CapitalCrafting.Com

Edit Content
Menu

Types Of Scam

“Educate yourself now, and be one step ahead for your safety!”

Education and Awareness:

  • Learn about common types of scams: Phishing, smishing (SMS phishing), social engineering, ransomware, etc. Understanding these can help you recognize warning signs.
  • Free Resources:
    • PhishTank – A global database where users can report and check phishing websites.
    • Cyber Aware by NCSC – Cybersecurity guidance from the UK’s National Cyber Security Centre.
  • Paid Resources:
    • Udemy – Cybersecurity courses that cover topics like scam prevention.

Well-Known Types Of Scam

Text or SMS scams

Text or SMS was the most reported contact method for scams last year. Scam messages sound urgent to get you to act quickly. They often have a link that will take you to a scam website. Scammers can steal any personal information you enter on these scam websites and use it to steal your money or commit fraud on your behalf.

Phone scams

Scammers call, claiming to be from well-known organisations. This includes government organisations, law enforcement, investment and law firms, banks, telecommunication providers.

Email scams

They use the same logo and a similar email address as the real organization. Scammers can also copy or 'spoof' the email address of an organization or business to make the scam email look more real.

Social media Scams

Scammers set up fake profiles on social media, messaging platforms and apps. They pretend to be from the government, a real business, employer, investment firm, or even a friend, family member or romantic interest.

Website scams

Scammers create fake websites to look like well-known brands. They impersonate famous people and make it look like they recommend the product or service. They use fake reviews to make you trust them.

Investment scams

Scammers use convincing marketing and new technology to make their investment sound too good to miss. They promise you big payouts with little or no risk. They often use pressure tactics to get you to act fast, so they can steal your money.

Face to face Scams

Scammers may knock on your door or approach you in public and ask you to do something.

Romance scams

Scammers will find you on social media, dating or gaming apps and websites. They might also text or email you. They hide behind fake profiles and identities, sometimes of famous people. They’re really good at making you feel special, so you believe the relationship is real.

Product & services scams

Scammers set up fake websites or profiles on actual retailer sites. They then offer products or services at prices that are too good to be true. They also post fake ads and fake reviews. They may use stolen logos, a .com.au domain name and stolen Australian Business Number (ABN). These scams are hard to spot.

Threats & extortion scams

Scammers pretend to be from an organization and claim you need to pay money. They may threaten you with arrest, deportation, or even physical harm if you don’t agree to pay them immediately.

Jobs & employment scams

Scammers pretend to be hiring on behalf of high-profile companies and online shopping platforms. They also impersonate well-known recruitment agencies. Their goal is to steal your money and identity details.

Unexpected money

Scammers try to convince you that you are owed or entitled to, money or winnings that you did not expect to receive. The scammer asks you to pay a fee or to give your financial or identity details so you can get the money or winnings. There is no free money, and you will lose more money trying to get it.

piqsels.com
Credit: piqsels.com

Phishing & Social Engineering

What is Phishing?

Phishing attempts to trick you into revealing personal information by pretending to be a trustworthy source.

How to Recognize Phishing

  • Be wary of unexpected emails requesting personal information.
  • Check the sender’s email address for suspicious signs.
  • Avoid clicking on links in suspicious emails.

Prevention

  • Use reliable antivirus software, like Norton or Bitdefender.
  • Enable spam filters in your email client.

Social Media

Privacy Settings on Social Media

Configure your privacy settings on social media to limit who can see your information:


Sharing Personal Information

Be cautious about what information you share online. Avoid posting sensitive details like addresses, phone numbers, or birthdates.

Frequently asked questions

  • Be cautious of unexpected emails requesting personal information.
  • Check the sender’s email address for legitimacy.
  • Avoid clicking on links or downloading attachments from suspicious emails.
  • Use reliable antivirus software and enable spam filters.
  • Without a VPN, never, conduct important business online, never access financial records or institutions or important government facilities online. Without a VPN, when you are operating in an open, public wifi environment, you should assume your traffic and keystrokes are being monitored. It is extremely easy for anyone to do so.
  • Encrypts your internet connection, protecting your data from hackers.
  • Hides your IP address, enhancing your online privacy.
  • Allows access to restricted content by bypassing geographic restrictions.

Extra Resources against scams

Free Web Scanner

  • Malcure Webscan is a free website security scanner against malware. 
  • VirusTotal will analyze files and URLs for malware using multiple antivirus engines.

  • Sucuri SiteCheck scans websites for malware, blacklisting, server errors, and outdated software.

Free lookup websites

  • Truecaller  is a global phone directory and caller ID service that helps identify unknown callers and block spam calls.

  • Spy Dialer allows you to find phone numbers and owners by entering the phone number.
    It works in many countries.

  • Pipl is a comprehensive search engine to find information about people worldwide by searching name, email, phone number, or username.

Free breach check

  • Have I Been Pwned is a free service that allows you to check if your email addresses or phone numbers have been compromised in known data breaches.

  • Firefox Monitor is a free service from Mozilla that lets you check if your email addresses have been compromised and send alerts about future breaches.

  • DeHashed is a search engine for compromised data, allowing you to search for email addresses, usernames, IP addresses, phone numbers, and more. 

During a Scam Attempt

  • Scamwatch is an Australian government service providing information and advice on how to avoid and report scams. It offers resources for both consumers and businesses.
  • Globalantiscam is a global anti-scam resource providing information and tools for identifying and reporting scams. It aims to protect users from fraudulent activities worldwide.
  • The European Anti-Fraud Office (OLAF) is the EU’s anti-fraud office offering information and resources on preventing and reporting scams within Europe. It provides support for both individuals and organizations.

  • Go straight to the local police station and make a report on the matter. This must happen as soon as possible!

After a Scam Attempt

  • IdentityTheft.gov is a U.S. government service that helps identity theft victims report and restore their identity.

  • Action Fraud is the UK’s national reporting center for fraud and cybercrime.

  • Europol EC3 is Europol’s center for combating cybercrime, providing resources and information on how to handle cybercrime.