Skip Header

Suspicious emails, texts & phone calls (social engineering)

Learn how to spot a fraudulent email, text or phone call, so you’re not reeled in.

Social engineering

Fraudsters are always looking for different ways to gain access to your information and devices and one technique they use is called ‘social engineering’. Social engineering uses manipulation to trick people into making security mistakes or giving away sensitive information. The main skill required to overcome its deceptive tactics is vigilance. This approach focuses on human emotions, which means how you think and act can determine if these attacks are successful.

Social engineering scams can come in many different forms using many different mediums. The most common types include:

  • QRishing phishing Using QR Codes which link to scam websites or apps.
  • Lookalike websites Creating realistic-looking copies of legitimate websites.
  • Domain spoofing Faking website name or email domains.
  • Smishing Phishing using SMS/Text messages or social messaging apps.
  • Phishing Emails with fake offers, instructions and links.
  • Vishing Phishing using voice i.e: phone calls.

Protect yourself from social engineering attacks

Remember, social engineering relies on manipulating human behaviour so there are some simple steps you can take to protect yourself:

  • Be cautious of requests which make you feel something or ask you to do something
  • Pause and independently verify before taking action.
  • Be sceptical of urgency and do not act on impulse
  • Be wary of any unsolicited callers
  • If unsure, check contact details, research and call back using official numbers
  • Never share sensitive data or financial information without independently verifying the caller
  • Never click shared links or provide access to your devices
  • Stay cautious, stay informed, and report anything suspicious.

 

Your email can contain important information that fraudsters can use to impersonate you.

It is important you protect your emails by:

  • Reviewing your sent mail folder regularly and deleting sensitive documents e.g. photocopy of ID document or financial statements which fraudsters may be able to use to impersonate you.
  • Review your mailbox to ensure no rules have been set up to redirect or delete emails received.
  • Set up Multi-Factor Authentication (MFA) to access emails.

Spotting and avoiding suspicious emails and phone calls

It's not always clear you're being targeted. Fraudsters will impersonate genuine organisations and firms to convince you to provide usernames, passwords for online accounts and emails. They may contact you to say they have concerns or inform you there is fraudulent activity on your account and then ask you to provide remote access to your computer or device. Be aware, trust your instincts and take your time. Don’t rush into providing any personal details or sending monies. It’s okay to hang up the phone, ignore emails and to obtain information by researching trusted sources.

Suspicious sense of urgency

Any message that says ‘Reply Now’ to avoid losing money, have your account deleted or access cut-off are designed to panic you. Stop. Take your time. Investigate.

Unexpected calls, emails, text or social media

Don’t trust unexpected emails, texts, social messages or cold calls from anyone trying to get you to reveal personal information or telling you your money is at risk. Be suspicious and challenge.

Requests for personal information and passwords

Never confirm one-time passcodes, usernames or passwords online or in person. Genuine companies never ask for this. Contact the impersonated company through official channels to check legitimacy.

Emails with suspicious or mismatched URLs

These may look valid but can be subtly different from the real website address. Hover your mouse over the link to reveal the actual destination address and check the details. If in doubt don't click.

Poor spelling or grammar in emails

Major organisations have legal, marketing and publicity checks. It’s rare their communications will carry these kinds of mistakes.

Fraudulent remote access requests

Never allow remote access or provide log in details for your secure Fidelity online accounts or your online banking. If in doubt, double check.

Where to get help

If you’ve received an email or call from someone posing as Fidelity contact us on 0800 358 7712. Here are some other useful contacts.

Leaders in fraud prevention

Cifas

The UK's fraud prevention service
To stop fraud

Take Five

Helping consumers protect themselves against financial fraud.
National Reporting Centre

Report Fraud

Report Fraud is the UK’s national reporting centre for fraud and cyber crime
Free expert advice

Get Safe Online

The UK's source of information on online safety
The National Cyber Security Centre

NCSC

Helping to make the UK the safest place to live and work online.

Other techniques used by fraudsters

Deepfakes

Understand the tell-tale signs that could help you identify a deepfake.

Impersonation

Impersonation scams involve pretending to be a trusted source to commit fraud.