{"id":5421,"date":"2015-02-05T10:09:42","date_gmt":"2015-02-05T15:09:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5421"},"modified":"2019-11-22T10:15:09","modified_gmt":"2019-11-22T10:15:09","slug":"how-to-tweak-fraudsters-noses-when-buying-second-hand-iphones","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-tweak-fraudsters-noses-when-buying-second-hand-iphones\/5421\/","title":{"rendered":"How to Tweak Fraudsters&#8217; Noses When Buying Second-Hand iPhones"},"content":{"rendered":"<p>As more and more people upgrade to the latest iPhone, there\u2019s an increasing demand for second-hand devices. \u00a0This, naturally, has led to fraudsters moving into the market as well.<\/p>\n<p>Thousands of gadgets are bought and sold\u00a0everyday including iPhones. There are many ways to fool a victim who is going to buy\/sell a phone from\/to a third-party seller\/buyer. In this post we speak about the most popular ones.<\/p>\n<ol>\n<li><strong>Low price and advanced payment<\/strong><\/li>\n<\/ol>\n<p>Be weary of buying items at heavily reduced discounts. These types of scams usually ask you for money up front so that you can\u2019t refuse payment when the item arrives.advanced payment.<\/p>\n<p>https:\/\/twitter.com\/noor5942\/status\/556123854532132865<\/p>\n<ol start=\"2\">\n<li><strong> Broken devices and phones made of wax and paper<\/strong><\/li>\n<\/ol>\n<p>Whilst the vast majority of shops are legitimate and legal, there\u2019s a small selection of shops that may be out to deceive you. \u00a0If you need to get a phone repaired, make sure its from a reputable shop that, ideally, has local reviews online. \u00a0These are a great way of finding out how trust-worthy a shop is.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Mobile couple faces total of 38 fraud charges, man accused of packaging melted wax as iPhone. <a href=\"http:\/\/t.co\/26tt9t4kVG\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/26tt9t4kVG<\/a> <a href=\"http:\/\/t.co\/Tgoi3TZ2wC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Tgoi3TZ2wC<\/a><\/p>\n<p>\u2014 AL.com Mobile (@ALcomMobile) <a href=\"https:\/\/twitter.com\/ALcomMobile\/status\/550324761608589312?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"3\">\n<li><strong> iPhone with Chinese roots<\/strong><strong>\u2026<\/strong> <strong>and Android OS<\/strong><\/li>\n<\/ol>\n<p>Many people wittingly buy cheap iPhone knock-offs as they\u2019re cheap. However, many more people are duped into buying fake phones that look just like the original. \u00a0The problem here is that people believe they\u2019re getting a cheap iPhone when in actual fact, they\u2019re receiving a cheap copy. \u00a0These are also occasional loaded with <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/jun\/18\/chinese-smartphone-samsung-amazon-ebay-malware-google-play\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">malware as well<\/a>.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/95tWZZi2tJY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>It\u2019s hugely important to check before you buy and if you\u2019re not happy,\u00a0<em>don\u2019t spend the money!<\/em><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">During the <a href=\"https:\/\/twitter.com\/hashtag\/Christmas?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Christmas<\/a> season, please be aware of what you buy online. This is a fake <a href=\"https:\/\/twitter.com\/hashtag\/iPhone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iPhone<\/a> <a href=\"http:\/\/t.co\/7pg74qgAen\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/7pg74qgAen<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/kijiji?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#kijiji<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/craigslist?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#craigslist<\/a><\/p>\n<p>\u2014 Cst. McCarthy @ TPS (@OfficerMcCarthy) <a href=\"https:\/\/twitter.com\/OfficerMcCarthy\/status\/538043368702742528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 27, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"4\">\n<li><strong> Stolen devices<\/strong><\/li>\n<\/ol>\n<p>If you are going to buy a second-hand iPhone there is a good\u00a0chance that an unfair salesman will sell you a stolen device. Whilst there\u2019s no way of being 100% sure before purchase, there are some points you can check: Read other buyers reviews regarding the seller: are other people reporting stolen devices? \u00a0Check the sellers other items; is there anything odd about what they\u2019re selling (lots of cheap phones etc.) If you do decide to buy, check the serial number, IMEI on the box and on the phone. If these don\u2019t match, chances are the device was stolen.<\/p>\n<p>https:\/\/twitter.com\/MrBastounis\/status\/134763327598497792<\/p>\n<ol start=\"5\">\n<li><strong> Refurbished devices<\/strong><\/li>\n<\/ol>\n<p>You can save money (and be sure the phone is legitimate) by buying a refurbished model. These are usually phones that have been returned by a previous buyer. \u00a0Whilst you\u2019re not getting a brand-new device, you can rest-assured that the machine you\u2019re getting is real and will work as intended.<\/p>\n<ol start=\"6\">\n<li><strong> Remote lock and blackmail<\/strong><\/li>\n<\/ol>\n<p>Be wary of scams after purchase. \u00a0Some criminals may try to blackmail you by locking the device after selling it to you (this can be done through the iPhone options). \u00a0One way to get around this is to make sure you do a\u00a0<em>full<\/em> factory reset straight after purchase.<\/p>\n<p>This also works the other way around: if you\u2019re selling a phone, it\u2019s important that you fully wipe the device of all photos, videos and personal details. Remember, the only way to be 100% is by doing a full factory reset. \u00a0This will reset everything and wipe all storage on the device.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Brit's iPhone stolen on holiday..now thief threatens to leak sex snaps of owner's girlfriend if he isn't paid \u00a31,600: <a href=\"http:\/\/t.co\/oh1rRumrWR\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/oh1rRumrWR<\/a><\/p>\n<p>\u2014 The Scottish Sun (@ScottishSun) <a href=\"https:\/\/twitter.com\/ScottishSun\/status\/513752087222444033?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 21, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"7\">\n<li><strong> Fake shops and unfair sellers\/buyers<\/strong><\/li>\n<\/ol>\n<p>Fraudsters can even create day-fly websites that are in fact fake online shops to scoop up information about credit cards. The situation can also get upside down and a person who sells an iPhone can become a victim: a \u2018consumer\u2019 can send no money in return or request the detailed banking information allegedly for money transfer. In fact this\u00a0data can be used to steal money from your credit card.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">I can\u2019t sell my iPhone 5. Everyone who tries is either too stupid to live or is trying to commit fraud. <a href=\"http:\/\/t.co\/CaRbvibXqf\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/CaRbvibXqf<\/a><\/p>\n<p>\u2014 Aaron Vegh (@aaronvegh) <a href=\"https:\/\/twitter.com\/aaronvegh\/status\/518444946236637185?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 4, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"8\">\n<li><strong> Robbery, counterfeit notes, cheating and other frauds<\/strong><\/li>\n<\/ol>\n<p>If you are buying a second hand iPhone from a local seller arrange a meeting at a public place. \u00a0When you\u2019re handed the device, make sure it works by testing it out with either Wi-Fi or by bringing along a SIM card to test it on. \u00a0Of course this advice works for all devices but remember that Apple devices tend to hold their value so are targeted more often by fraudsters.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more and more people upgrade to the latest iPhone, there\u2019s an increasing demand for second-hand devices. \u00a0This, naturally, has led to fraudsters moving into the market as well. Thousands<\/p>\n","protected":false},"author":522,"featured_media":5422,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1623],"tags":[],"class_list":{"0":"post-5421","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-tweak-fraudsters-noses-when-buying-second-hand-iphones\/5421\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/how-to-tweak-fraudsters-noses-when-buying-second-hand-iphones\/2541\/"}],"acf":[],"banners":"","maintag":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5421"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5421\/revisions"}],"predecessor-version":[{"id":17964,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5421\/revisions\/17964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5422"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}