How to detect cyber scams and protect yourself
Course Series: Becoming Your Own Digital Security Expert
Technology is always changing, and so are cybercriminals’ tactics. Educating our friends, family, and customers on the latest trends in security threats and scams is just one of the many ways we can help our communities understand what to watch for.
So, what can you do to help protect yourself? Keep current on new and emerging cyber threats.
Types of scams
Watch out for the warning signs of the latest scams. Here’s a few you may, or may not have heard of…
Voice clone scams
Voice clone scams, also known as vishing, occurs when scammers replicate harvested voice samples from podcasts, socials, and public recordings using artificial intelligence. Then, they call you while pretending to be someone you know and trust to personal information.
How to Identify voice cloning
To protect yourself from vishing scams note the following:
Be wary of unexpected requests for money or personal information
Do not trust caller ID
If someone close to you calls frantically asking for money, hang up and call that person directly—using trusted contact information
Create a safe word that only you and those close to you would know
Phone scams - SIM swapping and Smishing
Smishing, or SMS phishing, is when a cybercriminal sends a text pretending to be a legitimate company or someone you know. These often include a fraudulent link asking you to confirm your information. Another way hackers exploit your smartphone is by SIM swapping, or tricking your phone carrier into transferring your phone number to a new SIM card they control. Also watch out for one time password (OTP) bots, which trick people into sharing authentication codes received by a text or an email.
How to spot phone scams
To protect yourself from smishing scams:
Don’t click links in unexpected texts – go to the site or app directly
Verify the sender anytime you receive a message asking for sensitive or personal information
Never share one-time codes (OTPs) or secret PINs, even if the request or requestor is adamant; hang up and call the company directly
Be wary of urgent messages that need you to react quickly
Add a carrier PIN or port-out lock with your mobile provider to block unauthorized SIM changes. And be sure to report suspicious texts to your carrier and delete them.
Financial Grooming: Crypto & investment scams
Scammers often work to build long-term trust, often posting as friends or romantic partners, then slowly lure victims into fake investment platforms. They may even show fabricated “profits” to convince victims to keep investing. It’s a manipulative and devastating kind of crime that combines emotional exploitation with financial fraud. The term “Pig-butchering” refers to scams involving this type of financial grooming.
How to spot investment scams
To protect yourself from crypto and investment scams do not respond to unsolicited texts or instant messages, even if they look friendly or accidental (“Hi, is this Jim?”)
Watch for emotional manipulation tactics and constant mentions of money or investment opportunities, and be extra cautious of offers for a refund in exchange for an upfront fee.
It’s also best to think twice if the crypto or other investment seems too good to be true — like a contest, prize or “early“ opportunity. These are red flags.
Always Verify: Payment app scams
Scammers can take advantage of third-party payment apps through typical scenarios like accidental overpayments or fake fraud alerts. While you can usually contest an illegitimate payment with your bank, it’s more difficult to get a refund from a payment app. This is because a payment app, despite some loose third-party affiliation, is technically NOT a bank. Be careful and read the fine print.
How to spot payment app scams
To protect yourself from online payment scams do these things:
Be suspicious if someone claims to have sent an “overpayment” to one of your payment apps and asks for a refund
Verify messages that look like a legitimate payment app notification or company message by checking your account through the app or website
Check it Out before You Buy: Online marketplaces
Criminals set up online stores or product listings to trick people into making purchases that are either false, or never arrive. Claims of low prices and hard-to-find items are often used to lure victims.
How to spot online marketplace scams
To protect yourself from online marketplace scams:
Always research retailers and be wary of customer reviews before buying—even if they have 4 and 5 star ratings
Be cautious with deals that seem too perfect. If it’s too good to be true, use caution
Shop only from sites that accept secure payment methods
Fake jobs postings: Work-from-home scams, employment scams
Receive an unexpected communication like a text or email - claiming you can make big money working from home? If you inquire about the job, the fake employer asks for your sensitive personal information, then uses it to claim your identity.
How to spot employment scams:
To protect yourself from employment scams research the employers and look for legitimate employee reviews. Be cautious of any unsolicited employment offers.
Check before you scan: QR code scams
Scammers create malicious QR codes, distributing them via email, social media or in public places. Scan the fraudulent code, and you’ll be redirected to a site that collects personal information or installs malware.
How to spot QR code scams
To protect yourself from QR code scams:
Only scan QR codes from trusted sources and be cautious of QR codes in unusual locations
Check for signs that a QR code has been tampered with, like a sticker covering the original code
Ensure your mobile device is up to date with the latest software
Take extra precautions and use the onboard camera capabilities that come with your mobile device. This is imperative, since many QR code scanner apps contain malware. Use your direct access the website instead of scanning the QR code, or links in the text message.
Tech Support Diversion: Remote access scams
Scammers may pretend to be from a trusted company, or tech support to gain remote access to your device. They buy ads or compromise legitimate sites, so when you visit, a pop-up is triggered. The pop-up advises you to call your computer’s tech support, which then instructs you to allow them to remote into your computer. Once inside, the “helpful” representative can log into your bank account and transfer your money—all while you’re locked out.
How to spot remote access scams
To help protect yourself from remote access scams, never give an individual remote access to your devices unless you’re speaking with a verified support person
What to do if you’ve been scammed
Digital criminals employ sophisticated means to lure victims, so don’t be too tough on yourself. Instead, take immediate action:
Act quickly by reporting the incident to relevant authorities. Don’t wait! Time is your friend in these situations. The scammer is counting on you not to notice discrepancies. They assume you will be too busy to pay attention p, or to act immediately when something seems off. Don’t give them the opportunity to drill in further.
Contact your financial institution to report the fraud
Change any passwords and disable credit cards to cut off access to your accounts
Staying aware and keeping informed are your best defenses against digital fraud.
Recognize the signs and know how to respond so that you can protect yourself and your finances from ever-changing threats.
If you like this and other posts consider subscribing. If you know someone you think might be interested, tell them about it.
We like hearing from you!




