WhatsApp users, here is a fast-growing scam where crooks steal information, money, spread fake links, or send dangerous malware.
Bear with us — the fraud is confusing, which is why it’s so dangerous. Here’s how it works.
1: A hacker gets access to someone’s WhatsApp account.
They do this by getting that person to accidentally give up their 6-digit WhatsApp verification code (just like what they’re about to try with you). Now the hacker has full control of your friend’s account — they can see messages, contacts, and send messages as if they were that person.
2: Next, the hacker sends YOU a message pretending to be your friend.
Since they’re using your friend’s real account, the message looks legit. It says something like: “Hey! I accidentally sent a code to your phone instead of mine”. Can you send it to me?
3: But wait! That 6-digit code was actually sent to YOU by WhatsApp.
At the same time, WhatsApp sends you a message with a 6-digit login code — because the hacker tried to log into WhatsApp using your phone number.
4: If you share that code, the hacker can now log into your account!
That code is like a key to your WhatsApp. If you hand it over, the hacker takes over your account. You get logged out — and now the hacker is messaging your contacts, pretending to be you.
The hacker then uses your account to target your friends.
The lesson: don’t ever respond to an unexpected authentication message.
Android phone and tablet owners: Watch for a new security feature in the next few weeks. If you leave your device locked for three consecutive days, it will automatically restart. This is a smart move.
A restart is often needed to complete a system update or security patch. If someone hasn’t restarted their phone in days, this auto-restart helps keep the device updated and protected from threats.
Another benefit to automatic restarts: Some malware can survive in memory as long as the phone stays on. Restarting clears temporary data and can stop some types of malicious activity from continuing undetected.
iPhone users: You should turn your phone off and back on every so often, too.
brianbatescomic via Instagram | Used with permission
“I got an email from Apple saying someone had added me as a trusted contact, but I don’t know what that is or who they are. What should I do?” — Barbara W.
You can find out by following this path on your iPhone: Tap Settings [the icon that looks like a gear] > [Your name, where it appears at the top] > Password & Security > Account Recovery. If you don’t recognize a name there, you can delete it.
It’s not much of a danger because they won’t have access to your iPhone. If they get locked out of their Apple account, they can have a code sent to you, and use that code to get back in.
“Last time, you posted an answer about how anti-virus software can help keep my computer safe. Is that all I need?” — Marcus X.
Anti-virus software is an extra layer of security designed to catch threats your computer’s operating system might not. But more cybercrimes happen because we fall for scams based on the message in an email, text, or voicemail. Software won’t always help.
If you get an urgent communication, resist the urge to believe you’re in trouble. That warning or credit card charge is more likely a fake, even if it looks genuine. To check, visit the company’s website yourself — don’t click on a link to verify it.
“I get very frustrated with computers. Something happens, and I have no idea what to do. I call my son for help, but I don’t want to be a bother every time I have a question. What do you recommend?” — Ann C.
You might not believe it, but even computer pros sometimes have to figure out the same problems. The easiest way to get your answer is to type your question into a search engine. It might take visiting a website or two to find an answer you can understand.
As we go forward, AI platforms, including ChatGPT, Gemini (which now shows up at the top of Google search), and Copilot (which appears prominently in Bing search) will conversationally answer these questions without having to visit other websites.
Original content © 2025 Aware Force LLC