
Back up your files regularly and use security software you trust to protect your data.

Here are some tips to help keep your information secure:
GOT EMAIL FROM ICERBOX NEVER SIGNED UP INSTALL
Scammers also use phishing emails to get access to your computer or network – then they install programs like ransomware that can lock you out of important files on your computer. The scammers then use that information to commit fraud or identity theft. More precisely, you just experienced a phishing attempt – that is, when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information. The email tells you to click on a link if you did not authorize the purchase. In this version, scammers, posing as a well-known tech company, email a phony invoice showing that you’ve recently bought music or apps from them.


We’ve recently heard that scammers are recycling an old phishing attempt.
