Personal online security

10 helpful tips for your own online security.

1. Passwords

1. Passwords

Use strong passwords Use a combination of letters, numbers, and special characters. Change regularly: Update your passwords regularly. Avoid reuse: Do not use the same password on multiple websites.

2. Phising

2. Phising

Be aware of phishing and suspicious emails. Do not open attachments or click on links from unknown senders. Check URLs: Make sure you are visiting the correct website by checking the URL carefully. Double-check information: If something seems suspicious, contact the company directly via their official contact information.

3. Update software

3. Update software

Update software regularly Operating System: Keep your operating system up to date to protect against the latest threats. Programs: Make sure all your programs and apps are up-to-date. Antivirus: Install and keep your antivirus software up-to-date.

4. Secure networks

4. Secure networks

Use secure networks Public Wi-Fi networks: Avoid using public Wi-Fi networks for sensitive activities. VPN: Consider using a VPN to protect your internet connection when using public networks.

5. Privacy settings

5. Privacy settings

Be aware of your privacy settings Social media: Review and adjust your privacy settings regularly. App Permissions: Give only the necessary permissions to apps. Information Sharing: Do not share personal information publicly unless necessary.

6. Be critical

6. Be critical

Be critical of what you read Fake news: Be aware of misinformation and verify the sources. Reviews and recommendations: Read more reviews to get a better overview.

7. Backup Data

7. Backup Data

Backup your data Regular backups: Take regular backups of your important files. Use the cloud: Consider using a cloud-based service for your backups.

8. Downloads

8. Downloads

Be careful with downloads Trusted sources: Only download software and files from trusted sources. Scanned downloads: Use antivirus software to scan downloads for malware.

9. Web certificate

9. Web certificate

Understand web page certificates HTTPS: Only visit websites with HTTPS in the URL to ensure your data is encrypted. Certificate details: Click the padlock symbol in the browser's address bar to view certificate details.

10. Digital footprint

10. Digital footprint

Learn about digital footprints Cookies and tracking: Understand how cookies and tracking work and manage your settings. Anonymous Browsing: Use incognito mode to minimize the traces of your activities online.

STOP

If something feels suspicious, immediately stop communicating with the person or company. Never share your personal information, such as bank details, passwords, or Social Security numbers.

Guide to online security & anonymity

Nice to have for your own online security.

Intern IP address tools

Internal IP addresses identify which device in a local network is your computer, as opposed to other devices using the intranet connection.
An internal IP address is also known as a local IP address.

Go to the online security checklist now

Don’t you know how to start this safety process?

Then go read some more about it on my online security checklist

Anti-Scam Security HUB
STOP

Scammers often create a sense of urgency, pressuring you to make quick decisions. Take your time to think things through. Avoid making any payments, sharing information, or committing to anything until you’ve thoroughly researched and feel confident that the situation is legitimate.

Tricks everyone should know about

Tips and tricks for searching the web, which will come in handy when looking up names and locations.

Anti-Scam Security HUB

Ongoing scam attempt

LookUp & trick a scammer

This detailed strategy gives you a strong foundation for handling and exposing a scammer, even if they are using a VPN and other techniques to conceal their identity.

Always prioritize your safety and anonymity when dealing with a scammer.

We do not recommend you handle this alone, and that is why you have to go to the local police immediately, so they can handle the situation correctly. 

  • Identify the Scam Type: Determine what kind of scam you’re dealing with. It could be phishing (fake emails or websites designed to steal personal information), tech support scams (where scammers pretend to be technical support to gain access to your computer), romance scams (where scammers pretend to be interested in a romantic relationship to steal money), or another type.
  • Research Online: Learn about how this type of scam typically operates and what common tactics and red flags are associated with it. Websites like FraudWatch International or Scamwatch can provide specific examples.
  • Engage Cautiously: If you’re already in contact with the scammer, avoid sharing any personal information like your full name, address, date of birth, bank details, or passwords.
  • Suspicious Questions: Be wary of questions that seem unusually personal or irrelevant to the topic at hand. Keep your responses vague and avoid giving out information that could be used against you.
  • Screenshots and Saved Messages: Take screenshots of all communication with the scammer. Save emails and text messages in their entirety, including any metadata.
  • Metadata: For emails, examine the email headers to find where the email originated. Tools like MXToolbox can help you analyze email headers.
  • Demand Proof of Identity: If the scammer claims to represent a business or authority, request official documents or proof of identity. This could include copies of ID, business registrations, or other official paperwork. Many scammers will struggle to provide genuine documentation.
  • Virtualization: Use a virtual machine (VM) to isolate your interactions with the scammer. A VM allows you to run an operating system within your existing system without risking your main system. Software like VMware or VirtualBox can help with this.
  • Security: If something goes wrong, you can easily delete and recreate the VM without affecting your primary system. This protects you from malware and other threats.

Maintain the Facade: If you reveal that you know it’s a scam, the scammer might stop communicating. Keep the conversation neutral, and don’t show any suspicion. This can give you more time to gather valuable information.

  • Inquire: Ask detailed questions about the scammer’s claimed business, service, or identity. This can include questions about where the company is registered, contact details, or how their service works.
  • Verification Questions: Request detailed information that the scammer might find difficult to fake, such as tax IDs, company registration numbers, or references. Scammers often try to avoid answering such questions.
  • Domain and Email Verification: Use WHOIS lookup tools to find information about domains. Check how long the domain has existed and who it’s registered to. This can reveal if the website is newly created and likely part of a scam.
  • IP Address: Use IP lookup tools to find the location of an IP address used in emails. Even if they use a VPN, email metadata might give away clues about their actual location.
  • Local Authorities: Contact your local police and provide them with all the evidence you’ve collected. This is especially important if you’ve received threats or suffered financial loss.
  • Online Reporting Tools: Use tools like Scamwatch, FraudWatch International, and SpamCop to file a complaint. These platforms can also guide you on further steps.
  • Platform-Specific Reporting: If the scam occurred on a specific platform (like eBay, PayPal, or Facebook), use their built-in reporting tools. This can help get the scammer removed from the platform.
  • Social Media and Forums: Share your experiences and warnings on social media and in relevant forums to alert others. This helps protect others from falling victim to the same scam.
  • Personal Network: Inform friends and family about the scam, especially if you think they might also be targeted. Raising awareness can prevent others from being scammed.
  • Anonymity: If you’re engaging with a scammer to gather information, make sure to protect your own identity. Use fake names and information when communicating with the scammer to prevent them from accessing your real details.
  • Privacy Protection: Use VPNs and secure communication methods to protect your internet traffic and avoid revealing your real location. Consider using encrypted messaging apps for secure communication.
  • Identify transactions: If the scammer goes as far as paying for fake IDs or other services to support their scam, this could be a key lead. If you can find out their payment method, you can trace them through the payment provider.
  • Collaborate with Service Providers: Contact the payment service (e.g., PayPal, Western Union) and report the scam. These services may have investigative tools and can help trace the scammer.
  • Use Advanced Tracking Tools: If you have technical expertise or access to an expert, tools like Wireshark can be used to analyze network traffic and potentially reveal the scammer’s true IP address, even behind a VPN.
  • Social Engineering via Scammer’s Technology: If you can convince the scammer to install software or visit certain websites, you might be able to gather additional information about their device, browser, or operating system.

Read more about the types of scam

Before we continue, I would like to offer an insight into the most normal scam types that you may run the risk of facing.

Therefore, it is important to read and understand what situation you may find yourself in and avoid it as soon as possible to avoid being hit.

STOP

Take time to investigate whether the person or company you’re dealing with is legitimate. Look for reviews, check official websites, and search for scam warnings online. If possible, contact the company directly using their official contact information to verify the legitimacy of the inquiry.

Scam reporting by continent

  • South African Police Service (SAPS):
    Handles fraud and economic crime in South Africa.

  • Economic and Financial Crimes Commission (EFCC), Nigeria:
    Combats financial and economic crimes in Nigeria.

There are no permanent residents or national authorities in Antarctica.

Any criminal activity is managed by the respective authorities of the countries operating research stations there.

  • National Police Agency (NPA), Japan:
    Responsible for handling fraud and economic crime in Japan.

  • Central Bureau of Investigation (CBI), India:
    Investigates financial crimes and fraud in India.

  • Europol:
    The European Union’s law enforcement agency assists member states in combating serious international crime and terrorism.

  • European Financial and Economic Crime Centre (EFECC):
    A division of Europol focused on financial crimes.

  • Action Fraud
    This is the United Kingdom’s national reporting center for fraud and cybercrime. It provides a platform for individuals and businesses to report fraud, receive advice on staying safe online, and access resources to prevent scams. Managed by the City of London Police, it works alongside law enforcement agencies to combat financial crimes.

  • Website: Action Fraud

Contact list for scam concerns

If you suspect that you are being scammed, here are five websites you can visit for help and support, besides your local police department.

Federal Trade Commission (FTC): The FTC provides resources for reporting scams and offers advice on protecting yourself from fraudulent activities.

By contacting these organizations, you can get the support you need to address potential scams and protect yourself from further harm. Stay vigilant and proactive in safeguarding your online activities.

Action Fraud (UK): The UK’s national reporting center for fraud and cybercrime, where you can report scams and get advice.

Scamwatch (Australia): Run by the Australian Competition and Consumer Commission (ACCC), this site offers a place to report scams and find out about the latest scam alerts.

Internet Crime Complaint Center (IC3): A partnership between the FBI and the National White Collar Crime Center (NW3C), providing a place to report internet crime.

European Consumer Centre (ECC-Net): Provides advice and assistance to consumers in Europe, including help with scams and cross-border disputes.

STOP

If you’ve already shared financial information or transferred money, contact your bank or payment provider immediately. They may be able to stop the transaction and help you protect your accounts from further fraud.

Hit by a scam

This guide provides a comprehensive approach to preparing for, handling, and responding to scams on a global scale.

By utilizing the mentioned tools and resources, you can protect yourself and respond effectively in case of a scam.

  • Monitor your accounts closely to ensure no further unauthorized transactions occur. Consider freezing your credit with credit bureaus.
  • Free Resources:
  • Paid Resources:
    • IdentityForce is an ID theft protection service offering credit monitoring and protection.
  • If you have suffered financial loss or been a victim of identity theft, seek help from relevant organizations or authorities, such as the police cybercrime department.
  • Free Resources:
  • Paid Resources:
  • Check if anyone has opened accounts or credit in your name.
  • SEEK MENTAL HELP IF NEEDED! 

  • Free Tools:
    • Have I Been Pwned? Check if your email addresses have been compromised in data breaches.
  • Paid Tools:
STOP

Report the scam to relevant authorities, such as the police or consumer protection agencies, and any platforms where the scam occurred (e.g., social media or email providers). This can help prevent others from falling victim to the same scam.

A huge shoutout to all the amazing organizations, companies, white-hat groups, and individuals who work tirelessly to protect us from scammers.

Your work is crucial in an increasingly digital world, protecting our personal data, finances, and online security. Without your efforts, countless people would fall victim to fraud and cybercrime.

To organizations such as the FTC, Scamwatch, INTERPOL, and many others: your ongoing efforts to raise awareness, provide resources, and support victims are invaluable.

To companies like Truecaller, Payback, and Scamadviser—your tools and platforms give us the power to protect ourselves from scams every day. You make security accessible and practical for everyone.

To the whitehats, security experts, and everyday individuals who alert, inform, and protect—thank you. You may not always receive public recognition, but your work makes a huge difference.

Thank you for everything you do.

Scroll to Top