Online safety and cybersecurity.
Time to read: 10 minutes
Time to read: 10 minutes
Understand the different ways fraudsters try to access your information—including phishing, malware, and account takeover schemes.
Get tips and tools on protecting your data in your T‑Mobile account or other accounts online.
Stop and think before engaging with anything that seems suspicious—it’s one of the best ways to protect yourself online.
You’ve probably heard terms like “identity theft” and “online fraud,” which are shorthand ways to describe when someone attempts to gain access to or misuse a person’s information—like opening new credit accounts or taking over an existing account.
Along with using the tools we offer at
Fraudsters have many ways to try to access your information. They might try to log in to an online account (such as a
Fraudsters send an e-mail or text message or make a phone call to con someone into providing personal information (e.g., email address, passwords, etc.) directly or by visiting a bogus website.
Fraudsters con someone into visiting a website or downloading an app, malware software, or file that appears to be from a legitimate source. Once the malware is on the device, it collects personal data. And when the fraudster demands a ransom payment for the release of that data, it’s then called ransomware.
A technique involving interception of information intended for someone else. This might happen in connection with other techniques. For instance, the interception might occur through malware the fraudster placed on your device, or as a result of a phishing effort that leads you to a fake website that captures information you intended to enter on a legitimate site.
A person poses as someone else to gain access to account information. One common pretexting scheme involves impersonation based on information the fraudster knows about the potential victim.
A fraudster tries to transfer your phone number to a device they control. This generally happens either by switching your phone number to another carrier or changing the SIM card assigned to your phone number.
Customers have legitimate reasons to do both—for example, you may need to change your SIM card if you lose your phone. But fraudsters try to misuse these functions to gain control of your phone number and impersonate you, which may help them access your online accounts (like email and online banking). Read How T‑Mobile helps customers fight account takeover fraud to learn more
Cybersecurity is the practice of protecting systems, networks, programs, and technologies from digital attacks. At
Like any corporation,
There are simple steps you can take to help protect yourself online—whether in your T‑Mobile account or other accounts. One of the best ways is to remain vigilant and monitor your online accounts, bank statements, and credit reports regularly for unauthorized activity.
Learn how your online accounts work and manage your security settings. For example, understand how the applications and online platforms you use authenticate your identity and what choices you have for authentication.
There's no way to completely ensure online safety, but here are some considerations:
Use strong passwords with a combination of letters, numbers, and special characters for your T‑Mobile ID and other accounts. Change your passwords periodically and anytime there’s any sign of misuse. Don’t reuse passwords you’ve used for other sites. Don’t give others your passwords or provide them via phone or email.
Keep your home computers and mobile devices safe by running regular software updates and security patches. Consider changing your software update option to "Auto Update" for all software on your computers and mobile devices.
Have your notifications turned on for logins from other devices on all the accounts you use. Getting notified of suspicious behavior right away is one of the best ways to get ahead of fraud. You can turn on notifications in the settings of the accounts you use, including your
Use anti-malware software from a trusted source and always keep it up to date by letting the software update its file of known issues, called signatures.
Be cautious when using public
If you’re using your smartphone, tablet, or PC as an access point for other devices to connect to the internet, always enable
At home, consider encrypting your home network by updating your router settings to either WPA3 or WPA2 Personal.
Remembering a lot of passwords can be difficult and even risky—that’s where password managers come in. These tools help you generate strong passwords and store them in an encrypted place—all while only having to remember one password to access them. A few password managers we recommend are 1Password, Apple's iCloud Keychain, KeePass, and LastPass.
Apply two types of identification on accounts where you can, including on your T‑Mobile.com account. For other accounts, review the security options offered by the account provider.
Add two-step verification to your T‑Mobile.com account.
Place a security PIN on your Universal Integrated Circuit Card (UICC) in your T‑Mobile device. Your UICC contains your Subscriber Identity Module (SIM) card and is primarily used to authenticate a phone on the network. Your UICC can be used to store subscriber-related information, like phone numbers, service details, and, in some cases, text messages. If your device is lost or stolen, a SIM PIN can protect the SIM in your device from being re-used in another device by requiring confirmation of the correct PIN.
Never confirm your sensitive personal data or account information in response to an unsolicited email, text, or inbound call. T‑Mobile will never send you a request for such information, and you should only provide that information to T‑Mobile or any other account provider when you have initiated contact to a known, reliable number or address.
If you receive any suspicious messages that appear to be from
If our company name or brand is used in efforts to fraudulently obtain personal information, we’ll work aggressively to halt those activities.
Protect yourself by not clicking links or opening attachments from unknown senders. Suspicious links can contain malware or ransomware—a type of malware that encrypts or locks your computer files and demands payment to a fraudster to get them unlocked. Stop and think before you click on something from an unknown or suspicious sender.
The national Do Not Call registry gives you the choice about whether you receive telemarketing calls. Once your number is on the registry, commercial telemarketers are not allowed to call you. Other types of organizations may still call you, like charities, political groups, and debt collectors.
We also offer additional ways to protect yourself and keep your personal data secure. Added safety tools provided by
Account Takeover Protection, a free feature for T‑Mobile, T‑Mobile for Business, T‑Mobile Postpaid, and Sprint customers, adds protection steps before your phone number can be ported to another carrier.
Prevention is key in protecting yourself from scams. T‑Mobile's
PROXY gives you an extra number to use when you don’t want to share your private phone number. Calls, voicemails, and texts are accessible any time in the DIGITS app.
You can change your phone number—for any reason—up to one time per year at no extra charge.
If you believe you’ve been impacted by any form of online fraud—including an identity theft incident or a breach of your personal information—you should:
Call your account providers, including your financial institutions and wireless provider, change your passwords, and take additional steps they may recommend.
File a report with the FTC.
File a police report with your local authorities.
Check with your state Attorney General for resources particular to your state.
Contact one of the three credit bureaus—Equifax, Experian, or TransUnion. Whichever bureau you alert will notify the other bureaus of your fraud alert. Also consider placing a credit freeze—which requires you to contact all three bureaus separately—or a credit lock. Both prevent others from taking out credit in your name without your knowledge.
Report directly to the companies where you believe fraud has occurred. To report unauthorized T‑Mobile activity, immediately contact Customer Care by dialing 611 from your T‑Mobile phone or 1-800-937-8997 from any other device.
T‑Mobile will fully cooperate with any investigation undertaken by law enforcement. For legal document requests, please forward a subpoena or court order to: T‑Mobile Law Enforcement Relations Group, 4 Sylvan Way, Parsippany, NJ 07054. Fax: 973-292-8697
Under the Fair and Accurate Credit Transactions Act (FACTA), you have a right to access and receive information related to suspected identity theft. To obtain this information from T‑Mobile, you must send us the following items:
Most frequent requests include copies of bills, credit applications, or shipping requests. Please note, copies of video surveillance require a legal document request. Please mail or fax a copy of each of these to the following address or fax number:
Attn: Fraud Management/FACT
PO Box 90880
Allentown, PA 18109
There’s a lot of great information available from government agencies and others about identity theft protection and online safety. We recommend:
Learn about the choices you can make around children’s data use and collection.
Take control of your privacy on websites outside of
Access some of the personal data we collect about you—and delete it—by following these steps.