dominated age, which is why I think a lot of people these days are drawn to them — and why models with old-school vibes like the Polaroid Flip make such great gifts. It’s usually pricey, but today you can buy the Flip for $184.99 ($35 off) directly from Polaroid, which is its best price to date. Amazon is also selling the camera with two packs of film for $212.49 ($37 off), which marks a new low too.

Polaroid cameras offer the most charming, old-fashioned instant-film experience of any I’ve tested, and the Flip is no exception. It sports a classic, retro-inspired design with a flip-up lid and prints vintage-style square I-Type photos with Polaroid’s iconic white frame. Yet at the same time it’s got the perfect amount of subtle modern conveniences baked in, like Bluetooth, USB-C charging, and a beginner-friendly companion app that lets you adjust saturation and exposure.

But what makes it really stand out is its picture quality, which outshines other Polaroid models in this price range. The Flip has the most powerful flash of any Polaroid camera, and paired with its unique sonar autofocus and four-lens hyperfocal system, it produces sharper, more consistently in-focus images than any model Polaroid offers at this price. You can manually tweak exposure, too, and the camera even sends warnings you when a shot is likely to be over- or underexposed. These are all features that go a long way toward reducing the number of wasted shots, which is helpful given I-Type film costs a whopping $18.99 for just eight prints.

That said, the instant camera’s not for everyone. Fujifilm’s cheaper Instax Mini 12 develops prints much faster and looks more true-to-life while struggling less in low light. Still, the Flip’s dreamy, vintage aesthetic has its own appeal, especially if you prefer a more artistic, old-fashioned look.

Continue Reading

Technology

New email scam uses hidden characters to slip past filters

Published

on

New email scam uses hidden characters to slip past filters

NEWYou can now listen to Fox News articles!

Cybercriminals keep finding new angles to get your attention, and email remains one of their favorite tools. Over the years, you have probably seen everything from fake courier notices to AI-generated scams that feel surprisingly polished. Filters have improved, but attackers have learned to adapt. The latest technique takes aim at something you rarely think about: the subject line itself. Researchers have found a method that hides tiny, invisible characters inside the subject so automated systems fail to flag the message. It sounds subtle, but it is quickly becoming a serious problem.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

NEW SCAM SENDS FAKE MICROSOFT 365 LOGIN PAGES

Cybercriminals are using invisible Unicode characters to disguise phishing email subject lines, allowing dangerous scams to slip past filters. (Photo by Donato Fasano/Getty Images)

Advertisement

How the new trick works

Researchers recently uncovered phishing campaigns that embed soft hyphens between every letter of an email subject. These are invisible Unicode characters that normally help with text formatting. They do not show up in your inbox, but they completely throw off keyword-based filters. Attackers use MIME encoded-word formatting to slip these characters into the subject. By encoding it in UTF-8 and Base64, they can weave these hidden characters through the entire phrase.

One analyzed email decoded to “Your Password is About to Expire” with a soft hyphen tucked between every character. To you, it looks normal. To a security filter, it looks scrambled, with no clear keyword to match. The attackers then use the same trick in the body of the email, so both layers slide through detection. The link leads to a fake login page sitting on a compromised domain, designed to harvest your credentials.

If you have ever tried spotting a phishing email, this one still follows the usual script. It builds urgency, claims something is about to expire and points you to a login page. The difference is in how neatly it dodges the filters you trust.

Why this phishing technique is super dangerous

Most phishing filters rely on pattern recognition. They look for suspicious words, common phrases and structure. They also scan for known malicious domains. By splitting every character with invisible symbols, attackers break up these patterns. The text becomes readable for you but unreadable for automated systems. This creates a quiet loophole where old phishing templates suddenly become effective again.

Advertisement

The worrying part is how easy this method is to copy. The tools needed to encode these messages are widely available. Attackers can automate the process and churn out bulk campaigns with little extra effort. Since the characters are invisible in most email clients, even tech-savvy users do not notice anything odd at first glance.

Security researchers point out that this method has appeared in email bodies for years, but using it in the subject line is less common. That makes it harder for existing filters to catch. Subject lines also play a key role in shaping your first impression. If the subject looks familiar and urgent, you are more likely to open the email, which gives the attacker a head start.

How to spot a phishing email before you click

Phishing emails often look legitimate, but the links inside them tell a different story. Scammers hide dangerous URLs behind familiar-looking text, hoping you will click without checking. One safe way to preview a link is by using a private email service that shows the real destination before your browser loads it.

Our top-rated private email provider recommendation includes malicious link protection that reveals full URLs before opening them. This gives you a clear view of where a link leads before anything can harm your device. It also offers strong privacy features like no ads, no tracking, encrypted messages and unlimited disposable aliases.

For recommendations on private and secure email providers, visit Cyberguy.com

Advertisement

PAYROLL SCAM HITS US UNIVERSITIES AS PHISHING WAVE TRICKS STAFF

A new phishing method hides soft hyphens inside subject lines, scrambling keyword detection while appearing normal to users. (Photo by Silas Stein/picture alliance via Getty Images)

9 steps you can take to protect yourself from this phishing scam

You do not need to become a security expert to stay safe. A few habits, paired with the right tools, can shut down most phishing attempts before they have a chance to work.

1) Use a password manager

A password manager helps you create strong, unique passwords for every account. Even if a phishing email fools you, the attacker cannot use your password elsewhere because each one is different. Most password managers also warn you when a site looks suspicious.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Advertisement

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

2) Enable two-factor authentication

Turning on 2FA adds a second step to your login process. Even if someone steals your password, they still need the verification code on your phone. This stops most phishing attempts from going any further.

3) Install a reliable antivirus software

Strong antivirus software does more than scan for malware. Many can flag unsafe pages, block suspicious redirects and warn you before you enter your details on a fake login page. It is a simple layer of protection that helps a lot when an email slips past filters.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

Advertisement

4) Limit your personal data online

Attackers often tailor phishing messages using information they find about you. Reducing your digital footprint makes it harder for them to craft emails that feel convincing. You can use personal data removal services to clean up exposed details and old database leaks.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

AI FLAW LEAKED GMAIL DATA BEFORE OPENAI PATCH

Researchers warn that attackers are bypassing email defenses by manipulating encoded subject lines with unseen characters. (Photo by Lisa Forster/picture alliance via Getty Images)

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Advertisement

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

5) Check sender details carefully

Do not rely on the display name. Always check the full email address. Attackers often tweak domain names by a single letter or symbol. If something feels off, open the site manually instead of clicking any link inside the email.

6) Never reset passwords through email links

If you get an email claiming your password will expire, do not click the link. Go to the website directly and check your account settings. Phishing emails rely on urgency. Slowing down and confirming the issue yourself removes that pressure.

7) Keep your software and browser updated

Updates often include security fixes that help block malicious scripts and unsafe redirects. Attackers take advantage of older systems because they are easier to trick. Staying updated keeps you ahead of known weaknesses.

8) Turn on advanced spam filtering or “strict” filtering

Many email providers (Gmail, Outlook, Yahoo) allow you to tighten spam filtering settings. This won’t catch every soft-hyphen scam, but it improves your odds and reduces risky emails overall.

Advertisement

9) Use a browser with anti-phishing protection

Chrome, Safari, Firefox, Brave, and Edge all include anti-phishing checks. This adds another safety net if you accidentally click a bad link.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaway

Phishing attacks are changing fast, and tricks like invisible characters show how creative attackers are getting. It’s safe to say filters and scanners are also improving, but they cannot catch everything, especially when the text they see is not the same as what you see. Staying safe comes down to a mix of good habits, the right tools, and a little skepticism whenever an email pushes you to act quickly. If you slow down, double-check the details, and follow the steps that strengthen your accounts, you make it much harder for anyone to fool you.

Do you trust your email filters, or do you double-check suspicious messages yourself? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

DRAM it! Raspberry Pi raises prices

Published

on

DRAM it! Raspberry Pi raises prices

Raspberry Pi is increasing the price of several single-board computers in an attempt to offset soaring memory costs. The updates are being applied immediately and affect Raspberry Pi 4 and Raspberry Pi 5, with prices increasing by $5 to $25 depending on the model and amount of RAM. The 16GB memory variants of the Compute Module 5 are also being raised by $20, now starting at $140.

“The current pressure on memory prices, driven by competition from the AI infrastructure roll-out, is painful but ultimately temporary,” Raspberry Pi CEO Eben Upton said in the announcement. “We remain committed to driving down the cost of computing and look forward to unwinding these price increases once it abates.”

An affordable new 1GB variant of Raspberry Pi’s flagship 5 model is also being introduced for $45, which includes a quad-core 2.4GHz Arm Cortex-A76 processor, dual-band Wi-Fi, and a PCI Express port.

Raspberry Pi isn’t the only computing hardware provider feeling the pinch, with CyberPowerPC and Maingear having also addressed how the skyrocketing price of RAM is impacting their business, with price increases either already in place or expected in the future. The limited supply and high demand for RAM has led to some stores selling it at market prices, just as the out-of-control GPU prices from earlier this year had finally started to settle down.

Continue Reading
Advertisement

Trending