dialogFor a better experience on Information and Communications Technology Authority (ICTA), update your browser.

Email & Phone Scams

There are numerous types of emails and phone scams that the public should be aware of, anyone receiving an email or phone call that appears to be from a legitimate source should verify the authenticity prior to providing information.


Below are a few types of scams to be wary of, though there are others, most will be similar, but will vary the information to appear legitimate.


  • Request for Personal Information
  • Email request to click a Link verify information
  • Email request to open an attachment
  • Credit Card Scams
  • Request for Charitable Donations
Request for Personal Information

You may have heard about identity theft (people stealing other people's personal information to use for illegal purposes). Using a scam called "phishing," Identity thieves trick people into providing their financial account numbers, PIN numbers, mothers' maiden names, and other personal information by pretending to be someone they're not.


The most common form of phishing is through emails (though this can also done via telephone) pretending to be from a legitimate retailer, bank, organization, or government agency. The sender asks to “confirm or verify” your personal information for some made-up reason (ie. your account is about to be closed, an order for something has been placed in your name, or your information has been lost because of a computer problem).


Another tactic phishers incorporate is to say they’re from the fraud department of a well-known company and ask to verify or confirm your information because they suspect you may be a victim of identity theft!


Email Request to Click on a Link to Verify Information

Scammers use these links to lure people to phony Web sites that look just like the real Web sites of the company or organization, they’re impersonating. If you follow the instructions and enter your personal information on the Web site, you’ll provide it directly into the hands of the Scammers. To check whether the message is really from the company or agency, call it directly or go directly to its Web site.


Email Request to Open an Attachment

You should only open email attachments if you’re expecting them and know what they contain. Even if the messages look like they came from people you know, they could be from fraudsters and contain programs that can steal your personal information.


Credit Card Scams

Legitimate credit card issuers and other companies may contact you if there is an unusual pattern of purchases indicating that someone else may be using one of your credit cards. Usually they only ask if you have made particular transactions; they will never request your account number or other personal information. To be on the safe side, ask for the person’s name, the name of the agency or company, the telephone number, and the address. Look up the main number from the phone book, the Internet, or directory assistance, then call to verify if the person is legitimate.


Request for Charitable Donations

If you’re asked to make a charitable contribution via phone or email, consider the following: 


  1. Donate to charities you know and trust. You want to find a charity with a proven track record for the type of donation requested.
  2. Be wary of charities that seem to have appeared overnight in connection with current events. “Look alike” websites resembling legitimate charitable organizations and international aid efforts may be popping up. There are numerous Web sites that verify whether a charity is legitimate.
  3. Charities may give the option to designate your giving to a specific disaster or organisation. This way, you can ensure your funds are going to a particular charity or disaster relief, as opposed to a general fund.
  4. You should not assume that charity messages posted on social media (Facebook, Twitter, etc.) are legitimate. Always do your research on the charitable organization yourself.

Below are a few examples:


Bank Email Phishing Scam

Bank Transfer Scam w/zip file attachment

LIME Email Scam example

NatWest Phishing Scam Example

DropBox Email Scam example

Apple Example Phishing Scam


Links to additional information and updates abroad