These days, our phones are perpetually buzzing with notifications, and it's becoming progressively hard to separate betwixt morganatic messages and imaginable scams. Bill from Mesa, Arizona, precocious shared an acquisition that highlights this increasing concern:
"Twice successful the past week I've received texts supposedly sent elsewhere. The past 1 asked if I was 'available time evening.' I did not admit the fig but americium progressive successful an aged radical parkland truthful person galore calls and texts from unfamiliar numbers. I texted backmost that my woman thought we were available. A fewer minutes later, a substance came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had ne'er been, but it was a problem.
"A instrumentality substance came thanking maine for being truthful polite and the texter's appreciation for polite radical and if I were ever successful LA, I would beryllium invited to a backyard BBQ. Looking back, determination were a mates much texts ending with ‘I similar to marque friends with polite people.’ The archetypal substance which I deleted was successful a precise akin vein and format. Is this a scam and why, for what?"
Bill's acquisition is not unique. Many radical person akin messages that look harmless astatine archetypal glimpse but could perchance beryllium portion of a much sinister scheme. Let's dive into the satellite of substance connection scams and larn however to support ourselves.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
A antheral texting connected his phone (Kurt "CyberGuy" Knutsson)
The anatomy of a substance connection scam
Text connection scams, besides known as "smishing," a operation of SMS and phishing, person go progressively sophisticated. Scammers usage assorted tactics to prosecute imaginable victims and summation their trust. Here are immoderate communal elements:
Unfamiliar numbers: The connection comes from a fig you don't recognize. For instance, you person a substance from +1-555-123-4567, a fig not successful your contacts.
Unsolicited contact: The substance arrives unexpectedly, often with a affable oregon urgent tone. Example: "Hey! Long clip nary see. How person you been?"
Personal touch: The scammer mightiness usage your sanction oregon notation a communal enactment to look legitimate. Example: "Hi Sarah, it's Mike from the publication club. Are you coming to the gathering adjacent week?"
Too bully to beryllium true: Offers of prizes, invitations, oregon different enticing propositions are common. Example: "Congratulations! You've won a $500 acquisition card. Click present to assertion your prize!"
Requests for information: The scammer whitethorn inquire for idiosyncratic details, either straight oregon indirectly. Example: "This is your bank. We request to verify your account. Please reply with your relationship fig and PIN."
Remember, these are each examples of imaginable scams. Always beryllium cautious erstwhile receiving unexpected messages, particularly those asking for idiosyncratic accusation oregon containing suspicious links.
A idiosyncratic texting connected a phone (Kurt "CyberGuy" Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
Understanding the scammer's strategy
In Bill's case, the scammer employed a "long-play" strategy. By engaging successful affable speech and offering invitations, the scammer aims to physique spot implicit time. The extremity end could be:
Phishing for information: Gradually collecting idiosyncratic details that tin beryllium utilized for identity theft.
Malware distribution: Eventually sending a nexus that, erstwhile clicked, installs malicious bundle connected your device.
Financial scams: Building spot to yet petition wealth oregon fiscal information.
A idiosyncratic texting connected a phone (Kurt "CyberGuy" Knutsson)
HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID
How to place suspicious texts
To support yourself from substance connection scams, travel these steps:
- Check the sender: Look astatine the afloat email code oregon telephone number, not conscionable the show name.
- Analyze the content: Be wary of messages with urgent subjects, grammatical errors, oregon unusual URLs.
- Verify independently: If the connection claims to beryllium from a known entity, interaction them done authoritative channels to confirm.
- Trust your instincts: If thing feels off, it astir apt is. Don't fto politeness override your judgment.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
A antheral texting connected his phone (Kurt "CyberGuy" Knutsson)
SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE
What to bash if you fishy a scam
If you judge you've received a scam text, present are six steps to follow:
1. Don't respond: Avoid engaging with the scammer to forestall further attempts.
2. Block the number: Use your phone's built-in blocking features to forestall further contact.
- For iPhone: Open the message, pat the sender's name or number, select "Info," past "Block Caller."
- For Android: Open the message, long-press the conversation, pat the three-dot menu and prime "Block" oregon "Block & Report Spam." You whitethorn beryllium asked to corroborate your determination by clicking Yes. Settings whitethorn alteration depending connected your Android phone’s manufacturer.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
3. Report the message: Forward the suspicious substance to 7726 (SPAM). Also, study it straight to the FTC at ReportFraud.ftc.gov.
4. Keep your accusation safe: Never click connected links oregon supply idiosyncratic accusation successful effect to unsolicited texts.
5. Have beardown antivirus software: Install and tally beardown antivirus apps connected your telephone to scan for malware and guarantee your instrumentality is secure. The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe. Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android and iOS devices.
6. Invest successful idiosyncratic information removal services: Consider utilizing a information removal work to destruct your idiosyncratic accusation from information broker sites. These services tin assistance trim spam, alteration the hazard of individuality theft and cleanable up your online beingness by automating the removal of your information from hundreds of information broker sites.
While nary work promises to region each your information from the internet, having a removal work is large if you privation to perpetually show and automate the process of removing your accusation from hundreds of sites continuously implicit a longer play of time. Check retired my apical picks for information removal services here.
Kurt’s cardinal takeaways
While it's earthy to privation to beryllium polite, arsenic Bill was, retrieve that your information and idiosyncratic accusation are paramount. Trust your instincts, verify unfamiliar contacts and ne'er hesitate to disregard oregon artifact suspicious messages. Remember, a existent person won't caput if you instrumentality other steps to verify their identity, and a morganatic enactment volition person authoritative channels for communication.
CLICK HERE TO GET THE FOX NEWS APP
How person you oregon idiosyncratic you cognize been affected by substance connection scams, and what steps did you instrumentality to support yourself? Let america cognize by penning america at Cyberguy.com/Contact
For much of my tech tips and information alerts, subscribe to my escaped CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question oregon fto america cognize what stories you'd similar america to cover
Follow Kurt connected his societal channels
Answers to the astir asked CyberGuy questions:
- What is the champion mode to support your Mac, Windows, iPhone and Android devices from getting hacked?
- What is the champion mode to enactment private, unafraid and anonymous portion browsing the web?
- How tin I get escaped of robocalls with apps and information removal services?
- How bash I region my backstage information from the internet?
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.