Security & Fraud

 

General information about common scams

SCAMS DESCRIPTION HOW TO AVOID IF IT HAPPENS TO YOU

Phishing
Fraudulent attempts to obtain sensitive information like usernames, passwords and credit card details   Be cautious of unsolicited emails or messages requesting personal information. Do not click on suspicious links. Report Phishing attempts to relevant authorities such as the Federal Trade Commission.
Identity Theft  Stealing someone's personal information in an attempt to commit fraud or other crimes.  Regularly monitor your financial accounts for suspcious activity. Freeze credit reports if necessary. Contact credit bureaus, banks/credit unions, and relevant authorities such as the FTC or identitytheft.gov.
Tech Support Scam  Impersonating a tech support representative to gain access to victim's computer or steal money. Hang up on unsolicited calls claiming to be from tech support. Never give control of your computer remotely. Report scams to the FTC and contact local law enforcement authorities.
Investment Scam  Offering fake or nonexistent investment opportunities to defraud investors of their money.  Research investment opportunities thoroughly. Be skeptical of promises of high returns with little risk. Report suspicious investment schemes to the SEC, file complaints with the FTC, seek legal advice if necessary.
Romance Scam  Exploiting emotional connections to manipulate victims into sending money or personal information.  Be cautious of individuals online asking for money or personal details. Avoid sending money to unknown persons. Report romance scams to the FTC, file complaints with the FBI's Internet Crime Complaint Center (IC3).
Charity Scam  Falsely representing a charitable cause to solicit donations, with funds typically used for personal gain.  Verify the legitimacy of charities before donating. Never give personal or financial information over the phone.  Check the charity's legitimacy through websites like Charity Navigator or GuideStar.Report scams to the FTC.
Stolen Mail  Theft of physical mail for the purpose of identity theft, financial fraud, or other illegal activities.  Monitor mail regularly. Report suspected mail theft to USPS. Consider using a locked mailbox or PO Box. Contact USPS Postal Inspectors, local law enforcement, or report to the Postal Inspection Service's website.
Malware  Software designed to infiltrate or damage computer systems, often used to steal sensitive information.  Install reputable antivirus software. Be cautious of suspicious links or attachments in emails and websites. Use antivirus software, report incidents to FTC, FBI's Internet Crime Complaint Center (IC3), or local authorities.
Data Breaches  Unauthorized access to sensitive information, potentially exposing personal or financial data of individuals.  Change passwords immediately after a breach. Monitor accounts for unusual activity. Consider credit monitoring. Report breaches to affected organizations, FTC, or state attorney general's office. Utilize credit monitoring services.
Credit Card Fraud  Unauthorized use of someone's credit card information to make purchases or withdraw funds.  Regularly monitor credit card statements for unauthorized charges. Report any suspicious activity immediately. Contact credit card issuer, report to FTC, file a police report, consider placing a fraud alert on credit reports.

 

Blog articles related to cyber security