Tuesday, May 12, 2020

Common Scams to Avoid



Common Scams to Avoid




Thank you for visiting my blog! Here I strive to empower you with cyber security awareness and scam prevention. If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.

Last week, I was thrilled to become a volunteer Digital Fraud Fighter for AARP at aarp.org/fraudwatchnetwork. I will be receiving recurring training and correspondence with fellow participants to spread the latest news and events to help keep you vigilant. 

I encourage you to check it out AARP's scam tracking map at https://www.aarp.org/money/scams-fraud/tracking-map/. With this tool, you can check for active complaints around your neighborhood, community, and everywhere! 

I wish to briefly refresh you about some of the hottest rip-offs going on during this Coronavirus pandemic. Don't get swindled! 


Employment Cons


Reportedly, scammers are preying on those are looking for work. They utilize online search tools to review submitted resumes from either fake agencies or reputable networking sites. They may even act as a prospective employer by sending you an unsolicited email. 

Regardless of their mode of operation there is a catch. In order to be guaranteed a job, there are heavy expenses incurred by this so called organization. 

This is why they mail you a fraudulent check to cover training expenses. The amount will be more than what was intended. So, they will ask you to deposit the check into your banking account and wire them back the difference or send gift cards to satisfy the fees. 

In reality, there is no offer for employment. If a check is involved, the bank will eventually discover it is no good and you will be left with the stiff tab. 

Genuine employment do not come with a price tag. Recruiters are compensated by traditional businesses. Verify the reputations of those purporting to be an unheard company with your local Business Bureau and/or the Federal Trade Commission at https://ftc.gov/compliant

Census Scams

Imposters acting as census takers are showing up at doors, send an abundance of emails, and initiating unsolicited phone calls to unsuspecting victims. 

They are asking for security card numbers to verify occupants of a home. They even go as far as to solicit donations for a cause. 

This year, we have seen a spiked in these criminals demanding payment of fines from victims and making threats of arrest. 

For now, in light of the COVID-19 pandemic, the Official U.S Census Bureau has only suspended person to person visits. If someone comes to home claiming to work for the Census, it's not true. 
Do not provide any details about yourself or anyone living there! 


Election Scams

Be mindful of fake political ads posing as political action committees, pollsters, and campaign volunteers. 

By purporting to be collecting fundraisers, they seek to get information about your banking card numbers. They are so desperate, they may even ask you to make a donation by gift card or wire transfer. 

These type of attacks can materialize by phone, email, and even social media posts. 

Steer away from donating to a candidate on the basis of an unsolicited pitch. Reach out directly to the campaigns you support. Do the best you can do keep personal information off social media that can influence a scammer to zero in on you. 

Medicare Fraud

Have you ever received a phone call or email from a company offering free DNA swab tests for cancer, medical devices, or other services?

They want your Medicare number! 

These criminals may even come directly to your house with a too-good-to-be-true sales pitch. 

Only share your health conditions and Medicare information from trusted providers. 

The desires of these criminals are either to bilk the system for money for items that you may not need or nondelivery of services or products at the expense of taxpayers and your time lost. 

Phishing Scams

Computer criminals chase headlines. For example, in 2019, they shipped an estimated 3.5 billion packages. 

As a result, fraudsters have taken up the roles of Amazon representatives in the form of emails. 

They will contact you about a package intended for you that needs "confirmation" of your credit card number before it can reach you. 

Millions of these unsolicited emails are sent. The content includes a link that places malware on your operating system to pry out sensitive information. 

This is how fake tech support scams are often run. Some may even impact a virus into your computer and charge you for removal. They may also have you pay for a worthless computer maintenance program. 

COVID-19 Scams

Since the outbreak, Americans have lost over 10 million dollars to theses type of scams. Once again, cyber attackers are following world wide trends along fear and uncertainty to line their pockets. 

Naturally, people want to believe there is a cure or treatment for what is plaguing the world. Apparently, emails offering vaccines or access to critical medical equipment is transforming hopeful people into believers. 

Such high urge for preferable outcomes has seen victims surrender credit card information for products that never arrives. The technique of phishing is a preferable practice in this fraud as scammers are unleashing links in the body of emails to install malware and steal passwords. 

Always visit official state and federal government websites for updates! Don't rely on any unsolicited email claiming to have good news about treatment or cure for this diabolic disease. 

Conclusion

With all that said lets be weary of the following.
  • If you are or suspect you have been victim of fraud, don't be afraid to contact someone you trust about it. Reach out to reputable agency like the Federal Trade Commission at https://ftc.gov/compliant, AARP Fraud Watch Network at AARP.org/fraudwatchnetwork, or your local Better Business Bureau. 
  • Avoid Medical product claims. Research questionable companies through official government websites and  nonprofit organizations.
  • Be weary of offers sounding too good to be true. Look for honest reviews online from safe websites you trust. 
  • Be smart and aware. Consider using a password manager for your accounts. Change passwords often and never share with anyone. Enable two or three step verification when possible. 

Funny video but educational as well! Ransomware: a subcategory hazard of malware! 



Thank you again for visiting my blog!

Here I strive to empower you with cyber security awareness and scam prevention. If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.

Until next time my friends stay safe and secure!

Ken Harris
Writer/Puppeteer
https://www.kenharrisnews.com

Saturday, May 2, 2020

Email and Phishing Scams

Email and Phishing Scammer

 Thank you for visiting my blog! With scams soaring like never before since the COVID- 19 outbreak, I hope this content serves you well in being proactive against scams.  


Please sign up for my free monthly digital safety newsletter at https://shadowworldpresent.wixsite.com/safe.

Email and Phishing Scams

Last year in the U.S alone, an estimated 16 million victims lost 17 billion dollars to identity theft. That’s just one type of scam! 

I’m sure if AARP, the Better Business Bureau, and other organizations intended to protect the financials security of Americans, combined all their figures from reported swindles, the final tally would be mind-blowing. 

Now with the COVID-19 pandemic creating fear and uncertainty everywhere, con artists are conjuring up new ways to squander people’s finances and personal information. This gives them motivation to reach out with offers too good to be true and the impersonation of government agencies to steal personal information. 

Email and phishing cons are just some of the tactics these criminals apply. Cyber attackers sends thousands, if not millions of emails daily. They are not sure who get these messages; but their objective is to trick a victim into some call of action. It includes the following.



  • ·     Clicking on a link
  • ·     Opening an attachment
  • ·     Completing a form

Taking either of the above actions can get you tangled in a spider web of deceit!

Some Common Methods by Criminals

Since scammers are attempting to “phish” as many victims as possible, their messages are usually directed to “Dear Customer” or other generic greeting. 

The bad guys creates a strong sense of urgency or curiosity to the receiver. They pretend be an official organization like a bank or may impersonate a local, state, or federal agency. 

Generally, these fake senders will have grammar or spelling mistakes in the content of these email messages. 

Another clue to look out for is if the email originated from a personal email account such as an @gmail.com address. Also, by looking at the top left, the “From Email Address” line may appear like it generated from an official organization. But the “reply to-address” is someone’s personal email account. 

Here are some other clues that should raise red flags.



  • Messages requesting highly sensitive information like credit card number or password.
  • You receive a message from someone you know but the tone or message does not sound like him or her. 

What Can You Do To Protect Yourself?

It is easy for a scammer to create an email that appears to be from a friend or coworker. 

If the message includes a clickable link, you can hover your mouse cursor over it to
reveal the link’s true destination. Make this a common practice to confirm if you being directed to a legitimate website. 

Even on many mobile devices, pressing to hold the link will also show the true destination. Instead of clicking on a link, you can type the website address directly into your browser. Why respond directly to a suspicious email claiming to be your bank when you can use the browser? 

I wouldn’t open any attachments I wasn’t expecting. The last thing I want is opening an infected attachment and subjecting my computer to malware. Not all antivirus can detect malware. 

Also Keep In Mind...

Take care to not expose sensitive information when using email or messaging. 

Email features, such as auto complete, make it easy for you to mistakenly email the wrong person. Once you send an email out, you cannot retract it. 

Also, be careful with the “Email reply all Feature” thread as you may not want to respond to an entire group of people who received the same email. 

Cyber Brats

In this short educational web-series video I created, check out the consequences for being too trusting to an unsolicited phone regarding Medicare fraud scam on a fictional radio show. These types of threats are common. 

You can check out more of these educational videos at https://www.youtube.com/channel/UCZ5JPhBrP4OpCKeY4hbm5Dg/videos

Did you know Shark Tank Star and Investor Barbara Corcoran nearly loss $400,000 to a scammer. Yes, this could happen to anyone! Check out the podcast on the AARP website at https://www.aarp.org/podcasts/the-perfect-scam/info-2020/barbara-corcoran-phishing-scam.html


Beware of Fake Census Questionnaires

The completion of census questionnaires are required by law. Scammers know this and uses this headline to plant seeds of trouble. 

Keep this in mind if a suspicious person claiming to work for the Census reaches out to 
you via email, phone call, or in-person visit. 


  1. A real member of the Census will never threaten you with arrest for any reason.
  2. If you are asked to make a payment for anything, that should raise red flags. 
  3. In-person interviews have been temporarily suspended by the agency due to COVID-19 pandemic.
Also, keep in mind census mailings have a return address of Jeffersonville, Indiana which is the site of the National Processing Center. If you hear or see another address, then run!

We have to be careful out there as these scammers may also contact you by phone, email, and Home visit. Their eager to fool you by present themselves as an official agency tasked with prying information out of you. 

To confirm if any census communications are true, contact the Census Bureau’s national Processing Center or the regional office in your state directly . 

Be wary of trusting caller ID on your phone. Scammers can use “spoofing tools” to make it look like it’s coming from an official department phone number. 

Report any suspected scams to your Census Bureau and the Federal Trade Commission online or at 877-382-4357. Also, you can contact the AARP Fraud Watch helpline to report fraud at 1-877-908-3360. 

Resource and Tools

AARP has a useful scam tracking map to learn of and report scams in your area. I find this a highly efficient resource. Check it out on their website at https://www.aarp.org/money/scams-fraud/tracking-map/

In addition, AARP has the Fraud Watch Network Guide and other free educational booklets available for download. I encourage you to look at all what they offer to keep you safe. 

Connecting Point has an informative video about scam prevention below.



Thank you again for visiting my blog. It would be an honor to serve you with more informative news to help keep you and your family safe from schemes. I would greatly appreciate it if you sign up for my free safety digital newsletter at https://shadowworldpresent.wixsite.com/safe.

Stay safe and secure!

Ken Harris
Writer/Puppeteer

PS Beware of scammers like Jester Jenson!



























Saturday, March 28, 2020

Scams Amidst Covid-19 Fears




Welcome! Thank you for checking out my blog where I strive to share the latest news and events pertaining to scams to keep you safe and secure.

With my passion for using puppets to depict situations, along with my articles, it is my hope you find this content informative and helpful.

Please subscribe to my email list at https://shadowworldpresent.wixsite.com/safe to get the latest news and events from my free digital monthly newsletter in a fun way!

The Covid-19 Fears exposes a new low for Scammers


Scam artists has the practice of observing worldly events; studying trends in order to prosper in a specific market. 

This is common during the Christmas season when they target the elderly with a grandparent scam in where they pose as a grandchild in need of financial help as a result of an arrest, hospitalization, or vehicle accident. 

Now, with the spread of coronavirus fears on an alarming level, these fraudulent predators are manipulating an assortment of mediums to reap monetary gains in the latest schemes to date. 

Let's take a closer look at these deceitful methods.



Social Media

Currently, there is no medically proven preventative treatment or cure for Covid-19. Yet, advertisements for these “miracle products” are appearing on social platforms at a time when many people are home from work and practicing social distancing. 

Also, a rumor is circulating that government scientists found a vaccine but is keeping it hush-hush for security purposes. That is untrue. Complete rubbish and unfounded. 

Fake Websites


Computer criminals are reaching out to victims with offerings of essential supplies such as masks, gloves, and cleaning products for the protection. 

There is a lack of these supplies in local stores due to the profound paranoia that is compelling people to stock pile these items. 

In reality, not only does this creates a challenge for medical professionals 
who don’t have enough of these essentials; but also, this increases one’s vulnerability for internet thieves overseeing deceptive businesses. 

Increasingly, victims are buying these products; but they don’t receive them in the mail. In addition, those who do get them learn the items are of low quality and not as advertised. 


Communications


Con artists goes at great length to disguise their motives via text message, phone call, and email. 

As I previously pointed out, sometimes they target specific victims whom have a need for a service or item. 

Through relentless persuasive tactics, they capitalize on existing consumer fears, hatred, sadness, hope, aspirations, and other preferences. 

Recently, such methods were used in impersonating government agencies such as the World Health Organization and the Center for Disease Control and Prevention to con unsuspecting recipients into opening attachments and downloading malicious software. 

Instead of sharing promised news regarding Covid-19, the real motive is to ultimately steal personal or financial information.

It is easy to see why senior citizens are preferred targets. Genuinely, they are trusting and can easily be tempted to fall for fraudulent activities. The FBI explains this on there website at https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/seniors

When this happen, there could be a delay in the reporting of this to local authorities, the Better Business Bureau, and AARP, the leading advocacy group for seniors. Reasons such as shame and embarrassment could disguise instances of deception unless a caretaker or relative happen to stumble upon it.

The Better Business Bureau actually has loads of existing allegations about schemes in your neck of the woods. Find out about the cons in your local area at https://www.bbb.org/scamtracker

Another reason includes the affected senior opting not to discuss the incident to anyone for fear of losing his or her financial independence as a result of declining cognitive ability. 

Anyone can be a victim to fraud regardless of age. All would have to work long and hard to clear up the mess with financial institutions to prevent future exploitation. 

In this day and age of hideous fraud investment opportunities, counterfeit essentials, and other massive deceptions, we are all in this together to protect ourselves, our loved ones, and to spread cyber security awareness. 

Please sign up for my free monthly cybersecurity awareness newsletter monthly depicting real life scams with puppets and the latest news and events at https://shadowworldpresent.wixsite.com/safe




Also, check out my current educational videos on Youtube at https://www.youtube.com/channel/UCZ5JPhBrP4OpCKeY4hbm5Dg?view_as=subscriber
By subscribing and sharing, you will be helping me to get the word out about scams.

Thank you my friends!

Until next time, stay safe and stay secure.

Ken Harris
Puppeteer/Writer

Tuesday, March 10, 2020

An Upcoming Educational Web Series Focusing on Scams

Art by Aaron Harris

Lets face it. An educational lecture on any sensitive topic could still be boring.

The subject of scams is no exception. This is a global problem that will never go away in it's entirely.

As our technology get better, so will the skills of scammers to access our sensitive data for financial gain.

A Creative Passion blended with a Self Call to Action

Recently, I came up with a terrific fun idea with spreading world about cyber security awareness. It's purely educational but includes specks of entertainment.

Puppets.


Yes, I find this endeavor challenging and exciting to pass on what I learn on a continuous basis!

This is the introduction to my Youtube Channel that will eventually be home to many cyber security awareness videos


An Unlikely Pair...

The setting takes place in a fictional radio station. It stars host Cyber Sly, a former scammer, and cohost Alexander Midas, a former business man who's business crumpled after a cyber attacker accessed his customer's banking accounts.

 Cyber Sly is a change man who now wants to make a difference in the world.


Alex Midas is an angry man who resents Cyber Sly and don't think computer criminals can change their behaviors.



Each episode will be 7 to 10 minutes in length with 3 segments on scenarios and tips involving malware, phishing, spoofing, identity theft, social media, targeting, iCloud, and so much more involving the latest news and updates happening in the world.

Having written monthly articles pertaining to cyber security awareness in the Point of View Community Newspaper at http://www.afampov.com, I feel I need to do more to get the word out on how people can stay safe and secure from multitudes of scams (check out page 19!)


While computer criminals congregate on the dark web to share their deceitful tactics and organize plans to trick an unsuspecting victim, I feel we should be joining or creating platforms like this to educate ourselves.

"Cyber Brats" is a show that will be free and available on Youtube in June 2020. In the meantime, I like for you to subscribe to my blog to get the latest news and events regarding cyber security awareness.

This program is geared for adults with an emphasis on sharing insightful tips and suggestions to avoid being a victim to a scam.

I welcome any suggestions to this platform. Please leave any comments or questions below and I willrespond promptly.

Thank you for your time and I hope to be your source for informative news to help keep you safe
from scammers!

Ken Harris
Author/Puppeteer
https://www.amazon.com/Kenneth-Harris/e/B071ZZK56K/ref=ntt_dp_epwbk_0

Monday, February 3, 2020

Scam Call Centers and Malware

                             

Call Center Scams

Utter lies to foster fear orchestrated by call center scams are costing Canadians millions of dollars.

Think about that for a moment.

Can you imagine how much computer criminals are making on a global scale considering huge losses in Canada?

Three years ago, investigative reporter Kevin Newman trekked to India and came across a massive call center scam targeting Canada. Thousands of Canadians were fooled into thinking they owed money to the Canada Revenue Agency.

While this story does not unravel in the U.S, I find it an invaluable piece of reporting that provides an inside look into how scams generally unravel. No country is immune from it.

This video includes interviews with schemers who were caught, victims, India's law enforcement, and diverse accounts offers an insight into this deceitful trade cleave upon by cold and calculating cyber attackers who stop at nothing to get what they want.

Malware

At one time or another I’m sure most of us stumbled upon mysterious pop-ups when browsing the Internet; or received suspicious emails requesting us to enable macros in order to access a file. 

These vile methods by cyber attackers are laid out to initiate viruses into computers and devices, to spy on person’s online activities, access user passwords, encrypt or erase files, and use victim’s operating systems to attack others. 

Such cyber attacks are referred to as Malware

Malware is the host of many malicious programs such as ransom ware, Trojans, spy ware, and viruses that are contagious and can easily spread to others we communicate via social media, work related emails, and personal emails. Even inserting a corrupted USB device will give rise to an infection. 

Generally, cyber criminals indulge in this broad approach for monetary gain at the expense of those who fall vulnerable. 

Having the best anti-virus software for protection on our computers alone cannot divert Malware. 

Cyber Attackers are always looking for better or easier ways to hack systems despite our safeguards. 

What that means we must also be improving our knowledge and understanding of these threats to decrease our chances of being victimized. 

We can start by being weary of clicking on an infected email attachment, clicking on a bad link, and hooking up an infected USB device. 

But it would best serve us to be mindful of the type of attacks that are current. 

Have you ever wonder how cyber attackers come in possession of log-on credentials of others? 

They do this by way of key logger. 

Key logger is when they access your account and pretend to be you when they are reaching out to your personal or work-related network. Schemers steal this sensitive information by capturing your every keystroke on your computer or hand held device without you knowing it. 

Just imagine all the e-mail or text correspondence you had with your banking institution, credit card companies, student loans, etc. It’s now something cyber attackers can work with. 

With further research of your social media profile and anything else they find online, they can create a profile of you and have the freedom to exploit you financially. 

After organizing a profile of you, they may even sell that information to someone on the dark web and that person will repeat the cycle. 

The possibilities are endless with regard to how they can use sensitive information.

Ransom ware is another form of malware that encrypts and locks users out of their files such as documents, spreadsheets, and photos. Cyber attackers will then demand payment to decrypt the files and make them accessible again. 

Their promise is never guaranteed. 

If this occurs at work, it is best to notify your technical support team to rectify this matter. If it happens on a personal computer, one should reach out to the computer or program help line. 

Another diabolic attack is Spy ware. With spy ware, schemers take control of your microphone or camera and spy on you. All computers can be infected.

The best thing we can do to avoid malware is to keep computers/devices current and updated with the latest workable systems and apps. 

In addition, it is an extra safeguard to install the latest anti-virus software. We can also take extra precautions to ensure we are installing known apps from trusted sites. 

Until next time, stay safe and secure!

Ken



Sunday, January 5, 2020

Social Engineering Tactics on a Global Scale



It is to our benefit to fathom the tentacles of social engineering tactics introduce by cyber attacker on a daily basis. Far and wide Investigations by Interpol, FBI, and the Toronto police revealed how deceptive participants are networking and exchanging information on how to be better at what they do (check out the video far below). 

Several years ago, when I was oblivious to basic terminologies related to cyber security, I knew very little about social engineering orchestrated by cyber attackers. I thought it was a practice initiated by computer experts to combat viruses. Since I was no expert on such systems, I spent years with no interest in educating myself on technological systems. 

It took me a long time to understand; but learning the basics of closing the door on cyber criminals in restricting access to systems or information does not require a profound knowledge of computers. 

Social Engineering is actually a tactic to trick people into doing something they should not do, such as sharing sensitive information such as banking information, passwords, opening infected email attachments, etc. 

A Senior Citizen is taken Advantage of 


A recent case last December saw two men from New York, pretending to be a lawyer for a grandson in jail, swindle a Massachusetts grandmother out of $19,000. This poor woman was specifically targeted by way of a series of phone calls requesting for payments to be made in order to secure the grandson’s release. 

It took these criminals no more than a week deceive this woman twice before the police were alerted and the men were taking into custody when they were trying to trick her for a third time. Learn more about this here https://www.masslive.com/news/2019/12/two-new-york-men-scammed-85-year-old-massachusetts-woman-out-of-more-than-19000-by-posing-as-lawyer-for-relative-police-say.html

You might ask yourself why should this story concern me? I would never be gullible for something like this. 

True, but how often do we have elderly relatives or friends who could be potential victims for something like this? We can’t be certain WHO could fall for these scams but what I know for sure is the elders in our community are high risk targets. 

It would be beneficial to keep ourselves updated with the latest news and events to educate ourselves and put our newly acquired knowledge into practice by checking on our loved ones. 


More On Advanced Social Engineering


Advanced social engineering attacks can also come in a form of a fake or suspicious email. Generally, how many times per day do we see something like this? If this seems odd or not right, just contact the sender directly by phone. Why take a chance?

I think so far, the most bizarre story I heard of took place late last year in Kentucky when a woman was sentenced up to 30 years in prison for defrauding her employer for millions of dollars. Previously, she was a victim of a romance scam.  

She was hoping to eventually meet someday while sending this person money from her retirement and savings. This cyber attacker claimed he was a business man and needed her to loan him money to close out deals. 

This went on for years before she depleted her funds and resorted to stealing from her employer in order to solve her financial troubles. Read up on this at https://www.thedailybeast.com/bridget-johnson-embezzled-dollar4-million-and-gave-it-all-to-a-romance-scammer 

Advanced social engineering attacks basically contains the same fundamentals. Cyber criminals creates a sense of urgency, often through fear, intimidation, a crisis, or using an important deadline to deceive victims. 

The best defense is you. Be mindful of opening suspicious attachments, clicking on suspicious links, and sharing sensitive information. If something’s too good to be true, most likely it isn’t. 


Criminals in Internet Cafes and Other Deceptive Methods



This video left me baffled concerning not only with the obvious signs missed by the victims; but also the blatant disregard of a moral compass by the cyber attackers who shared deceptive practice. 

In this investigative video by ABC News In-depth in West Africa's Ghana, these orchestrator's behind romance scams carefully sought out targets with the following traits-
  • Widows
  • Those looking for engagement or marriage
  • Vulnerability with no ability to properly screen 
Without giving away too much before you see this video, please understand how victims keep their guards down and quick to cater to the wishes of these internet predators. 

This has become big business for gangs of criminals because of the lack of awarness regarding cyber fraud. in some cases cyber thieves are stealing images of U.S. military personally and using that to trick unsuspecting women.

The same applies to male victims. They think they are speaking to a woman in a different country. But they are really talking to teenagers in an internet cafe. 

The male victims ending doing stuff on camera they shouldn't do and these inaappropriate incidents not only signifies the growing problem of online fraud; but it also exposes weaknesses on the part of the victim.

Please take a look at the video about (there's nothing graphic). Just a story about the problem in Ghana and the ties it has to drug smuggling, money laundering, and more. 

Thanks for checking out my blog. If you like it, please subscribe above. 

Until next time, stay safe and secure!


Ken Harris
Writer

Tuesday, December 3, 2019

Holiday Scams


Every year while we fulfill our appetites with turkey and ham during the Thanksgiving holiday, cyber attackers stuff their naughty heads with ways to steal away our financial information or identity.

Holiday scams are highly prevalent from Black Friday throughout Christmas.

Our needs and desires during the winter solstice is at its peak while we are rushing to get things done. Balancing our priorities tend to knock us off focus and this deficiency makes us vulnerable to hackers.

Robocalls is only part of their Modus Operandi. Their unseen tentacles can strike from any direction. The best way to maximize our defenses is to understand and expect the type of online scams they will orchestrate.

Lets examine some of these crocked methods and the best practice we can apply in being proactive against cyber predators.

Phoney Websites

Unsolicited emails of a good deal is a tool by cyber attackers to trick victims into downloading malware. Their objective is to steal your identity and take your money.

We can best avoid this scam by doing the following-


  1. Review senders address and be on the lookout for spelling and grammar errors.
  2. Ensure the website begins with HTTPS (secure site AND the S signals it is secure and information is encrypted).
  3. Hover over link in question (to see where it will really direct you to).

Shipping Alerts

Fraudulent emails can also notify you of a shipping status. Don't get hooked by downloading malicious software.


  1. Verify tracking numbers through company's legitimate site rather just click on a suspicious link. Call their customer service from there.
  2. Review if any, previous emails from the business.
  3. Be on the look out for spelling and grammar errors with email content.

Digital Cards

Scammers sometimes cordinates phishing scams by tricking you into downloading bad software. 

  1. Is the sender's name readable?
  2. Are there prompts requesting personal information in order to proceed?
  3. What looks suspicious?
  4. Is there an exe at the end of the email? Certainly X out of that!
While we are on the subject of cards...

Santa's Letters/Natural Disasters/Tragedies

It's no secret cyber attackers will use current events to fool you into sharing personal information and even requesting for your to give money for phony charities. If you can make good practice of being mindful of these tactics you will be ok-

  1. Be always suspicious of unsolicited emails
  2. Research any company offering services or sales
  3. Compare what the sender is offering to other markets
  4. Check out the latest information with the Better Business Bureau
We live in a world where bad news is the focus a majority of the time. Cyber Attackers can take a terrible event, say like a mass shooting, and pretend to be a legitimate organization collecting donations for survivors or victims. Research this diligently before you consider giving.

The Elderly

Senior citizens are gullible targets for senior citizens during the holidays and beyond. They may pose as a grandchild or other relative who needs help as a result of an accident, arrest, or hospitalization. Here are somethings that can be done to offset this. 

  1. Call the family member in question directly before sending anything. 
  2. Talk to other family members about the contact
  3. AVOID wiring money or rendering gift cards
  4. Ask the suspicious caller only questions the relative in question would know. 

Questionable Charities

Similar to pretending to be a relative, con artists pretend to be charities or needy persons. You can always verify a charities status at https://www.give.org

Aside from this, your primary assessment should include suspicious content or information from the source providing it and a review of the charity donation plan. 

If you find out its the real deal, consider donating with a credit card. If there is an issue afterward, your financial institution can assist your with reimbursement. 

Forget about sending a gift card. Once it is in the hands of a cyber attacker, consider it lost forever. 

Employment Scams

This is done primarily to fish for your private information. Don't be a candidate for identity theft! Prospective employers are not going to contact you if you don't complete an application. 

If you get a call for a job offer you never initiated, that there alone is red flags. 

  1. Just apply for positions in person or directly on retailer's websites. 
  2. Avoid sharing personal information on the phone
  3. Definitely don't pay for anything. 

Weird Types of Payment

You may see or hear about a great deal for an awesome product or service in pop up ads and unsolicited emails. Beware and exercise caution. 

  1. Don't make requested payments with prepaid debit cards, wire transfers, or payments on apps such as Venmo. 
  2. Investigate. Investigate, Investigate. 

Free Gift Card Scams

Cyber Attackers are mimicking specialty shops when they target people with ads on social media. Again, their intentions is to steal your identity by compelling you to share your personal information. 

  1. Never open a suspicious email as it could be a form of phishing. 
  2. Never trade your information to receive a gift card.
  3. Refrain from clicking on the ad. 
  4. In event this happens, exit out of the website and activate your ad blocker. 

Social Media Exchange

This is important because deliberate participation in this delivery exchange can lead all participants to face a stiff fine or prison time.

Known as the "Pyramid Scheme" or "Secret Sister Scam", this involves a single person purchasing a gift and getting several in return by use of the U.S postal service.

It is a federal violation. There had been cases of scamming participants who willfully engaged in this and sentenced anywhere from 2 to 5 years in prison in addition to financial retribution.

Of course don't give out your telephone number or address. This is a ploy to steal your identity.

Pet Scams

Families searching for a specific breeds are ideal candidates to be lured in this scam. Cyber Attackers uses fake pictures of adorable pets to empty your wallet. 

  1. Always look around at other pet shops or legitimate breeders.
  2. Understand what local breeders have available.
  3. Pay with a Credit Card
  4. Check out customer reviews online
  5. Do a reverse look up of pet online. Does the same picture appear on other websites? 

Travel 

Yes, who wouldn't want a good bargain on air travel or spectacular cruise. 

If there is a marketer out there proposing a vacation package you must do your homework. 

Research the area and services in question. Do the same with the agency, airline, and car rental.

You might end up somewhere that don't look nothing like the beautiful pictures you saw on the Internet or brochure. It is quite easy these days to manufacture eye catching images to win the trust of eager buyers. 

Don't fall for it. 

  1. Be careful with email offers
  2. Don't wire money to a stranger
  3. Ask for travel references. Check customer reviews.
I think Holidays scams are busiest time of the year for Cyber Attackers because we are busy and this is a time when we are at vulnerable. 

Thank you visiting my blog. I will share Cyber Security Awareness tips each week. Please subscribe to my blog to get the latest news and stories to help keep you safe. 

Scattering the Seeds of Knowledge,

Ken Harris














shadow world puppets new blog

    Shadow World Puppets has moved! All latest blogs, videos, and updates are now available at https://www.swpp.info/  Please subscribe to g...