How Scammers Use Social Engineering to Steal Money
Learn how scammers use social engineering tactics to steal money and personal information. Discover tips to protect yourself from fraud and identity theft.
Read moreLearn how scammers use social engineering tactics to steal money and personal information. Discover tips to protect yourself from fraud and identity theft.
Read moreTech support fraud occurs when the subject claims to be associated with a computer software or security company, or even a cable or Internet company, offering technical support to the victim. Phony tech support companies utilize several different methods to contact or lure their victims. This list is not all inclusive, as the subjects are always varying their schemes.
Read moreA money mule acts as a layer of distance between a scammer and their victims by handling stolen funds on behalf of someone else, either knowingly or unknowingly. Money mules make a scam harder to trace and the money even harder to find. Beware of offers that promise quick cash or a commission in exchange for receiving money and then sending it to someone else. This may take the form of a fake job opportunity, investment scheme, or prize award.
Read moreScams impersonating financial institutions have become increasingly prevalent in our digital age. Falling for one can cost you money and peace of mind. Stay informed and safeguard your financial well-being as we dive into the latest tactics of fraudsters that masquerade as legitimate financial institutions.
Read moreMany basic necessities rely on utilities we take for granted. And that makes them perfect for a scammer to exploit. Like many other scams, utility scams occur when a scammer pretends to be someone they’re not. In this case, the scammer poses as a representative from your power or water company and threatens to turn off your services unless you send payment right away or provide some important personal information.
Read moreWhen it comes to making safe marketplace purchases, remember to slow down and ask questions. If you detect suspicious activity, report the user to your marketplace platform.
Read moreScammers are always coming up with new ways to trick people, but no matter the scam, there are common trends you should be aware of to keep your money and personal information safe.
Read moreWith increasing rates of ATM scams in recent years, it's extremely important to stay alert and protect yourself when using the ATM. ATM fraud occurs when criminals steal card information through an ATM, and use that information to make unauthorized purchases or withdrawals. They typically rely on equipment installed at ATMs or wireless sensors to capture the information and create duplicate cards. Even without a physical card, the stolen data can be used to charge purchases or withdraw funds from your account.
Read moreA work-from-home scam involves thieves making false promises to job applicants in order to steal their money, their confidential data, or both.
Read moreSocial Security numbers (SSNs) are like bank and credit card account numbers' unauthorized access can create serious problems for the owner. Scammers hope to use your knowledge of this simple fact against you by falsely claiming that your SSN has fallen into the hands of criminals, and they need your help to resolve the situation.
Read more