How To Report Fraudulent Emails

How Do I Report Abuse

How to Report Scam Emails – Phishing, Fraud, Blackmail, or Extortion

Any behaviour that scares, threatens, controls or isolates you could be abuse. Abuse can be physical, sexual, financial or mental.

You dont have to stay in an abusive relationship or workplace to keep your status in Canada.

The person whos abusing you might tell you that youll be deported or lose your children if you leave. Whether youre a permanent resident, or you have temporary status in Canada, you have options. You can escape violence, harassment or other abuse.

How To Report Phishing

If you got a phishing email or text message, report it. The information you give can help fight the scammers.

Step 1. If you got a phishing email, forward it to the Anti-Phishing Working Group at . If you got a phishing text message, forward it to SPAM .

Step 2. Report the phishing attack to the FTC at

Report A Message As Phishing In Outlookcom

  • In the message list, select the message or messages you want to report.

  • Above the reading pane, select > Phishing> Report to report the message sender.

  • Note: When you mark a message as phishing, it reports the sender but doesn’t block them from sending you messages in the future. To block the sender, you need to add them to your blocked senders list. For more information, see Block senders or mark email as junk in

    Read Also: How To Get Deleted Emails From Gmail

    Install Or Update Your Antivirus Software

    Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users knowledge. Most types of antivirus software can be set up to update automatically.

    On This Pageskip This Page Navigation

    How to Report Scam Emails

    If you received an email from a sender posing as Public Health Ontario offering you next steps for signing up for a vaccine certificate or asking for your private health information: Do not open it or click on any links.

  • The province will not contact you directly asking for your health information. It may be a phishing scam*
  • to report the fraudulent email
  • *A phishing scam is an attempt to deceive you into giving sensitive information to someone posing as an individual or company that you know .

    Also Check: How To Find Email In Archive

    How To Protect Yourself

    Dont be the victim of a scam. If it sounds too good to be true, it probably is. These scams can result in:

    • identity theft
    • theft from your bank account or credit card and
    • computer viruses


    • No one can guarantee you a job or a visa to Canada.
    • Only immigration officers in Canada, at Canadian embassies, high commissions and consulates can decide to issue a visa.
    • Processing fees are the same for all of our services in Canada and around the world.
    • Fees in local currencies are based on official exchange rates.
    • Theyre the same amount as fees in Canadian dollars.
  • Well ask you to pay fees for Canadian government services to the Receiver General for Canada, unless we state something different on a visa office website.
  • Our employees will never:
  • ask you to deposit money into a personal bank account
  • ask you to transfer money through private money transfer service
  • threaten you
  • offer special deals to people who want to immigrate or
  • use free email services, such as Hotmail, Gmail or Yahoo Mail to contact you
  • Youll find free application forms and guides for all our services on our website.
  • Be careful if the salary of a job you are applying for seems too high to be real.
  • Report Suspicious Emails Phone Calls Text Messages Or Webpages

    We take fraud, scam,phishing and spoofing attempts seriously. If you receive correspondence you think may not be from Amazon, please report it immediately.

    Suspicious Emails or Webpages

  • Open a new email and attach the email you suspect is fake.

    For suspicious webpages, copy & paste the link into the email body.

    If you can’t send the email as an attachment, forward it.

  • Send the email to

    Note: Sending the suspicious email as an attachment is the best way for us to track it.

  • Note: Amazon can’t respond personally when you report a suspicious correspondence to , but you may receive an automatic confirmation. If you have security concerns about your account, please contact us.

    Suspicious Phone Calls or Text Messages

    Report any suspicious phone call or text message to the Federal Trade Commission .

    To report a phone call or text message visit and follow the onscreen assistant.

    If you’re concerned about your account security, go to Protect Your System for tips and recommendations.

    Was this information helpful?

    Also Check: Find All My Email Addresses

    If You Receive A Phishing Email

    • Never click any links or attachments in suspicious emails. If you receive a suspicious message from an organization and worry the message could be legitimate, go to your web browser and open a new tab. Then go to the organization’s website from your own saved favorite, or via a web search. Or call the organization using a phone number listed on the back of a membership card, printed on a bill or statement, or that you find on the organization’s official website.

    • If the suspicious message appears to come from a person you know, contact that person via some other means such as text message or phone call to confirm it.

    • Report the message .

    • Delete it.

    Report The Email Scam To The Email Provider

    How to Report Email Scams

    Most email providers have built-in mechanisms that make it easy to report an email scam. The report phishing button can be enabled in Outlook, Gmail, Yahoo!, and other email clients.

    If employees are checking their personal email at work, make sure they have enabled the report phishing button and remind them that you want them to be proactive against phishing .

    Read Also: How To Find Email In Archive

    What To Do If You Suspect A Phishing Attack

    If you get an email or a text message that asks you to click on a link or open an attachment, answer this question: Do I have an account with the company or know the person that contacted me?

    If the answer is No, it could be a phishing scam. Go back and review the tips in How to recognize phishing and look for signs of a phishing scam. If you see them, report the message and then delete it.

    If the answer is Yes, contact the company using a phone number or website you know is real. Not the information in the email.Attachments and links can install harmfulmalware.

    Verify The Phone Number

    Square always requires your customer code for phone support. To contact support, visit Squares contact page and sign in to your account. Keep in mind, if our phone line is unavailable or you are contacting us outside of our business hours, you will not see the option to call, but are able to request a callback or send us an email.

    If a third party provides you with contact information for Square, please verify the information through an official Square channel before calling.

    Don’t Miss: How Do I Recover Deleted Emails From Gmail

    Online Marketplace Purchase Scams

    Online transactions, whether you are the buyer or the seller, require caution to make sure you avoid scams. This is particularly true if you are engaging in a person-to-person transaction, perhaps through Facebook Marketplace, Craigslist or eBay rather than purchasing through an online store.

    When you are buying items advertised online, make sure that the seller actually has possession of the goods being sold, and hasnt just copied photos someone else has posted online. If possible, view the product in-person before purchasing, but take appropriate safety precautions including meeting in a safe, well populated place and bringing a friend.

    If you must purchase an item without viewing the item in person, take additional precautions:

  • Ask for additional photos of the item to make sure the seller has the item. Ask for specific photos or for a photo of the item with a piece of paper with the current date or a specific message.
  • If possible, purchase the item through a website that offers protections to buyers and sellers, or use a payment mechanism that offers buyer protections.
  • Scammers sometimes set up their own fake escrow service, so do not rely on an escrow service suggested by the seller unless you have thoroughly researched it.
  • What Does Smishing Look Like

    How to Report Scam Emails: 13 Steps (with Pictures)

    Text phishing or smishing uses similar techniques as email phishing. In this example, notice:

  • Suspicious sender: The text was sent from an unknown phone number, instead of one of Wells Fargos official short codes: 935-57, 937-33, 937-29, or 937-67.
  • Unexpected request and unusual formatting: The message includes an unexpected request to provide “required information” in order to regain access to your credit card.
  • Suspicious URL or phone number: The text message contains a link to a non-Wells Fargo URL, which could be a fraudulent website. Always preview a URL before clicking on it. On a mobile phone, press and hold the link and the URL will appear in a pop-up box. Phishing texts may also include a fraudulent phone number. Do not call the number in a suspicious text. Call the number on the back of your card or the website to verify the request.
  • Please note that due to technical reasons, some email messages forwarded to may be rejected by our server. If this occurs, please delete the suspicious email or text message. Wells Fargo regularly works to detect fraudulent emails and websites. Thank you for taking steps to protect your personal and financial information.

    Apple, the Apple logo, Apple Pay, Apple Watch, Face ID, iPad, iPad Pro, iPhone, iTunes, Mac, Safari, and Touch ID are trademarks of Apple Inc., registered in the U.S. and other countries. Apple Wallet is a trademark of Apple Inc. App Store is a service mark of Apple Inc.


    Don’t Miss: How Can I Recover Deleted Emails From Trash In Gmail

    How To Protect Your Computer

    The same advice parents might deliver to young drivers on their first solo journey applies to everyone who wants to navigate safely online. A special agent in our Cyber Division offered the following:

    • Dont drive in bad neighborhoods.
    • If you dont lock your car, its vulnerable if you dont secure your computer, its vulnerable.
    • Reduce your vulnerability, and you reduce the threat.

    Below are some key steps to protecting your computer from intrusion:

    Keep Your Firewall Turned On

    A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

    You May Like: Schedule An Interview Email

    Help Us Prevent Email Fraud

    If you suspect someone is fraudulently claiming to be UPS, let us know. Email us at . Reporting fake or bogus emails helps us in our fight against criminal activity.

    UPS is a global company with one of the most recognized and admired brands in the world. Occasionally, fraudsters take advantage of UPS’s reputation by using our name or services to target your personal and sensitive business information. By creating tempting downloads and attractive websites, fraudsters can lure you to links that prompt you to enter sensitive information or download malware — malicious software such as viruses or spyware. While UPS is not liable for the actions of third parties, we are working to prevent and detect fraud where possible.

    Fake Emails Often Display Some Of The Following Characteristics:

    • The senders email address doesnt tally with the trusted organisations website address.
    • The email is sent from a completely different address or a free web mail address.
    • The email does not use your proper name, but uses a non-specific greeting like dear customer.
    • A sense of urgency for example the threat that unless you act immediately your account may be closed.
    • A prominent website link. These can be forged or seem very similar to the proper address, but even a single characters difference means a different website.
    • A request for personal information such as user name, password or bank details.
    • The email contains spelling and grammatical errors.
    • You weren’t expecting to get an email from the company that appears to have sent it.
    • The entire text of the email is contained within an image rather than the usual text format.
    • The image contains an embedded hyperlink to a bogus site.

    If you think you may have been the victim of fraud or cybercrime and incurred a financial loss or have been hacked as a result of responding to a phishing message, you should report this to Action Fraud

    Have you spotted a suspicious email?

    If you have received an email which youre not quite sure about, forward it to the Suspicious Email Reporting Service :

    The message might be from a company you dont normally receive communications from, or someone you do not know. You may just have a hunch. If you are suspicious, you should report it.

    Action fraud

    Find us

    Don’t Miss: Toobigforemail

    How To Spot A Phishing Email

    Here are some of the most common types of phishing scams:

    • Emails that promise a reward. Click on this link to get your tax refund!

    • A document that appears to come from a friend, bank, or other reputable organizations. The message is something like Your document is hosted by an online storage provider and you need to enter your email address and password to open it.

    • An invoice from an online retailer or supplier for purchase or order that you did not make. The attachment appears to be a protected or locked document, and you need to enter your email address and password to open it.

    • If you think someone has accessed your account, or you received a confirmation email for a password change you didnt authorize, read My account has been hacked.

    Social Security Scams: 3 Common Requests And How To Report Them

    In 2021, an average of 65 million Americans receive monthly Social Security checks , totaling over $1 trillion paid during the year. It comes as no surprise that scam artists will try almost anything from fake calls, text messages, emails and letters to get the personal information of Social Security beneficiaries. Last year, there were more than 718,000 reports of Social Security-related phone scams, adding to nearly $45 million in losses, CNBC reported.

    Here are some of the most commonly reported scams, as well as how to report them yourself .

    Recommended Reading: How To Find Email In Archive

    Protect Yourself From Phishing

    Phishing is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information — such as credit card numbers, bank information, or passwords — on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

    Popular Articles

    Related Stories

    Stay on top - Get the daily news in your inbox