|

Digital Fortress: Safeguarding Against Online Scams and Fraud

Here are some of the security thoughts Jim and I had on WSVA this morning, August 20, 2025. Continue reading from this point for all the details. Or, click HERE to get the short version. There is a lot more here than what we had time to discuss. Here is the actual podcast show with Jim and me.

Here are two other links you may be interested in. These will both open in another tab in your browser:
1) Podcast Created by AI of this entire article that was written by me.
2) Video Class Created by AI, also of this entire article and found below if you would like to watch it here.

Both were done by NotebookLM.Google.com, if you care to check it out. You will need a Google Account to login and try it out.

Briefing: Navigating the Digital Landscape: Protecting Yourself from Fraud and Scams

This briefing synthesizes key information from Kiplinger, Gray Haired Tech (Ron Doyle), and the FTC Consumer Advice, outlining prevalent online scams and offering actionable strategies for protection. The overarching theme is that scams are constantly evolving, leveraging trust, urgency, and new technologies (like AI) to exploit vulnerabilities, making continuous vigilance and skepticism paramount.

  1. The Evolving Threat Landscape: Scammers’ Tactics

Scammers are sophisticated and adaptable, constantly refining their methods to ensnare victims.

  • Exploiting Current Events & Urgency:Scammers capitalize on real-world events (natural disasters, tax season, graduation) to create believable pretexts for their schemes. They often “convey urgency” to pressure victims into immediate action, preventing critical thinking. As Teresa Murray of PIRG states, “The bad guys don’t want you to stop and think, because they know if you do, there’s a chance you’ll realize it’s a scam.” (Kiplinger)
  • Impersonation Scams:A primary tactic involves impersonating trusted entities such as government agencies (IRS, Social Security Administration, police), businesses (banks, tech support), or even friends and family. The FTC notes that “The top scam reported to the FTC in 2020 was impersonator scams like these, with nearly 500,000 reports and a median loss of $850.” (FTC)

    ◦ Government/Business Impersonators: They might demand immediate payment, threaten legal action, or claim account issues. “A bank will never ask to validate you when they call you first,” states Paul Benda of the American Bankers Association. (Kiplinger)

    ◦ Tech Support Scams: These exploit a lack of technical knowledge, using scare tactics (fake virus alerts, pop-ups) to convince victims their device is compromised. They then pressure individuals to call a fake support number and grant remote access, ultimately stealing data or demanding payment for bogus services. “no legitimate company will ever contact you unsolicited for tech support,” emphasizes Ron Doyle. (Gray Haired Tech – What About Scams)

  • Phishing in its Many Forms:Phishing, the “granddaddy of all scams,” has diversified beyond traditional email.

    ◦ Email Phishing: Emails are crafted to look legitimate, with accurate logos and even personal details, to trick recipients into clicking malicious links or downloading harmful attachments. (Gray Haired Tech – Scam What Am)

    ◦ Spear Phishing & Whaling: These are highly personalized attacks targeting specific individuals or “big fish” (CEOs, executives) with access to sensitive information. Scammers do “their homework on the specific person(s) they are going to scam.” (Gray Haired Tech – Scam What Am)

    ◦ Smishing (SMS/Text Phishing) & Vishing (Voice Phishing): Scammers extend their reach to text messages and phone calls, mimicking delivery companies or tech support. (Gray Haired Tech – Scam What Am)

    ◦ Quishing (QR Code Phishing): Malicious QR codes are placed in public areas, directing users to fake sites designed to steal information. (Gray Haired Tech – What About Scams)

  • “Pig Butchering” Scams:These are a form of investment fraud, often starting with seemingly innocent contact (random texts, dating apps). Scammers build trust, then “fatten up their victims with the promise of lucrative returns” on fake investments, allowing small withdrawals to build confidence before “slaughtering” them for large sums. (Gray Haired Tech – Pig Butchering Scams) These are also known as romance scams, as scammers often use emotional manipulation.
  • Artificial Intelligence (AI) in Scams:AI is increasingly used to create “super convincing video calls” and “replicate the voice of your loved ones” to solicit money. It’s also used to craft “personalized scams based on your social media activity.” (Gray Haired Tech – Scam What Am)
  • Payment Demands:Scammers often insist on “nontraditional payment methods” like “gift cards and crypto” because they are difficult to trace. (Kiplinger) Similarly, they “request payment through untraceable methods like gift cards or cryptocurrency.” (Gray Haired Tech – What About Scams)
  1. Essential Defensive Strategies

Protecting oneself requires a proactive and skeptical mindset.

  • Skepticism and Verification:

    ◦ Question Unexpected Contact: Be wary of unsolicited communication from businesses or government agencies. “If you didn’t initiate contact… hang up and go directly to the source.” (Kiplinger)

    ◦ Verify Sender Identity: Always double-check who is sending messages. If an email from a company asks you to log in, “DO NOT click a link. Go to your browser and type in the address (URL) for the company and log in yourself.” (Gray Haired Tech – Email Essentials)

    ◦ “If something feels off, it probably is.” (Kiplinger, Gray Haired Tech – Stay Safe and Secure Online) “Be Suspicious all the time!” (Gray Haired Tech – What About Scams)

    ◦ Research Suspect Emails: Copy and paste sentences from suspicious emails into a search engine to verify their authenticity. Reputable sites like Snopes.com or About.com can help verify urban legends and hoaxes. (Gray Haired Tech – Email Scams)

  • Strong Password Practices & Authentication:

    ◦ Unique, Complex Passwords: Use “strong and unique” passwords, at least 12-16 characters, mixing uppercase, lowercase, numbers, and symbols. “Avoid using anything personal like your birthday.” Crucially, “consider using different passwords for different accounts.” (Gray Haired Tech – Email Essentials, Kiplinger)

    ◦ Password Managers: Use tools like Dashlane, Keeper, or the one I recommend, BitWarden to generate and store strong, unique passwords. (Kiplinger, Gray Haired Tech – Stay Safe and Secure Online)

    ◦ Multifactor Authentication (MFA/2FA): Enable this extra layer of security on all accounts. This requires a second step (e.g., a code sent to your phone, facial scan) to access your account, making it harder for unauthorized access even if a password is stolen. (Kiplinger, Gray Haired Tech – Stay Safe and Secure Online)

    ◦ Passkeys: Familiarize yourself with passkeys, an emerging passwordless authentication method using biometric verification or device PINs, offering enhanced security against phishing. (Gray Haired Tech – Stay Safe and Secure Online)

  • Account Monitoring and Credit Protection:

    ◦ Regular Account Review: Check financial account activity “at least every few days; don’t wait for your monthly statement.” Question even small suspicious charges. (Kiplinger)

    ◦ Text Alerts: Set up text message alerts for financial transactions, customizing notifications for suspicious activity or transactions above a certain size. (Kiplinger)

    ◦ Credit Report Review: Regularly review credit reports for unrecognized credit cards or loans, indicating potential identity theft. Free weekly reports are available from Experian, Equifax, and TransUnion at AnnualCreditReport.com. (Kiplinger)

    ◦ Credit Freeze: Consider freezing your credit to prevent lenders from accessing your reports for new credit applications, thwarting identity thieves. This is free and reversible. (Kiplinger)

  • Secure Online Habits:

    ◦ Electronic Payments: Use automatic or electronic payments over checks, as “Check fraud has increased significantly.” (Kiplinger)

    ◦ Public Wi-Fi Caution: Avoid accessing sensitive information on public Wi-Fi. If necessary, use a Virtual Private Network (VPN) to encrypt your internet traffic. (Gray Haired Tech – Stay Safe and Secure Online)

    ◦ Software Updates: Keep all device software up-to-date, including operating systems (e.g., migrating from Windows 10 to 11 before support ends). (Gray Haired Tech – Stay Safe and Secure Online)

    ◦ Social Media Privacy: Be mindful of personal information shared on social media (addresses, vacation plans, children’s details), as it can be used for identity theft or targeted scams. “Review your privacy settings regularly.” (Gray Haired Tech – Stay Safe and Secure Online)

    ◦ Avoid Sharing Sensitive Information: Do not send highly sensitive information like credit card or Social Security numbers via regular email. Consider encryption for private communications. (Gray Haired Tech – Email Essentials)

  • “When in doubt, never click!”(Gray Haired Tech – Scam What Am)

III. Reporting and Staying Informed

  • Report Scams:Report scams to relevant authorities like the FBI’s Internet Crime Complaint Center, the FTC (ReportFraud.ftc.gov), your financial institution/credit card company, and local law enforcement. While these agencies may not resolve individual cases, the information aids broader investigations. (Kiplinger, FTC)
  • Identity Theft Recovery:If identity theft occurs, IdentityTheft.gov provides resources and a recovery plan. (Kiplinger)
  • Stay Informed:Scams are always evolving, often targeting current news topics. Keep up-to-date through resources from PIRG, FTC, FBI, BBB Scam Tracker, and the Identity Theft Resource Center. (Kiplinger)
  • Normalize Reporting:It’s crucial for consumers to report fraud “without being ashamed.” As Kimberly Lankford notes, “People tend to be very embarrassed — they can’t believe they fell for this… But you have to remember a couple of things: These fraudsters are extremely good at what they do, and they are master manipulators that prey on our vulnerabilities. Anyone can be a victim.” (Kiplinger)

By understanding scammer tactics and consistently implementing robust protective measures, individuals can significantly mitigate their risk and contribute to a safer online environment.

Here is what Jim and I used for our notes on today’s show (08/20/2025):

Online scams and fraud are always changing, and scammers use tricky methods to get your money or information. If you want to go back to the beginning of this article, click TOP.

  • Scammers’ Sneaky Tricks:
    • They create urgency to make you act without thinking, especially around big events like tax season.
    • They pretend to be trusted people or groups like the IRS, your bank, or even friends and family.
      • Important: A real bank or government agency will never call you first and ask for personal info or to validate your account.
      • They might use scare tactics, like fake virus warnings, to get you to call a fake tech support number. No legitimate company will contact you without you asking first for tech support.
    • Phishing is a common trick, where they send fake emails, texts (smishing), or calls (vishing) that look real to get you to click bad links or give up info. Even QR codes can be fake (quishing).
    • “Pig Butchering” scams are like fake investments where scammers build trust, promise huge returns, and then steal all your money after you invest a lot. These often start on dating apps or with random texts.
    • Scammers use AI to make fake video calls or clone voices of loved ones, making scams super convincing.
    • They often demand payment in gift cards or cryptocurrency because these are almost impossible to trace.
  • How to Protect Yourself:
    • Be suspicious of unexpected contact. If someone calls you claiming to be from a company or government agency, hang up and call them back using a number you know is real (like from their official website).
    • Never click links in suspicious emails or texts. Instead, go directly to the company’s website by typing their address yourself.
    • “If something feels off, it probably is.”
    • Use strong, unique passwords (at least 12-16 characters, mixing letters, numbers, and symbols) for different accounts. A password manager can help.
      • BitWarden or 1Password.
    • Always turn on multi-factor authentication (MFA) for your accounts, which adds an extra security step like a code sent to your phone.
    • Check your bank accounts often—every few days—for strange charges.
    • Review your credit report yearly for free at AnnualCreditReport.com to spot identity theft. You can also freeze your credit to prevent new accounts from being opened in your name.
    • Be careful on public Wi-Fi and use a VPN if you need to access sensitive info.
    • Keep all your device software updated.
    • Be careful what you share on social media, as scammers can use that info.
    • “When in doubt, never click!”
  • What to Do if You’re Scammed:
    • Report scams to places like ReportFraud.ftc.gov or the FBI’s Internet Crime Complaint Center. Even if it doesn’t solve your case, it helps authorities track down scammers.
    • If your identity is stolen, IdentityTheft.gov has resources to help you recover.
    • Don’t be embarrassed or ashamed if you fall for a scam. Scammers are experts at manipulation, and anyone can be a victim.
    • Stay informed about new scam tactics, as they are constantly evolving.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.