{"id":68220,"date":"2023-02-15T11:06:07","date_gmt":"2023-02-15T05:36:07","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=68220"},"modified":"2023-02-15T11:06:07","modified_gmt":"2023-02-15T05:36:07","slug":"new-year-old-scams-how-to-tell-if-youre-being-scammed","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/new-year-old-scams-how-to-tell-if-youre-being-scammed\/","title":{"rendered":"New Year, Old Scams. How To Tell if You\u2019re Being Scammed?"},"content":{"rendered":"<p>A fool and his money are soon parted. That\u2019s how the saying goes. Many of us think we\u2019d never fall for a blatant scam, but the reality is quite different. Online frauds are increasing every year, and you\u2019re more likely to fall for a scam than be robbed, mugged, or threatened.<\/p>\n<p>Since that\u2019s the case, it\u2019s time to review the most popular ways in which fraudsters want to take your money online and how to avoid them.<\/p>\n<h2>Phishing<\/h2>\n<p>A phishing scam can come from anywhere, which is why it\u2019s the most common one. Most of the time, it\u2019s through email, and it works incredibly well.<\/p>\n<p>Let\u2019s say that one of your work buddies downloaded a virus or got hacked. You\u2019ll receive an email in your inbox where they\u2019re asking you to edit a document. And as soon as you accept the invite, cybercriminals can read your entire inbox. Even though this sounds like science fiction, it\u2019s one of the most popular scams that <a href=\"https:\/\/www.theverge.com\/2017\/5\/3\/15534768\/google-docs-phishing-attack-share-this-document-with-you-spam\" target=\"_blank\" rel=\"noopener\">happened to Google<\/a>. Yes, Google!<\/p>\n<p>Since most of your banking apps are connected to your email, that\u2019s one thing that gets targeted immediately. The second thing can be your social security number, ID, or passport.<\/p>\n<p>If you\u2019ve been careful and have none of that information available, they\u2019ll go for your social media accounts and hold them for ransom!<\/p>\n<p>Phishing can come through any platform. No, many applications have added an extra step, asking you whether you actually want to follow a link you clicked on. Let that be a reminder of how widespread it is.<\/p>\n<p>Don\u2019t trust anyone that sends you an email out of nowhere. Always triple-check whether the sender is legitimate, and don\u2019t download any attached executable files.<\/p>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/top-10\/best-crm-software-for-2021\/\">Best CRM software for 2021<\/a><\/span>\n<h2>Shopping Scams<\/h2>\n<p>A few years ago, everyone wanted to try dropshipping as a side hustle. The business sounded incredibly simple. You open up an eCommerce store, and you are the middleman between Amazon, Alibaba, or Aliexpress and customers in your home country. While there\u2019s nothing wrong with an honest business, some people <a href=\"https:\/\/www.which.co.uk\/reviews\/online-shopping\/article\/online-shopping\/how-to-spot-an-online-shopping-scam-ap5et5v8oct2\" target=\"_blank\" rel=\"noopener\">decided to take it a step further<\/a>.<\/p>\n<p>Cybercriminals started creating online stores for products that were never shipped!<\/p>\n<p>They just stole money through payment processors or used the cards of their clients to make additional purchases.<\/p>\n<p>This worked because they <a href=\"https:\/\/www.the-next-tech.com\/business\/top-7-creative-tips-to-boost-your-social-media-strategy\/\">created legitimate social media ads<\/a> that directed people to a website that looked incredible. However, everything was fake, and people were just scammed for their money.<\/p>\n<p>If you ever find yourself clicking on a store you\u2019ve never visited before, read genuine reviews and ensure that the site is secure.<br \/>\n<!-- Home page 728x90 --><br \/>\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2>Crypto<\/h2>\n<p>Anyone that has been through the DotCom bubble can notice the similarities between crypto scams and what happened twenty years ago. History doesn\u2019t repeat itself, but it definitely rhymes!<\/p>\n<p>The crypto world was exciting, cool, and trendy. Everyone wanted to be a part of it, but since it\u2019s a new technology, most people were ignorant of bad actors in space. Since identities are anonymous on the blockchain, it\u2019s easy to fool people with projects that promise the world but leave the investors without their valuable tokens.<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/advisor\/investing\/cryptocurrency\/top-crypto-scams\/\" target=\"_blank\" rel=\"noopener\">Crypto scams<\/a> range from entire projects to pump-and-dump schemes, rug pulls, or simple phishing hacks. Exchanges and companies got attacked too. The best way to defend yourself is not to sign any suspicious smart contracts, not to send any tokens to unknown addresses, and to keep the keys to your crypto.<\/p>\n<h2>Downloading Bad Files<\/h2>\n<p>Clicking on a bad link doesn\u2019t do much. However, downloading something from a bad link is a whole other story. Most people don\u2019t pay too much attention to what they\u2019re downloading. Those that do know that they should never interact with <a href=\"https:\/\/blog.netwrix.com\/2020\/06\/12\/malware-prevention\/\" target=\"_blank\" rel=\"noopener\">suspicious executable files<\/a>. However, hackers have gotten smarter.<\/p>\n<p>Now, they\u2019re hiding malware in PDFs and other documents. LinkedIn scams were relatively common because cybercriminals pretended to be HR reps and fake company members.<\/p>\n<p>The best way to protect yourself from harmful files is to have a combination of an <a href=\"https:\/\/www.the-next-tech.com\/security\/top-3-vpns-for-work-with-netflix-and-torrents\/\">antivirus and a VPN<\/a>.<br \/>\n<!-- Home page 728x90 --><br \/>\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2>How to Avoid Getting Scammed?<\/h2>\n<p>Once you get your mouth burned, you\u2019ll blow on cold water. There\u2019s a reason why some sayings are so popular, and that\u2019s because they\u2019re true. If you\u2019ve fallen for one scam, you\u2019ll treat all of your online encounters as potential frauds. Now, there\u2019s both a positive and a negative there. The positive is that you\u2019re aware and cautious. The negative is that you\u2019ve been scammed.<\/p>\n<p>However, a better way to approach this problem is through knowledge. A <a href=\"https:\/\/nordvpn.com\/cybersecurity\/glossary\/\" target=\"_blank\" rel=\"noopener\">cybersecurity glossary<\/a> is an excellent place to start, and you won\u2019t have to endure the hardship of learning on your own skin. Instead, you\u2019ll learn from the mistakes of others.<\/p>\n<p>Last but not least, use the security tools that you have at your disposal. This includes firewalls, VPNs, and antivirus programs!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A fool and his money are soon parted. That\u2019s how the saying goes. Many of us think we\u2019d never fall<\/p>\n","protected":false},"author":145,"featured_media":68221,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[933,19535,19536,19533,19534,19531,19529,5243,19532,19530,19537,17129],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/68220"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=68220"}],"version-history":[{"count":1,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/68220\/revisions"}],"predecessor-version":[{"id":68222,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/68220\/revisions\/68222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/68221"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=68220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=68220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=68220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}