1. Social Security Scams

Scammers often use robocalls or cold calls to target victims by claiming their social security number is involved in suspicious activity and will be suspended unless they pay a fine or fee. They may suggest that the victim is a subject of a criminal investigation and that paying the fee will straighten everything out. The scammers will often ask for payment through Money Gram, prepaid debit cards, Bitcoin, or other irreversible payment methods.

It is important to note that the Social Security Administration will never call and ask for payment over the phone. If you receive a call like this, it is best to hang up and report the scam to the Federal Trade Commission. Additionally, it is important to take steps to protect your personal information, including regularly reviewing your credit report, monitoring your financial accounts, and being cautious when giving out personal information online or over the phone. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?


GET FREE SCAM ALERTS VIA EMAIL AS SOON AS THEY ARE EXPOSED


totalscam_lock

NEVER GET SCAMMED AGAIN!

Scammers never stop devising schemes to separate us from our hard-earned money. So, make sure to sign up for our weekly email scam alerts. TotalScam!™ Alert will notify you as soon new scams are discovered.

2. IRS Scams

Another variation of the Social Security scam is when the scammer poses as an IRS agent and tells the victim that they have unpaid taxes that are seriously delinquent. They may make threats of an immediate levy on the victim’s bank account or even arrest unless an immediate payment is received through a wire transfer.

It is important to note that the IRS will never call and demand immediate payment over the phone, and they will always provide written notice of any taxes owed. Additionally, the IRS will not demand payment through a wire transfer or prepaid debit card. If you receive a call like this, it is best to hang up and report the scam to the Federal Trade Commission.

It’s also important to be aware that scammers often use the fear of the IRS to manipulate victims into paying money they don’t actually owe. If you have any questions or concerns about your taxes, it’s best to contact the IRS directly. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

3. Debt Collection Scams

Collection calls can often be an unpleasant experience, but it is important to be aware of the potential for fraudulent activity as well. Scammers may falsely claim that a past-due balance exists and that legal action, such as a judgment, is imminent if payment is not made. These individuals may use well-known credit card companies, such as Visa or Capital One, to lend credibility to their false claims.

Additionally, scammers may use aggressive tactics, such as name-calling or attempts to shame the individual, in order to coerce payment. It is important to note that, as with all scams, payment should never be made through prepaid or anonymous methods.

It’s best to verify the authenticity of the call and the existence of any outstanding debts through official channels before making any payments. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

totalscam_lock

Weekly Scam Alerts - Free Service

Get notified when new scams are exposed!

Scammers never stop devising schemes to separate us from our hard-earned money. So, make sure to sign up for our weekly email scam alerts. TotalScam!™ Alert will notify you as soon new scams are discovered.

Our investigations into Common Scams of 2024

4. Lottery Scams

Lottery scams are a form of deception in which scammers falsely notify individuals that they have won a prize in a lottery or sweepstakes. These scams typically utilize fake or counterfeit documents, such as fabricated lottery tickets or fraudulent emails or letters, to convince the victim of their supposed winnings.

The scammer may then request personal details, such as social security numbers or bank account information, in order to claim the prize. They may also demand payment of a fee or “tax” to receive the supposed winnings.

It is imperative to understand that legitimate lotteries and sweepstakes do not require individuals to pay any fees or taxes to claim a prize. Additionally, authentic lotteries and sweepstakes will never solicit personal or financial information to claim a prize.

If you receive any communication that you suspect to be a lottery scam, it is vital to not provide any personal or financial information, and instead, report it to the appropriate authorities, such as the Federal Trade Commission or the Better Business Bureau. Furthermore, one should always exercise caution when receiving unsolicited communications or requests for personal information, and ensure to verify the authenticity of any communication or request before providing any information or payment. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

5. Car Wrap Advertising Scams

You may have noticed vehicles on the road with advertising on their sides, such as private cars, vans, and SUVs. While there are legitimate car wrap advertising opportunities available, it is important to be aware that the number of fraudulent offers greatly outnumber them.

Scammers often advertise job opportunities on job boards and social media platforms, offering to pay individuals for simply driving their personal vehicles to and from work with advertising on the car. These scammers may offer to pay in advance, and may even send a check for the first month’s payment, along with additional funds to cover the cost of the car wrap specialist.

However, this check is fake, and when the victim deposits it and sends their own money to the supposed car wrap shop, which is often an accomplice of the scammer, they are left with a bounced check and out of the amount they sent to the supposed car wrap shop. It’s crucial to be cautious of offers that seem too good to be true and thoroughly research any opportunities before engaging. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?


GET FREE SCAM ALERTS VIA EMAIL AS SOON AS THEY ARE EXPOSED


totalscam_lock

NEVER GET SCAMMED AGAIN!

Scammers never stop devising schemes to separate us from our hard-earned money. So, make sure to sign up for our weekly email scam alerts. TotalScam!™ Alert will notify you as soon new scams are discovered.

6. Apartment or House Rental Scams

Finding a suitable rental property can be a challenging task. However, imagine coming across an advertisement for a rental that seems perfect in terms of location, amenities, and cost. Upon further inquiry, you learn that the interior of the property is not available for viewing as the owner is currently out of town.

The low rental cost is presented as an incentive for finding the right “caretaker” for the property, as the owner plans to return in a few years. The terms of the lease may be unclear and a deposit is required.

Upon sending the deposit, the keys to the property never arrive. This is because the supposed owner does not actually own the property and the ad is a fraudulent listing, often found on online classified websites such as Craigslist, using real estate listings as a guise. It’s important to be cautious when searching for rental properties and to verify the legitimacy of any property and the identity of the owner before making a deposit or signing a lease.

Protect Your Online Activity
Stay safe online with the fastest VPN service

Choose the options that suits your needs:

Get up to 59% off annual plans with NordVPN. Hide your location while online.

VPN private internet connection + antivirus, malware, ransomware, and hacking protection. 

7. Online Dating Scams

Online dating platforms have become a popular way for people to connect romantically. However, it is important to be aware that scammers also use these sites as a means to exploit individuals for financial gain.

Scammers may establish a romantic connection quickly and claim to be temporarily unavailable due to situations such as military deployment, work with a humanitarian organization abroad, or employment on an oil rig. These claims should be viewed with skepticism, as they are often false.

When interacting with individuals on online dating platforms, it is essential to exercise caution. Scammers may request money for various reasons, such as travel expenses, taxes on gifts, fabricated hospital bills, or other pretexts. It’s important to be wary of sudden declarations of love, and to never send money to someone you have not met in person. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

8. Grandparents Scams

The grandparent scam, also known as the emergency scam, is a tactic used by fraudsters to exploit older individuals by posing as their grandchild in need of emergency funds. This scam is prevalent and is facilitated by the easy access to personal information on social media.

Scammers will typically target specific grandparent-grandchild pairings and reach out to the grandparent through phone or email, claiming that the grandchild is in an urgent situation and needs money for bail, airfare, medical bills, or other emergencies.

They may even impersonate the grandchild making the scam more personal and harder for the grandparent to detect. It is crucial to be aware of this type of scam and to exercise caution when receiving unexpected phone calls or emails from individuals claiming to be family members in need of emergency funds. Always verify the authenticity of the request before sending any money.

Connecting to the internet without using a VPN in 2023 is like swimming in shark-infested waters with a juicy steak strapped to your back. Learn how VPN works or use this 50% off coupon for NordVPN.

9. Technical Support Scams

Tech support scams are a common tactic used by fraudsters to trick individuals into paying for unnecessary technical support services. These scammers often falsely claim that there is a significant problem with the victim’s computer, such as a virus, in order to convince them to pay for services that are not needed.

The scammers may ask for payment through methods that are difficult to trace or reverse, such as wiring money, purchasing gift cards, prepaid cards, cash reload cards, using cryptocurrency or a money transfer app. They do this in the knowledge that once the payment is made, it will be difficult to reverse the transaction.

It’s crucial to be cautious when receiving unsolicited phone calls or messages claiming to be from tech support, and to never provide personal or financial information or make payments without thoroughly verifying the legitimacy of the request. Additionally, it’s a good idea to keep your computer software updated and use a reputable anti-virus software to protect your computer from real threats. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

10. Pets for Sale Scams

Pet scams are a cruel tactic used by fraudsters to exploit the kindness of animal lovers looking for pets online. The scammer will often post an attractive photo of a pet, offering it for free or at a low cost. They may claim that the pet belonged to their deceased child or that they are moving and can no longer keep the pet.

However, once the victim expresses interest in the pet, the scammer will then request payment for expenses such as air transportation, equipment, and insurance required by the airline. They will often ask for payment through wire transfer or other prepaid methods, which can be difficult to trace or reverse.

It’s important to be aware of these types of scams and to exercise caution when searching for pets online. Legitimate pet sellers will not ask for payment for transportation and equipment before the pet is delivered. Always verify the authenticity of the seller and the pet, and never send money through wire transfer or prepaid methods. Read the full article here.

Our investigations into Common Scams of 2024

11. Counterfeit Merchandise Scams

Counterfeit products, also known as knockoffs, have existed for as long as there have been successful brands. While it is relatively easy to determine the authenticity of an item when you have the opportunity to touch and see it in person, it can be more challenging to spot a fake when shopping online through platforms such as Shopify or Craigslist.

Scammers often advertise counterfeit items such as apparel, shoes, and electronics at significantly discounted prices, claiming them to be overstock or out-of-season specials. However, once the item is purchased, the consumer may receive a low-quality fake product, and may find it difficult to get a refund or return the item as the sellers often have no contact information or charge restocking fees that are almost as much as the original purchase price.

It’s important to be vigilant and to take the necessary precautions when shopping online. Research the seller and be suspicious of prices that seem too good to be true, also look for the return policy and contact information. Always purchase from reputable and well-known retailers to minimize the risk of receiving a counterfeit product. Learn how to recognize fake online stores in 5 steps.

Weekly Scam Alerts - FREE SERVICE!

Scammers never stop devising schemes to separate us from our hard-earned money. So, make sure to sign up for our weekly email scam alerts. TotalScam!™ Alert will notify you as soon new scams are discovered.

12. Government Grant Scams

The idea of receiving free money from the government may sound too good to be true and that’s because it is. The Federal Trade Commission (FTC) has reported that thousands of individuals fall for the “fake grant” scam each year.

Scammers may use various methods to advertise these fake government grants, such as through local newspapers, national magazines, or by hacking into social media accounts of friends and family members. They may claim that the grants are available for a wide range of purposes, such as home improvements, small business, education, house down payments, and even for paying income taxes on time.

However, it is important to be aware that there are no such government grants that require a fee for processing. Legitimate government grants do not ask for money upfront. If you receive an offer for a government grant, be sure to verify the authenticity of the offer with the appropriate government agency before providing any personal or financial information or making any payments. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

13. Fake Check Scams

The fake check scam is a tactic used in various types of fraud, and it involves the scammer sending a counterfeit check to the victim. The victim will deposit the check into their account and then send a portion of the funds to a third party, as instructed by the scammer.

However, the scammer’s check will eventually be rejected by the bank as counterfeit, and the victim will be held responsible for the funds they withdrew and sent to the third party. This type of scam is commonly used in schemes such as the secret shopper scam, car wrap scam, and personal assistant (employment) scam.

It’s important to be aware of this type of scam and to exercise caution when receiving unexpected checks. Do not deposit a check from someone you do not know, and never send money to a third party until you have confirmed the authenticity of the check and the legitimacy of the request. In case of any doubt, contact the bank for confirmation. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

14. Employment Scams

The job market can be challenging, especially during times of economic uncertainty, such as during the current pandemic. Scammers take advantage of this by posting fake job opportunities on legitimate employment sites and on social media platforms like Craigslist. They may advertise high-paying work-from-home positions that sound too good to be true.

These scams may take on various forms, such as an agency requiring a fee to arrange an interview with a fictional company, or a scammer posing as an employer asking for personal and financial information, such as checking account information to set up direct deposit or requesting the purchase of prepaid gift cards using the funds from a fake check.

It’s important to be aware of these types of scams and to exercise caution when applying for work-from-home positions. Research the employer and be skeptical of opportunities that seem too good to be true. Never provide personal or financial information or make payments before verifying the authenticity of the employer and the job opportunity. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

15. Re-Shipping Job Scams

This one could send you to jail for participating in criminal activity. In this scheme, the scammer advertises for a work-at-home shipping agent who will receive packages at their home and then ship them overseas.

The packages they get will come from legitimate sources but paid for with stolen credit card accounts. Another scenario calls for a “procurement specialist” who will receive access to the “employer’s” bank account to reimburse the victim for the supplies he or she buys and has shipped to the employer. Of course, access will be denied and the victim will be ought what he spent on the goods. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

16. Binary Options Trading Scams

The FBI calls binary options trading scams one of the most difficult to track and prosecute because of their international spread and the financial sophistication of the scammers. They advertise high returns, low risk, and outstanding customer service.

In reality, these trading platforms are not regulated and are designed to rig the transaction against the investor. Options trading is risky to start with but trading on unregulated platforms is seriously asking for trouble.

17. Cryptocurrency Exchange Scams

Cryptocurrency represents the Brave New World of currency trading. If you don’t understand it, don’t be tempted by the stories of remarkable gains. The currency is traded in exchanges and the scammers who run fake exchanges simply want you to transfer your Bitcoin from your wallet to theirs.

They promise great opportunities and low risk but now that your cryptocurrency investment is in their wallet, the transaction is irreversible and untraceable. You need to be able to spot the telltale signs of these fraudsters before you invest a dime.

18. Student Loan Forgiveness Scams

Obama Student Loan Forgiveness programs don’t exist despite that lead headline in many student loan forgiveness ads. There are two legitimate government-sponsored student loan assistance programs and very few people qualify for them.

That doesn’t stop scammers from charging fees to assist victims qualifying for nonexistent programs. Money spent on help getting student loans forgiven is money down the drain. You need to spot the scam before you fall for the Obama Student Loan Forgiveness program.

19. Mystery Shopping Scams

Mystery shoppers are used by some retailers to evaluate the operation in a specific department. The shopper makes a purchase and then reports on the transaction. Typically the shopper gets to keep whatever the purchased item was and get a small fee as well.

There are legitimate mystery shopper opportunities but there are far more scammers. Scammers run ads for mystery shoppers on job boards and social media. Most pitch the idea of registering with their agency to get the job. There is a fee, however, for certification training and registration.

The training is worthless and no jobs ever appear. Another version involves hiring the shopper and having them check out a store’s money transfer service like Western Union or MoneyGram.

The scammer sends a check to be deposited in the shopper’s account and then the shopper uses his or her account to send the wire to a third party (scammer). The original check then bounces and the bank wants their money back. Read the full article here.

Identity theft risk: High
How scams lead to identity theft
Can I get my money back from scammers?

20. Fake Online Stores

When it comes to e-commerce, the internet is still the Wild, Wild West. E-commerce sites pop up overnight and appear on Shopify and other platforms.

The scammers offer dirt-cheap discounts on brand-name merchandise. Some sites are “original” and many mimic known trusted sites using similar URLs and graphics.

Some will actually sell you a product but when you get it you’ll discover you bought cheap, shoddy, knockoffs that weren’t worth the price. Others will take your payment and disappear. Either way, you are out of money. Learn how to spot these scammers and prevent personal loss. Learn how to recognize fake online stores in 5 steps.

FAQ

  1. Amazon sellers asking for payments off-platform: Some Amazon sellers may ask buyers to make payments for purchases through a different method, such as wire transfer or gift card. This is a red flag, as Amazon does not allow sellers to request payment off the platform.
  2. Amazon scam calls requesting personal information: Scammers may call or text pretending to be Amazon representatives, asking for personal information such as credit card numbers or login credentials. Be wary of unsolicited calls or texts and never give out personal information unless you initiate the contact and are certain of the identity of the person on the other end.
  3. “Mystery boxes” on Amazon with too-good-to-be-true deals: Some sellers may offer mystery boxes with items that seem too good to be true, such as designer items or electronics at a fraction of the retail price. These boxes may contain counterfeit or low-quality items, or may not contain anything at all.
  4. Scammers claiming you’re owed a refund from Amazon: Scammers may contact you, claiming you are owed a refund from Amazon and ask for personal information or payment in order to process the refund. Amazon will never contact you to ask for personal information or payment in order to process a refund.
  5. Text messages claiming to be from Amazon: Scammers may send text messages claiming to be from Amazon, asking for personal information or payment. Amazon will never contact you via text message, unless you have opted in to receive text message notifications from them.
  6. Amazon Prime Video scam websites: Some fake websites may mimic official Amazon Prime Video sites, offering free trials or subscriptions, but in reality they will steal personal information or charge hidden fees.
  7. Imposters demanding payment with Amazon gift cards: Scammers may contact you, pretending to be Amazon representatives, and ask for payment in the form of Amazon gift cards. Amazon will never demand payment in the form of gift cards.
  8. Fake websites that look like official Amazon pages: Scammers may create fake websites that look like official Amazon pages, in order to steal personal information or payment. Always check the web address and be sure you are on the official Amazon website before entering any personal information or making a purchase.
  9. Fake invoices for Amazon purchases that you didn’t make: Scammers may send fake invoices for Amazon purchases that you did not make. Be sure to check your order history on Amazon and contact them if you receive an invoice for a purchase you did not make.
  10. Amazon technical support scams: Scammers may contact you, pretending to be Amazon technical support, and ask for remote access to your computer or personal information. Amazon will never ask for remote access to your computer or personal information.
  11. Phishing emails that claim your Amazon account is frozen: Scammers may send phishing emails claiming that your Amazon account is frozen and asking for personal information or payment to unfreeze it. Do not click on links or enter personal information in response to these emails.
  12. Deliveries of Amazon packages that you didn’t order: Scammers may send packages to your address that you did not order, in order to steal personal information or payment. Be sure to check your order history and contact Amazon if you receive a package that you did not order.
  13. Fake Amazon job offer scams: Scammers may offer fake Amazon job offers, asking for personal information or payment in order to apply or secure the job. Be sure to research the job and the company offering it before providing any personal information or payment.
  14. Amazon “write a review” scams: Some sellers may offer incentives or payment in exchange for writing a positive review for their product on Amazon. This is a violation of Amazon’s policies and can be misleading for buyers looking for genuine customer feedback. Always read a variety of reviews and research the product and seller before making a purchase. Additionally, be cautious of reviews that seem too positive or overly detailed as they may be fake.

A SIM swap scam, also known as a “port-out scam” or “SIM hijacking,” is a type of fraud in which a scammer tricks a mobile phone carrier into transferring a victim’s phone number to a SIM card that the scammer controls. By transferring those incoming messages, fraudsters can easily access your most sensitive accounts by completing text-based two-factor authentication checks. If you’ve failed to protect accounts with 2FA, they can use the phone number to generate existing and new passwords. They can also take over social media accounts, retail accounts, and any other accounts linked to the phone number—which is probably any online account.

The primary goal of SIM swap fraud is typically financial gain, often in the form of stealing bank and credit card information. However, sometimes a SIM swap attack might be intended to embarrass or humiliate the victim when compromising social media accounts. It is important to be cautious of suspicious phone calls, text messages or emails. Additionally, setting up two-factor authentication on your accounts can help protect your information.

An NFT scam involves fraudulently creating and selling fake digital assets, known as NFTs, which are stored on a blockchain and can be bought and sold like physical assets. Scammers may use easily accessible digital artwork or other content to create fake NFTs and sell them as valuable or rare assets to unsuspecting buyers. They may also use phishing tactics to obtain money or personal information in exchange for the promise of owning a valuable NFT.

To protect yourself from NFT scams, research the artist or creator of the NFT and the marketplace where it’s being sold, be wary of red flags such as a low price, lack of verifiable information or sudden appearance of a rare item, and ensure you use a reputable and secure marketplace with a good track record of handling NFTs and protecting buyers from fraud.

A military scammer is an individual who pretends to be a member of the military to scam people out of money or personal information. They create fake profiles on online dating sites, social media, or other forms of communication, and build relationships with individuals, often targeting those who are lonely or vulnerable.

They claim to be serving overseas and use emotional appeals to ask for money or personal information, such as claiming a family emergency or being a victim of a financial scam. It is important to be cautious when meeting someone online, never send money or personal information unless you’ve met in person, be suspicious of those who ask for money or financial information early in a relationship and cannot provide verifiable information, and check with the Department of Defense for verification.

A scammer can use your Google verification code to gain access to your account after obtaining your email and password. They can use it to bypass the two-factor authentication and access your account to send spam emails, steal personal information, or make unauthorized purchases. They can also gain access to other linked accounts like YouTube or Google Drive. To protect yourself, keep your verification code private, be careful logging in, and contact Google customer service if you suspect your account has been compromised.

A love scammer is someone who uses online dating or social media to build a romantic relationship with someone, with the goal of scamming them out of money or personal information. They often use fake profiles and manipulative tactics to gain trust. They may also ask for money, preying on vulnerable individuals. To protect yourself, be cautious when meeting someone online and never send money or personal information unless you are certain the person is trustworthy.

It depends on the method of payment. For more information, go to scam refund page.

Fraudsters may request selfies with ID cards because some online services require a photo ID for registration. If you provide a selfie with your ID to scammers, they can use that information to create accounts in your name, such as on cryptocurrency exchanges. This allows them to launder money through these accounts.

It’s important to not respond to smishing messages, even if it is to ask the sender to stop contacting you. This is because responding to these messages verifies that your phone number is active and that you are willing to open such messages, which can result in an increase in unwanted text messages.

If scammers have obtained your credit or debit card numbers, they may use them to make unauthorized purchases from online stores. To protect yourself, it is important to regularly check your bank statements for any fraudulent transactions. If you notice any suspicious activity, immediately contact your bank and request that a new card be issued.

Once a payment made with cryptocurrency is completed, it is typically not reversible. The only way to retrieve the funds is if the recipient agrees to return them. However, you can contact the company or platform you used to send the money and inform them that it was a fraudulent transaction. They may be able to assist you in reversing the transaction, if possible.

Refund scammers are fraudsters who pose as representatives of legitimate businesses and offer fake refunds in order to obtain money or personal information.

They often use methods like cold-calling, emailing or texting, and provide fake refund or customer service numbers to direct individuals to scam websites or phone lines.

They may ask for personal information such as credit card or bank account numbers, or sensitive information like Social Security numbers, driver’s license numbers, or birth dates to process the refund.

They may also ask for a fee to be paid or for the purchase of additional products or services as a condition of receiving the refund. Be wary of refund offers from unknown parties, and never give out personal information or make payments unless you are certain it is a legitimate offer. Verify the company’s contact information independently, and if in doubt, contact the company directly to inquire about any refund or customer service offers received.

Car wrap scams can also work by tricking individuals into accepting a check for an overpayment and then asking the individual to wire back the excess funds. Here’s how it works:

  • The scammer contacts the individual and offers to pay for the car wrap, often with an overpayment, usually explaining that it is for additional services or for the individual’s trouble.
  • The individual receives the check and deposits it into their account. However, the check is counterfeit and will not clear.
  • The scammer then contacts the individual and asks them to send back the excess funds from the overpayment, often giving a deadline.
  • The individual sends the money back, but the check bounces, and the individual is out the money they sent back to the scammer.
  • The scammer will disappear and won’t be traceable.

For in-depth coverage of how car wrap scam works, follow this link.

Verify the website’s URL: Scammers often create websites that mimic legitimate ones, but with slight variations in the URL. Ensure the website’s URL is spelled correctly and corresponds to the company or organization it claims to be.

Check for contact information: Legitimate websites usually have contact information such as phone number, email, or physical address. Scammers often don’t provide this information.

Investigate the company or organization: Search for the company or organization’s name on the website and in a search engine. Look for reviews and complaints from other customers.

Ensure a secure connection: Check for “https” at the start of the URL and a padlock icon in the address bar. This ensures that the website uses a secure connection and protects your personal information.

Learn to check a website’s authenticity here: How to tell if a website is a scam in 5 steps.

Beware of receiving unexpected payments on Venmo. They may appear to be accidental and the sender may ask you to return the money, but if it is a scam, sending the money back could lead to financial loss.

If the payment was made using stolen credit or debit card information and the cardholder reports it as fraud, you may not be able to recover the money. Additionally, if you are unable to reverse the fraudulent payment, you may also lose the money you sent back to the scammer.

-Be wary of buyers who request personal information, such as social security numbers or bank account details.

-Be suspicious of buyers who offer to pay more than the asking price and ask for you to return the excess payment.

-Avoid engaging with buyers who ask to have items shipped before payment is received.

-Be cautious of buyers who suggest paying with checks or money orders instead of using secure payment methods like PayPal.

-Be careful when dealing with buyers who have minimal profile information or no friends on Facebook.

Zelle scams typically involve a scammer using the Zelle app or website to trick a victim into sending money to the scammer. The scammer may use various tactics such as posing as a friend or family member in need of money, pretending to be a government official, or claiming to be a representative of a legitimate business. In some cases, the scammer may also hack into the victim’s bank account or email and use Zelle to transfer money from the victim’s account to their own.

In another known Zelle scam, a scammer may pose as a buyer and contact a seller to purchase an item. They may request to use Zelle as the method of payment. Once the seller agrees, the scammer may ask for the seller’s email address to send the payment. However, instead of sending a real payment, the scammer sends a fake email that appears to be from Zelle, tricking the seller into thinking they have received payment.

Cashier’s check scams are a common way for scammers to deceive victims. They typically involve the scammer sending a fake cashier’s check and asking the victim to deposit the check and send some of the funds back to the scammer. However, the check is actually fake and the victim will not realize it until their bank rejects it and they are held liable for the funds.

To avoid being a victim of this scam, always verify the authenticity of the check before depositing it and never wire money to someone you do not know personally. Additionally, be aware of common tactics scammers use such as overpayment for an item you are selling, secret shopper schemes, or claims of being from a government agency.

When selling online, be cautious of individuals who wish to conduct the transaction outside of the platform you’re using. Scammers may try to communicate with you directly in order to take advantage of you. Be cautious of any payment requests through wire transfer or gift card as these are common methods used by scammers to steal money.

Keep your personal information private, such as your home address or phone number, as scammers can use this information to steal your identity or commit fraud. Before finalizing any transactions, research the buyer or seller by looking for reviews and feedback from other users to gauge their reputation.

Trust your instincts, if something appears too good to be true, it likely is. When possible, utilize an escrow service to keep your money secure during the transaction process. Additionally, be vigilant for counterfeit escrow services, as scammers may try to use these as well.

  • Research the breed: Learn about the characteristics and needs of the breed you’re interested in to make sure it’s a good fit for your lifestyle.
  • Find a reputable breeder: Look for a breeder who is transparent about their breeding practices and provides health and genetic information about their puppies.
  • Visit the breeder: If possible, visit the breeder in person to see the puppies and their living conditions. This will also give you an opportunity to meet the parents and ask questions.
  • Ask for documentation: Ask for documentation of the puppy’s vaccinations, deworming, and vet check-ups. A reputable breeder will have no problem providing this information.
  • Be wary of low prices: Be cautious of breeders who are offering puppies at prices significantly lower than the market value, as they may be puppy mills or backyard breeders.
  • Don’t buy a puppy sight unseen: Don’t buy a puppy without seeing it in person, or without meeting the breeder in person or via video call.
  • Don’t wire money: Be careful of scammers who may ask you to wire money for the puppy and then disappear.
  • Do your research: Look up the make, model, and year of the car to understand its typical features, common issues, and fair market value.
  • Inspect the car thoroughly: Pay close attention to the condition of the body, tires, brakes, and engine when inspecting the car in person.
  • Obtain a vehicle history report: Verify the car’s history by getting a report that shows information about accidents, title issues, and previous owners.
  • Check the legitimacy of the title and registration: Confirm that the car’s title and registration are valid and that the car is not reported as stolen.
  • Test drive the car: Take the car for a test drive to check for any mechanical issues and to see if it handles well.
  • Get a professional inspection: Have a professional mechanic inspect the car if possible to ensure that it is in good working condition.
  • Be cautious of too-good-to-be-true deals: Be wary of sellers offering a car at a price that is significantly lower than the market value, as it may be a scam.
  • Avoid wiring money: Scammers may ask you to wire transfer the money, instead of paying in person or through a secure platform.
  • “Cashier’s Check” scam: Scammers may offer to pay for the car with a counterfeit cashier’s check and pressure you to ship the car before the check is cleared.
  • “Overpayment” scam: Scammers may offer to pay more than the agreed price and ask for a refund of the difference. The check they provide will be fake, resulting in a loss of money.
  • “Shipping” scam: Scammers may ask you to ship the car to a location and pay for the shipping costs, only to disappear and leave you to cover the cost.
  • “Stolen Identity” scam: Scammers may use a stolen identity to buy the car, leaving you with a vehicle you can’t legally sell and a financial loss.
  • “Fake Escrow” scam: Scammers may ask you to use a fake escrow service to complete the transaction, resulting in a loss of money.
  • “Inspection” scam: Scammers may offer to have the car inspected by a fake third-party company and pay for a positive report.
  • Be cautious of buyers who offer to pay more than the asking price and request a refund of the difference. Only refund money after the item has been shipped.
  • Verify the identity of the buyer by checking their feedback and past transactions.
  • Use safe payment methods such as eBay and PayPal, which offer protection for sellers.
  • Ensure the shipping address is verified and matches the billing address on the buyer’s account.
  • Keep records of all communication, payment, and shipping information.
  • Exercise caution with international transactions as they may be riskier.
  • Be vigilant when selling high-value items as they may attract more scam attempts.
  • Watch out for red flags such as rush buyers, those who avoid communicating through eBay’s messaging system, or those who want to pay through wire transfer.

To report a telephone scam, you can contact the Federal Trade Commission (FTC) online or by phone. Online reporting can be done on the FTC website, and you can also call 1-877-382-4357 (TTY: 1-866-653-4261) to file a complaint. The FTC is the main government agency that collects and handles scam complaints.

A catfish scam, also known as a “romance scam,” is a deception where an individual creates a false online identity to lure someone into a romantic relationship. They use fabricated details, such as a fake name, age, location and even photographs, to create the appearance of a real person. The scammer uses this fake identity to establish a relationship with the victim, often over an extended period. Once the scammer has gained the victim’s trust and emotions, they may ask for money or personal information under false pretenses. These scams are challenging to recognize and can result in emotional and financial harm to the victim.

A scammer may deceive you by requesting goods or services without paying, sending fake payment notifications, claiming to have sent a payment that will only be released upon shipping, or using stolen payment information. It’s essential to be aware of these tactics to protect yourself from such scams and avoid financial loss.

The Google Voice scam is a fraud where scammers pretending to be from Google, contact Google Voice users via call or text, asking for personal information or credit card details. They may also claim account issues and ask for account verification. Scammers use this information for fraudulent activities such as identity theft or unauthorized credit card charges. Be aware that Google will never ask for this information and do not give any information and report it to Google customer service if you receive such calls or messages. Always be cautious with unsolicited calls or messages.

If someone requests you to make a payment through gift card such as Google Play or iTunes card and then ask for the numbers on the back, they are attempting to scam you. This is a common scam tactic used by fraudsters to trick people into paying for something with gift cards, which are difficult to trace and can’t be refunded. Never share the numbers on the back of the gift card with anyone and be aware of this type of scam.

Answering a call that has been identified as “scam likely” can put you at risk of being scammed by the person on the other end of the line. They may use various tactics such as trying to obtain your personal information or credit card details or convincing you to send them money or make a purchase. Some scammers may also try to install malware on your device, which can put your personal information and identity at risk. It’s important to exercise caution when answering calls from unknown numbers, especially if your phone has flagged the call as a potential scam.

If your phone shows a “scam likely” message for an incoming call, it suggests that the call has been identified as potentially fraudulent by either your phone’s internal scam blocking system or your carrier’s network. This serves as a warning that the call may not be from a legitimate source. It is suggested to not answer the call or to proceed with caution if you do choose to answer. Additionally, it is recommended to block the number to prevent further unwanted calls.

Some common phone scams include:

  • “Robo-calls” claiming to be from the IRS or Social Security Administration, demanding payment or personal information
  • Scammers posing as a loved one in need of money or assistance
  • Calls from fake tech support claiming that there is a problem with your computer and asking for remote access or payment
  • Calls from scammers posing as a bank or credit card company, asking for personal information or payment.

To protect oneself, it is important to stay aware of the most active scams currently being used. These include:

  • Phishing scams, in which attackers disguise themselves as trustworthy sources such as banks in order to obtain personal information or money.
  • Romance scams, where scammers use fake online profiles to gain the trust of their victims and extract money.
  • Investment scams, which promise high returns for low risks but are only meant to steal personal information or money.
  • Tech support scams, where scammers pose as technical support representatives and trick victims into paying for unnecessary services or giving away personal information.
  • Scams related to COVID-19, such as selling fake cures or vaccines.
  • Tax scams, where scammers pretend to be tax officials and demand payment for fake taxes or fines.
  • Lottery and sweepstakes scams, where the victim is informed that they have won a prize but need to pay a fee to claim it.
  • Ransomware scams, in which attackers send emails with malicious links or attachments that encrypt the victim’s files and demand a ransom to be paid to regain access to them.
  • For a full list of scams, visit this page.

It is important to be aware that these types of scams are constantly evolving, and new scams may appear at any time. Therefore, it is important to always be vigilant and cautious when providing personal information or money online.

If you happen to come across a scam text message, there are several steps you can take to protect yourself:

  • Do not engage with the text or click on any links within the message
  • Block the sender’s number to prevent any further contact
  • Report the scam to your phone carrier, most carriers have a reporting system in place for scam texts
  • Remember that scammers can spoof phone numbers, so just because the number looks familiar, it doesn’t mean the message is legitimate.
  • Be cautious of sharing personal information or money as legitimate organizations will never ask for such details via text message
  • In case you have unknowingly shared personal information or money, contact your bank and credit card companies immediately to report the scam
  • Don’t hesitate to seek help from a trusted friend or family member, or from organizations that specialize in dealing with financial fraud.

Spyware scams involve tricking individuals into installing software, known as spyware, that allows the attacker to monitor and control the victim’s computer activity without their knowledge. This software can track keystrokes, steal personal information, and even remotely control the computer.

Spyware can be delivered through various means such as email attachments, malicious websites, or bundled with other software. Once installed, it’s hard to detect and remove, making it a persistent and dangerous threat. The information stolen through spyware can be used for fraudulent activities such as stealing personal information, login credentials, credit card numbers, and other sensitive data.

In a google voice verification code scam, the attacker aims to gain unauthorized access to an individual’s Google Voice account by tricking them into providing a verification code that they receive via SMS or phone call. The scammer may pretend to be a representative of Google by sending an email or impersonating one, requesting the verification code as a part of a supposed security check or account update. Once the scammer obtains the verification code, they can use it to access the victim’s Google Voice account, potentially stealing sensitive information or making unauthorized calls or texts.

If you suspect or have fallen victim to a cryptocurrency scam, there are organizations that can assist you. You can reach out to them by filling out an online complaint form on their websites, to report the scam and seek help.

Phishing is a method of email scamming where the attacker sends an email that appears to come from a legitimate source, such as a bank, an e-commerce website, or a government agency, in an attempt to trick the recipient into providing personal information or login credentials. The email may contain a link to a fake website that looks similar to the legitimate one, where the victim is prompted to enter their personal information. The ultimate goal of the attacker is to steal sensitive information such as login credentials, credit card numbers, and other personal information, which can be used for fraudulent activities.

There are several types of email scams, including:

  1. Phishing scams: Phishing scams are a type of email scam where the attacker sends an email pretending to be from a legitimate organization in an attempt to trick the recipient into providing personal information or login credentials.
  2. Advance fee scams: Advance fee scams offer a large sum of money or a valuable prize in exchange for a small upfront fee or personal information.
  3. Business email compromise (BEC) scams: Business Email Compromise (BEC) scams involve a criminal impersonating a senior executive or vendor to deceive an employee into transferring money or sharing sensitive information.
  4. Lottery scams: Lottery scams are emails that inform the recipient they have won a lottery or sweepstakes they did not enter and ask for a fee to claim the prize.
  5. Nigerian letter scams: Nigerian letter scams are a type of email scam where the attacker requests for money to help with a financial problem and promises a large sum of money in return.
  6. Job scams: Job scams are a type of email scam where the attacker offers fake job or employment opportunities and request for personal information or money as a part of the application process.
  7. Investment scams: Investment scams are a type of email scam where the attacker offers a high-return, low-risk investment opportunity and requests for personal information or money as a part of the investment process.
  8. Malware scams: Malware scams are a type of email scam where the attacker sends an email with a link or attachment that, when clicked, will install malware onto the recipient’s computer.
  9. Charity scams: Charity scams are a type of email scam where the attacker requests money for a fake charity or emergency relief fund.
  10. Debt relief scams: Debt relief scams are a type of email scam where the attacker promises to help with debt relief but in reality, they take the victim’s money without providing any actual assistance.
  11. Email spoofing scams: Email spoofing scams are a type of email scam where the attacker disguises themselves as a trusted sender, such as a bank, in order to trick recipients into providing personal information or money.
  12. Ransomware scams: Ransomware scams are a type of email scam where the attacker sends an email with a malicious link or attachment that, when clicked, will encrypt the victim’s files and demand a ransom to be paid in order to regain access to the files.
  13. Spam scams: Spam scams are a type of unwanted email that is sent to a large number of recipients with the intention of promoting a product or service.
  14. Online shopping scams: Online shopping scams are a type of email scam where the attacker sends emails pretending to be from an online retailer, in an attempt to trick the recipient into providing personal information or money for a fake purchase.
  15. Email pyramid schemes: Email pyramid schemes are a type of scam in which the attacker recruits a large number of people to pay a small fee with the promise of a large return. However, in reality, the only people who make money are those at the top of the pyramid.

Cybercriminals use the Geek Squad scam to send fake emails that appear to be official transaction confirmations from Geek Squad, a subsidiary of Best Buy, a well-known multinational consumer electronics company. The emails contain details about a subscription renewal or order that the recipients are not familiar with.

The scam takes advantage of the consumer’s fear of a potential unauthorized charge on their account, tricking them into calling the scammer to “resolve” the issue. The primary objective of the scammer is to obtain money and personal information from the victim, which they can use themselves or sell to other cybercriminals. This scam is also associated with the tech support scam.

How useful was this report?

Average rating 4.7 / 5. Vote count: 76

No votes so far! Be the first to rate this post.

Get notified as soon as new scams are detected!

Follow us on social media: