How To Detect Scams


Phone and Email Scams

Over the years, cyber criminals have modified their tactics and developed new and creative ways to deceive individuals and businesses.  With the volume of freely available data on the internet, cyber criminals are now using the numerous resources, like social media, to specifically target their victims.  This new method is called Personalized Scamming.

How Does it Work?
A personalized scam is targeted. First, cyber criminals conduct personalized research about an individual using common tools, such as Google, Facebook, LinkedIn, Instagram, and other social sites. Or, they can purchase a database from the Dark Web and collect relevant information about their targets. Next, cyber criminals send an email, or make a phone call, providing personal details about the individual as “proof” of hacking your device. Finally, the criminal will blackmail the individual.

In almost every situation like this, the cyber criminal never hacked the individual's system. The scammer is simply attempting to use the few personal details they have to scare users into believing they’ve been hacked.

What Should I Do?
Recognize that emails or phone calls like these are a scam. The attack is a part of an automated mass-scale campaign, not an attempt to directly target you. It is becoming much easier for cyber criminals today to find or purchase personal information. For other information on how to spot and avoid common scams, click here!