logo
OG&E warns new scam shows wrong phone number on Google

OG&E warns new scam shows wrong phone number on Google

Yahoo15-05-2025

OKLAHOMA CITY (KFOR) — OG&E wants you to be aware of a new scam that's popping up. They said some customers have reported that a fake number is shown on Google when they search how to make a payment.
'Unfortunately, we see this a lot with customers where someone on the phone will demand payment or they will shut your service off, and out of fear, they go ahead and pay over the phone,' said Carson Cunningham, the Senior Communications Specialist at OG&E.
LOCAL NEWS: Will Rogers International Airport: Air travelers still showing up without REAL ID
If you need to pay a bill, the company reminds customers to go directly to OGE.com/PaymentOptions to pay a bill online or visit OGE.com/ContactUs for verified OG&E phone numbers.
They also said scammers thrive on urgency so be alert if something seems out of the ordinary.
'They prey on that 'OG&E is going to come turn your service off because you're a little bit behind on your bill',' said Cunningham.
OG&E said, before you call them, make sure the number is legit just in case. They also said in addition to the numbers listed on their 'Contact Us' page, there is a number on your bill that is verified as well.
Another helpful tip is to ask the person on the phone questions about your account if you think it's a scam. Some things to ask for are your account number, the date of your last payment, and the employee identification number.
LOCAL NEWS: Grandmother discovers her SNAP benefits were stolen on Mother's Day
For more tips and how to report a scam, see below.
Protect Your Personal Information
If you aren't expecting a call from OG&E or any other utility, be cautious of sharing or confirming financial information with anyone initiating contact with you.
This includes, among other items, Social Security number, date of birth, banking account details, and debit or credit card numbers.
Take Your Time
If someone calls, approaches you in person, or emails you saying you must pay your bill immediately to avoid disconnection, verify that they are a legitimate utility company representative by calling a verified number for the utility company before giving them money or sensitive information. Visit OGE.com/ContactUs for verified OG&E phone numbers.
While a scammer will discourage you from hanging up and calling the number on your utility bill, a real utility representative will encourage you to do so.
Check For Previous Notices
Customers with delinquent accounts receive advance disconnection notification included with their regular monthly bill—never a single notification shortly before disconnection.
Ask Questions
Ask the person calling you or visiting you in person to provide you with your account number, your last payment amount, date of payment, and their employee identification number.
Pay Your Utility Only
Never make a utility bill payment to any person calling you on the phone, coming to your door, texting you, or emailing you.
OG&E customers should always go directly to OGE.com/PaymentOptions to pay your bill online or visit OGE.com/ContactUs for verified OG&E phone numbers or use the U.S. Payments phone number (fees will apply) printed directly on your OG&E monthly bill.
Report Scams
Oklahoma customers can report scams to the Federal Communications Commission (FCC) at reportfraud.ftc.gov/assistant or contact the Oklahoma Attorney General's Office at consumerprotection@oag.ok.gov.
Arkansas customers can report scams to the Arkansas Attorney General's office by emailing consumer@ArkansasAG.gov.
Stay Updated on Scams
Scammers are constantly updating their tactics, and you will need to stay educated on new types of scams and tips to avoid them.
Review guides, reports, utility and trade association websites, local, state and federal law enforcement websites and consumer information websites.
If you're not expecting a call from OG&E or any other utility, ignore phone numbers you do not recognize.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'
Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'

Boston Globe

time10 hours ago

  • Boston Globe

Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'

Foreign hackers have increasingly identified smartphones, other mobile devices, and the apps they use as a weak link in US cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. Advertisement 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity specialist at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real-time and able to read text messages,' said Representative Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Advertisement Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' US Representative John Moolenaar, Republican of Michigan and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their US operations. Advertisement Mobile devices can buy stocks, launch drones, and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords, and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators, and business leaders with texts and phone calls. It's unclear how the person obtained Wiles's connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles's number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information, or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Advertisement Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. 'We just can't share things willy-nilly.'

AT&T says conducting investigation into claims leaked data is for sale
AT&T says conducting investigation into claims leaked data is for sale

Business Insider

time14 hours ago

  • Business Insider

AT&T says conducting investigation into claims leaked data is for sale

After Hackread reported that the previous leaked data of 88M AT& T customers now includes both date of birth and Social Security numbers, an AT&T spokesperson said in a statement: 'It is not uncommon for cybercriminals to re-package previously disclosed data for financial gain. We just learned about claims that AT&T data is being made available for sale on dark web forums, and we are conducting a full investigation.' Confident Investing Starts Here:

How to tell if a login alert is real or a scam
How to tell if a login alert is real or a scam

Fox News

time17 hours ago

  • Fox News

How to tell if a login alert is real or a scam

Online scams thrive on the urgency and fear of their victims. If you've ever been a victim of a scam, you'd know that bad actors often try to rush you into taking action by creating a sense of fear. A scammer may call you impersonating a government agency and claim your Social Security number has been linked to drug trafficking. A phishing email might ask you to update your tax details or claim you've won a lottery or a free product, all to get you to click a malicious link. A more effective tactic scammers use is sending fake login alerts. These are warnings that someone has logged into your account, prompting you to take immediate action. This method works well because legitimate services like Google, Apple, Netflix and Facebook also send these types of notifications when someone, including you, logs in from a new device. It can be tricky to tell the difference. As Robert from Danville asks, "I constantly get in my spam junk folder emails saying 'someone has logged into your account.' Is this spam? legitimate? concerning? How do I know? How to avoid wasting time checking? How do I check?" Thanks for writing to us, Robert. I completely understand how tricky it can be to figure out whether these messages are legitimate or just another scam attempt. Let's break down what these urgent warnings usually look like and go over a few ways you can stay safe. Scammers often pose as login alerts from Google, Apple, Meta or even your bank, complete with official-looking logos, because fear is effective. But not every alert is a scam. In many cases, these notifications are legitimate and can help you detect unauthorized access to your accounts. Let's focus on the scam side first. Login alert scams have been around for a while. Early reports date back to 2021, and the trend has persisted since then. In 2022, reports surfaced that scammers were impersonating Meta and sending phishing emails to users. One such email used a clean layout with minimal text. It avoided the usual scare tactics and stuck to a simple message. But that is not always the case. A common red flag in phishing attempts is the tendency to overload the email with unnecessary details. These messages often include cluttered formatting, excessive explanations and an increasing number of typos or design errors. One phishing email simply gets to the point: Someone tried to Iog into Your Account, User lD A user just logged into your Facebook account from a new device Samsung S21. We are sending you this email to verify it's really you. Thanks, The Facebook Team What's concerning now is that poor grammar is no longer a reliable sign of a scam. Thanks to AI, even those with limited English skills can write emails that sound polished and professional. As a result, many phishing messages today read just like legitimate emails from trusted companies. Receiving a phishing email is not the real issue. The real problem starts when you click on it. Most of these emails contain links that lead to fake login pages, designed to look exactly like platforms such as Facebook, Google or your bank. If you enter your credentials there, they go directly to the scammer. In some cases, simply clicking the link can trigger a malware download, especially if your browser is outdated or your device lacks proper security. Once inside, attackers can steal personal information, monitor your activity or take control of your accounts. Real login notifications do exist; they're just much less scary. A genuine alert from Google, Apple or Microsoft will come from an official address (for example, no-reply@ or security@ and use consistent branding. The tone is factual and helpful. For instance, a legit Google security alert might say, "We detected a login from a new sign-in to your Google Account on a Pixel 6 Pro device. If this was you, you don't need to do anything. If not, we'll help you secure your account." It may include a "Check activity" button, but that link always redirects to a address, and it won't prompt you to reenter your password via the email link. Similarly, Apple notes it will never ask for passwords or verification codes via email. 1. Don't click any links or attachments and use strong antivirus software: Instead, manually log in to the real site (or open the official app) by typing the URL or using a bookmarked link. This guarantees you're not walking into a scammer's trap. The FTC recommends this: if you have an account with that company, contact them via the website or phone number you know is real, not the info in the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Remove your data from the internet: Scammers are able to send you targeted messages because your data, like your email address or phone number, is already out there. This often happens due to past data breaches and shady data brokers. A data removal service can help clean up your digital trail by removing your information from public databases and people-search sites. It's not a quick fix, but over time, it reduces how easily scammers can find and target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 3. Check your account activity: Go to your account's security or sign-in page. Services like Gmail, iCloud or your bank let you review recent logins and devices. If you see nothing unusual, you're safe. If you do find a strange login, follow the site's process (usually changing your password and logging out all devices). Even if you don't find anything odd, change your password as a precaution. Do it through the official site or app, not the email. Consider using a password manager to generate and store complex passwords. 4. Enable two-factor authentication (2FA): This is your best backup. With 2FA enabled, even if someone has your password, they can't gain access without your phone and an additional second factor. Both Google and Apple make 2FA easy and say it "makes it harder for scammers" to hijack your account. 5. Report suspicious emails: If you receive a suspicious email claiming to be from a specific organization, report it to that organization's official support or security team so they can take appropriate action. You shouldn't have to vet every sketchy email. In fact, your email's spam filters catch most phishing attempts for you. Keep them enabled, and make sure your software is up to date so that malicious sites and attachments are blocked. Still, the most powerful filter is your own awareness. You're definitely not alone in this. People receive these spammy login scares every day. By keeping a cool head and following the steps above, you're already ahead of the game. Have you ever encountered a suspicious email or phishing attempt? How did you handle it, and what did you learn from the experience? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store