How Do I Report Abuse
Any behaviour that scares, threatens, controls or isolates you could be abuse. Abuse can be physical, sexual, financial or mental.
You dont have to stay in an abusive relationship or workplace to keep your status in Canada.
The person whos abusing you might tell you that youll be deported or lose your children if you leave. Whether youre a permanent resident, or you have temporary status in Canada, you have options. You can escape violence, harassment or other abuse.
How To Report Phishing
If you got a phishing email or text message, report it. The information you give can help fight the scammers.
Step 1. If you got a phishing email, forward it to the Anti-Phishing Working Group at . If you got a phishing text message, forward it to SPAM .
Step 2. Report the phishing attack to the FTC at ReportFraud.ftc.gov.
Report A Message As Phishing In Outlookcom
In the message list, select the message or messages you want to report.
Above the reading pane, select > Phishing> Report to report the message sender.
Note: When you mark a message as phishing, it reports the sender but doesn’t block them from sending you messages in the future. To block the sender, you need to add them to your blocked senders list. For more information, see Block senders or mark email as junk in Outlook.com.
Read Also: How To Get Deleted Emails From Gmail
Install Or Update Your Antivirus Software
Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users knowledge. Most types of antivirus software can be set up to update automatically.
On This Pageskip This Page Navigation
If you received an email from a sender posing as Public Health Ontario offering you next steps for signing up for a vaccine certificate or asking for your private health information: Do not open it or click on any links.
*A phishing scam is an attempt to deceive you into giving sensitive information to someone posing as an individual or company that you know .
Also Check: How To Find Email In Archive
How To Protect Yourself
Dont be the victim of a scam. If it sounds too good to be true, it probably is. These scams can result in:
- identity theft
- theft from your bank account or credit card and
- computer viruses
- No one can guarantee you a job or a visa to Canada.
- Only immigration officers in Canada, at Canadian embassies, high commissions and consulates can decide to issue a visa.
- Processing fees are the same for all of our services in Canada and around the world.
- Fees in local currencies are based on official exchange rates.
- Theyre the same amount as fees in Canadian dollars.
Report Suspicious Emails Phone Calls Text Messages Or Webpages
We take fraud, scam,phishing and spoofing attempts seriously. If you receive correspondence you think may not be from Amazon, please report it immediately.
Suspicious Emails or Webpages
For suspicious webpages, copy & paste the link into the email body.
If you can’t send the email as an attachment, forward it.
Note: Sending the suspicious email as an attachment is the best way for us to track it.
Note: Amazon can’t respond personally when you report a suspicious correspondence to , but you may receive an automatic confirmation. If you have security concerns about your account, please contact us.
Suspicious Phone Calls or Text Messages
Report any suspicious phone call or text message to the Federal Trade Commission .
To report a phone call or text message visit ftc.gov/complaint and follow the onscreen assistant.
If you’re concerned about your account security, go to Protect Your System for tips and recommendations.
Was this information helpful?
Also Check: Find All My Email Addresses
If You Receive A Phishing Email
Never click any links or attachments in suspicious emails. If you receive a suspicious message from an organization and worry the message could be legitimate, go to your web browser and open a new tab. Then go to the organization’s website from your own saved favorite, or via a web search. Or call the organization using a phone number listed on the back of a membership card, printed on a bill or statement, or that you find on the organization’s official website.
If the suspicious message appears to come from a person you know, contact that person via some other means such as text message or phone call to confirm it.
Report the message .
Report The Email Scam To The Email Provider
Most email providers have built-in mechanisms that make it easy to report an email scam. The report phishing button can be enabled in Outlook, Gmail, Yahoo!, and other email clients.
If employees are checking their personal email at work, make sure they have enabled the report phishing button and remind them that you want them to be proactive against phishing .
Read Also: How To Find Email In Archive
What To Do If You Suspect A Phishing Attack
If you get an email or a text message that asks you to click on a link or open an attachment, answer this question: Do I have an account with the company or know the person that contacted me?
If the answer is No, it could be a phishing scam. Go back and review the tips in How to recognize phishing and look for signs of a phishing scam. If you see them, report the message and then delete it.
If the answer is Yes, contact the company using a phone number or website you know is real. Not the information in the email.Attachments and links can install harmfulmalware.
Verify The Phone Number
Square always requires your customer code for phone support. To contact support, visit Squares contact page and sign in to your account. Keep in mind, if our phone line is unavailable or you are contacting us outside of our business hours, you will not see the option to call, but are able to request a callback or send us an email.
If a third party provides you with contact information for Square, please verify the information through an official Square channel before calling.
Don’t Miss: How Do I Recover Deleted Emails From Gmail
Online Marketplace Purchase Scams
Online transactions, whether you are the buyer or the seller, require caution to make sure you avoid scams. This is particularly true if you are engaging in a person-to-person transaction, perhaps through Facebook Marketplace, Craigslist or eBay rather than purchasing through an online store.
When you are buying items advertised online, make sure that the seller actually has possession of the goods being sold, and hasnt just copied photos someone else has posted online. If possible, view the product in-person before purchasing, but take appropriate safety precautions including meeting in a safe, well populated place and bringing a friend.
If you must purchase an item without viewing the item in person, take additional precautions:
What Does Smishing Look Like
Text phishing or smishing uses similar techniques as email phishing. In this example, notice:
Please note that due to technical reasons, some email messages forwarded to may be rejected by our server. If this occurs, please delete the suspicious email or text message. Wells Fargo regularly works to detect fraudulent emails and websites. Thank you for taking steps to protect your personal and financial information.
Apple, the Apple logo, Apple Pay, Apple Watch, Face ID, iPad, iPad Pro, iPhone, iTunes, Mac, Safari, and Touch ID are trademarks of Apple Inc., registered in the U.S. and other countries. Apple Wallet is a trademark of Apple Inc. App Store is a service mark of Apple Inc.
How To Protect Your Computer
The same advice parents might deliver to young drivers on their first solo journey applies to everyone who wants to navigate safely online. A special agent in our Cyber Division offered the following:
- Dont drive in bad neighborhoods.
- If you dont lock your car, its vulnerable if you dont secure your computer, its vulnerable.
- Reduce your vulnerability, and you reduce the threat.
Below are some key steps to protecting your computer from intrusion:
Keep Your Firewall Turned On
A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
You May Like: Schedule An Interview Email
Help Us Prevent Email Fraud
If you suspect someone is fraudulently claiming to be UPS, let us know. Email us at . Reporting fake or bogus emails helps us in our fight against criminal activity.
UPS is a global company with one of the most recognized and admired brands in the world. Occasionally, fraudsters take advantage of UPS’s reputation by using our name or services to target your personal and sensitive business information. By creating tempting downloads and attractive websites, fraudsters can lure you to links that prompt you to enter sensitive information or download malware — malicious software such as viruses or spyware. While UPS is not liable for the actions of third parties, we are working to prevent and detect fraud where possible.
Fake Emails Often Display Some Of The Following Characteristics:
- The senders email address doesnt tally with the trusted organisations website address.
- The email is sent from a completely different address or a free web mail address.
- The email does not use your proper name, but uses a non-specific greeting like dear customer.
- A sense of urgency for example the threat that unless you act immediately your account may be closed.
- A prominent website link. These can be forged or seem very similar to the proper address, but even a single characters difference means a different website.
- A request for personal information such as user name, password or bank details.
- The email contains spelling and grammatical errors.
- You weren’t expecting to get an email from the company that appears to have sent it.
- The entire text of the email is contained within an image rather than the usual text format.
- The image contains an embedded hyperlink to a bogus site.
If you think you may have been the victim of fraud or cybercrime and incurred a financial loss or have been hacked as a result of responding to a phishing message, you should report this to Action Fraud
Have you spotted a suspicious email?
If you have received an email which youre not quite sure about, forward it to the Suspicious Email Reporting Service :
The message might be from a company you dont normally receive communications from, or someone you do not know. You may just have a hunch. If you are suspicious, you should report it.
Don’t Miss: Toobigforemail
How To Spot A Phishing Email
Here are some of the most common types of phishing scams:
Emails that promise a reward. Click on this link to get your tax refund!
A document that appears to come from a friend, bank, or other reputable organizations. The message is something like Your document is hosted by an online storage provider and you need to enter your email address and password to open it.
An invoice from an online retailer or supplier for purchase or order that you did not make. The attachment appears to be a protected or locked document, and you need to enter your email address and password to open it.
If you think someone has accessed your Outlook.com account, or you received a confirmation email for a password change you didnt authorize, read My Outlook.com account has been hacked.
Social Security Scams: 3 Common Requests And How To Report Them
In 2021, an average of 65 million Americans receive monthly Social Security checks , totaling over $1 trillion paid during the year. It comes as no surprise that scam artists will try almost anything from fake calls, text messages, emails and letters to get the personal information of Social Security beneficiaries. Last year, there were more than 718,000 reports of Social Security-related phone scams, adding to nearly $45 million in losses, CNBC reported.
Here are some of the most commonly reported scams, as well as how to report them yourself .
Recommended Reading: How To Find Email In Archive
Protect Yourself From Phishing
Phishing is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information — such as credit card numbers, bank information, or passwords — on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.