Phishing |
Fraudulent attempts to obtain sensitive information like usernames, passwords and credit card details |
Be cautious of unsolicited emails or messages requesting personal information. Do not click on suspicious links. |
Report Phishing attempts to relevant authorities such as the Federal Trade Commission. |
Identity Theft |
Stealing someone's personal information in an attempt to commit fraud or other crimes. |
Regularly monitor your financial accounts for suspcious activity. Freeze credit reports if necessary. |
Contact credit bureaus, banks/credit unions, and relevant authorities such as the FTC or identitytheft.gov. |
Tech Support Scam |
Impersonating a tech support representative to gain access to victim's computer or steal money. |
Hang up on unsolicited calls claiming to be from tech support. Never give control of your computer remotely. |
Report scams to the FTC and contact local law enforcement authorities. |
Investment Scam |
Offering fake or nonexistent investment opportunities to defraud investors of their money. |
Research investment opportunities thoroughly. Be skeptical of promises of high returns with little risk. |
Report suspicious investment schemes to the SEC, file complaints with the FTC, seek legal advice if necessary. |
Romance Scam |
Exploiting emotional connections to manipulate victims into sending money or personal information. |
Be cautious of individuals online asking for money or personal details. Avoid sending money to unknown persons. |
Report romance scams to the FTC, file complaints with the FBI's Internet Crime Complaint Center (IC3). |
Charity Scam |
Falsely representing a charitable cause to solicit donations, with funds typically used for personal gain. |
Verify the legitimacy of charities before donating. Never give personal or financial information over the phone. |
Check the charity's legitimacy through websites like Charity Navigator or GuideStar.Report scams to the FTC. |
Stolen Mail |
Theft of physical mail for the purpose of identity theft, financial fraud, or other illegal activities. |
Monitor mail regularly. Report suspected mail theft to USPS. Consider using a locked mailbox or PO Box. |
Contact USPS Postal Inspectors, local law enforcement, or report to the Postal Inspection Service's website. |
Malware |
Software designed to infiltrate or damage computer systems, often used to steal sensitive information. |
Install reputable antivirus software. Be cautious of suspicious links or attachments in emails and websites. |
Use antivirus software, report incidents to FTC, FBI's Internet Crime Complaint Center (IC3), or local authorities. |
Data Breaches |
Unauthorized access to sensitive information, potentially exposing personal or financial data of individuals. |
Change passwords immediately after a breach. Monitor accounts for unusual activity. Consider credit monitoring. |
Report breaches to affected organizations, FTC, or state attorney general's office. Utilize credit monitoring services. |
Credit Card Fraud |
Unauthorized use of someone's credit card information to make purchases or withdraw funds. |
Regularly monitor credit card statements for unauthorized charges. Report any suspicious activity immediately. |
Contact credit card issuer, report to FTC, file a police report, consider placing a fraud alert on credit reports. |