Scammers List – Who’s The Target

Be Sociable, Share!

Internet Scam/If it is to good to be trueThe internet makes many everyday tasks faster and more convenient, like shopping and banking, but it is important to be safe and responsible online. I have discussed some ways from a “scammers list” and described how to avoid them.

Scammers use the internet to try to trick you into sending them money or your personal information.

We truly want to believe that the Internet is a safe place where you can’t fall for all types of online scams, but it’s always good reminder to do a reality check. We can become an easy target for malicious actors who want to steal our most valuable personal data.

Report a scam, Click Here.

Who Is The Target

Who is the target scam

As far as scams go, the narrative has often been that the senior citizens are usually the biggest target. But a recent study shows that there is a different age group in the United States that’s actually more likely to fall for scams than then elderly, and it’s a group that hits very close to home.

Not so long ago, you were considered a savvy internet user if you ignored unsolicited emails from very important people or places.

Report a scam, Click Here.

Now the distinction between what’s a scam and what’s a legitimate online business is not so cut and dry.

Social Network E-Mail

Social network

How it works: This phishing scheme involves receiving a fraudulent email that looks like it came from your actual social network. It may say you have new, urgent notifications or that someone is erroneously trying to access your account and you need to sign in to verify information. Click on the link in the email and you are directed to a fake website.

If you sign in on that page, scammers can then hack into your real account and steal your identity, sending out spam messages to your family and friends and using personal information to blackmail you.

How to avoid it: If there are notifications you need to see on your social network, visit that page directly by typing the Web address into the URL bar or opening the network’s app on your phone.

Do not click on links that are emailed to you. And set up two-step verification on all of your accounts so that if someone tries to sign in to your account from a non-trusted computer, you get a notification texted to you.

Report a scam, Click Here.

Unexpected Attachments

How it works: Scammers access one of your associates’ email accounts or social networks and send out fake emails or direct messages to all of his or her contacts.

They often include an attachment or a link to a fraudulent file-sharing website and ask you to download a file from there.

If you download the files, they spread destructive malware on your computer, locking down all the legitimate files on your device and holding it for ransom.

How to avoid it: If you receive an unexpected attachment or link to a file-sharing website from a contact, do not open it. Instead, reach out to that contact directly—preferably via another channel than how you received it, in case they have been hacked—and ask what the file is and if he or she intended to send it.

Report a scam, Click Here.

Friend Request

Friend request scam

How it works: A scammer duplicates a social network profile belonging to a friend and then adds you. Once you confirm, the con artist has access to personal information that can be used to hack into your bank accounts, such as your birthday, parents’ names, and pets’ names.

They can also then send out malicious links that you would be tempted to click and requests for money.

How to avoid it: Do not accept friend requests from strangers. If someone you are already friends with adds you as a friend, reach out to them offline and confirm whether they have a second account.

Do not share private information that could be used to crack your bank’s security questions online.

If you go out of town, wait until you return to post about it; you never know if one of your friends’ accounts is compromised.

Report a scam, Click Here.

Free WiFi Hot Spots

How it works: A criminal sets up an open-access Wi-Fi hot spot in a coffee shop or airport that’s connected to his or her laptop. Once you join, this person has access to your computer and mines it for financial and personal data.

How to avoid it: In the settings on your computer and phone, make sure your device does not automatically join open Wi-Fi networks. Turn on the option “Ask to join new networks.”

Keep your Wi-Fi turned off unless you are actively using it. If you would like to join the Wi-Fi network at a private business, ask an employee what the correct network name is before joining.

If you are visiting a public place such as an airport, search the Web ahead of time to confirm the official Wi-Fi network’s name.

\Do not conduct financial transactions on any of these networks. If you travel frequently, invest in your own password-protected hot spot to carry with you.

Report a scam, Click Here.

Pop-Ups

pop-up scam

How it works: As you’re browsing the Web, a pop-up window alerts you that your computer is infected with viruses and worms. It encourages you to scan your device with a specific antivirus software program and then offers to clean the bogus bugs off for a small fee.

If you download the program, it installs malicious software on your device, and these con artists then have your credit card information.

How to avoid it: Do not click on any links in pop-up ads. Install a robust, trusted antivirus program on your computer and run it regularly.

Also install pop-up blockers on your browsers to prevent these scams from ever reaching you.

Keep the important files on your computer backed up to an external drive, just in case.

Report a scam, Click Here.

Dating Profile Scam

Dating scam alert

How it works: A con artist sets up a phony dating profile with either completely made up information or photos and data stolen from a real person. He or she lures you in with messages, photos and phone calls. But they keep backing out of meeting in person and need help to pay their bills this month. If you wire them money, you never hear from them again or they keep asking for more.

How to avoid it: Trust your gut. If someone keeps refusing to meet, he or she may not be real or might be interested in your wallet rather than you. Never send money to someone you met online.

Report a scam, Click Here.

“Help Someone In Need” Scam

How it works: A media-savvy scam artist sets up a crowd-funding page or charity website related to a topic that is getting lots of news coverage. It could be related to a natural disaster or a viral story about a person in need.

They convince people to share the link on social media and send you emails about contributing to the cause. If you click on the link and donate money using a bank card, the scam artist can steal your bank information and drain your account or sell it to others who will.

How to avoid it: Don’t click on links you receive via email or those with suspicious Web addresses linked on social media. To donate to someone in need, search for the charity and go directly to its official site.

Confirm that you are at the right place and it is secure—the URL should appear with a “https://” at the beginning—before handing over your bank card information.

Report a scam, Click Here.

Internet Fraud

Internet-fraud

Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them.

Internet crime schemes steal millions of dollars each year from victims and continue to plague the Internet through various methods. Several high-profile methods include the following:

Business E-Mail Compromise (BEC): A sophisticated scam targeting businesses working with foreign suppliers and companies that regularly perform wire transfer payments.

The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.

Data Breach: A leak or spill of data which is released from a secure location to an un-trusted environment.

Data breaches can occur at the personal and corporate levels and involve sensitive, protected, or confidential information that is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.

Denial of Service: An interruption of an authorized user’s access to any system or network, typically one caused with malicious intent.

E-Mail Account Compromise (EAC): Similar to BEC, this scam targets the public and professionals associated with, but not limited to, financial and lending institutions, real estate companies, and law firms.

Perpetrators of EAC use compromised e-mails to request payments to fraudulent locations.

Malware/Scareware: Malicious software that is intended to damage or disable computers and computer systems. Sometimes scare tactics are used by the perpetrators to solicit funds from victims.

Phishing/Spoofing: Both terms deal with forged or faked electronic documents. Spoofing generally refers to the dissemination of e-mail which is forged to appear as though it was sent by someone other than the actual source.

Phishing, also referred to as vishing, smishing, or pharming, is often used in conjunction with a spoofed e-mail. It is the act of sending an e-mail falsely claiming to be an established legitimate business in an attempt to deceive the unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account information after directing the user to visit a specified website.

The website, however, is not genuine and was set up only as an attempt to steal the user’s information.

Ransomware: A form of malware targeting both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and/or systems.

Ransomware is frequently delivered through spear phishing emails to end users, resulting in the rapid encryption of sensitive files on a corporate network.

When the victim organization determines they are no longer able to access their data, the cyber perpetrator demands the payment of a ransom, typically in virtual currency such as Bitcoin, at which time the actor will purportedly provide an avenue to the victim to regain access to their data.

Report a scam, Click Here.

Be Alert

Be Alert

There are a lot of different ways that con artists can trick you into letting them access your bank account or giving out your personal information.

I hope that some of these scams listed from a scammers list will help you notice when and if someone is trying to run a bunch of B.S. by you. I know it can be very hard to spot at times. This also may help you in avoiding them as well.

It can be very important to be able to identify the different types of scams out there. There are many other ways, other than what I have listed, that people use. I took some more popular ones and described for you.

To Report a scam, Click Here.


Always pay attention and be aware of what you are doing! Good luck, I hope I was able to shed a little light for you.

Be Sociable, Share!