RSN™ Website Categories

BazarCall Scams: Call Centers Playing A Roll In Phishing & Ransomware Attacks

BazaCall ScamsScams A Scam is a confidence trick - a crime -  is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.: Call Centers Playing A Roll In Phishing & RansomwareRansomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies that are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Ransomware attacks are typically carried out using a Trojan virus disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the WannaCry worm, traveled automatically between computers without user interaction. Attacks Adding Humans To CybercrimeCybercrime Cybercrime is a crime related to technology, computers, and the Internet. Typical cybercrime are performed by a computer against a computer, or by a hacker using software to attack computers or networks. Attacks How Scams Work - A SCARS Special Report The Evolution of Cybercrime Introduction - BazaCall or BazarCall - Same Thing For the past year, security researchers have been [...]

Man In The Middle Attack: Browser Attack

Man In The Middle Attack: Browser Attack Cybersecurity & Online Safety Basics How Scams Work - A SCARS Insight What is a Man in the Middle Attack (MitM)? This Can Be Used To Hijack Your Browser And Capture Your Sensitive Data! A man-in-the-middleMan-in-the-middle attack Man-in-the-middle attack: When a fraudster secretly intercepts and possibly alters messages between two parties who believe they are securely communicating with each other. (MitM) attack [...]

Cloning Your Phone Means Cloning Your Life

Cloning Your Phone Means Cloning Your Life Cyber Safety After The ScamScam A Scam is a confidence trick - a crime -  is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. Ends Ignore This At Your Own Risk A SCARS Insight Your Social Media Profiles & Accounts Are At Risk Almost Anyone That Has Watched TV Knows About Sim Card Or Phone CloningPhone cloning Scammers illegally monitor radio wave transmissions to intercept unique identifying numbers that cell phones transmit. They then modify their own phones to broadcast these numbers, cloning the legitimate phone ID, so their calls and data use are charged to the cloned account. This [...]

Bad Passwords

Bad Passwords Common Passwords That Hackers Already Know Is Yours In The List? A SCARS Insight Most Hacked Passwords Revealed Exposed as UK cyber survey exposes gaps in online security The U.K. National Cyber Security Centre's (NCSC) global password risk list Breach analysis finds 23.2 [...]

KILLWARE – A New Trend In Cybercrime

KILLWARE - A New Trend In Cybercrime MalwareMalware Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts. With The Intent To Harm Or Kill Humans! A SCARS Cybercrime Insight Over The Last Two Years, We Have Seen Malware Used To Hurt Humans! What is Killware? Killware is a program or code that deploys on [...]

Ransomware Guide – A U.S. Government Report – DHS CISA December 2020

Understanding Ransomware - A U.S. Government Report U.S.Department of Homeland SecurityDepartment of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department (under the President) responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cybersecurity, and disaster prevention and management., Cybersecurity and Infrastructure Security AgencyCybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is a standalone United States federal agency, an operational component under Department of Homeland Security (DHS) oversight. Its activities are a continuation of the National Protection and Programs Directorate (NPPD). CISA was established on November 16, 2018 when President Donald Trump signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018. Published December 2020 Presented by SCARS Understanding Ransomware - A CISC Guide We want to share this document with the public to help create a greater understanding [...]

McAfee’s Guide To Sharing Online Safely

McAfee's Ultimate Guide To Sharing Online Courtesy of McAfee Presented by SCARS In A Recent Article By Mcafee, They Laid Out The Essentials For Sharing Safely Online And In Social Media Source: https://www.mcafee.com/blogs/consumer/consumer-cyber-awareness/the-ultimate-guide-to-safe-sharing-online/ The following is shared with our audience in the hope [...]

Inhuman Attackers! What Are Bots?

Inhuman Attackers! What Are Bots? Understanding Cybersecurity A SCARS Insight Bots Are Everywhere! A ‘bot’ – short for robot – is a software program that performs automated, repetitive, pre-defined tasks. Bots typically imitate or replace human user behaviorBehavior   Behavior / Behavioral Actions Otherwise known as habits, behavior or behavioral actions are strategies to help prevent online exploitation that target behavior, such as social engineering of victims. Changing your behavior is the ONLY effective means to reduce or prevent scams.. Because they are automated, they operate much [...]

Using Caution with Email Attachments

Using Caution with Email Attachments A SCARS Insight Why Are Attachments A Concern? While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to [...]

States Using ID.me to Stop Fraud: aka Moral Ambiguity – Guest Editorial by Brett Johnson

States Using ID.meID.me According to the company: ID.me simplifies how individuals prove and share their identity online - it provides secure identity proofing, authentication, and group affiliation verification for government and businesses across sectors. The company’s technology meets the highest federal standards for consumer authentication and is approved as a NIST 800-63-3 IAL2 / AAL2 conformant credential service provider by the Kantara Initiative. ID.me is the only provider with video chat and is committed to “No Identity Left Behind” to enable all people to have a secure digital identity. to Stop FraudFraud In law, fraud is intentional deception to secure unfair or unlawful gain (money or other assets), or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements. A fraud can also be a hoax, which is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim.: aka Moral Ambiguity Guest EditorialGuest Editorial A Guest Editorial is an article written by an outside contributor or author who is not a part of the SCARS Management or SCARS Editorial Team. We allow scam victims and stakeholders to contribute articles, commentary, or editorials for publication on RomanceScamsNOW.com for review and publishing. To submit an article please send it to contact@AgainstScams.org by Brett JohnsonBrett Johnson He is a Cybersecurity, Cybercrime, Fraud, and Identity Theft Expert. Keynote Speaker, Consultant, Writer, Podcast Personality. Former USA Most Wanted Cybercriminal, Identity Thief, Hacker, and Original Internet Godfather. He is also an Advisor to SCARS. Brett is one of the top experts in the world on cybercrime, identity theft, fraud, and cybersecurity. His knowledge is unique. His education in cybercrime does not come from a book, he has hands-on training. His knowledge is from the criminal side of things and has an understanding of cybercrime that the majority of people on the planet will never possess. Keynote Speaker and Consultant on Cybersecurity & Cybercrime, and Global Identity TheftIdentity Theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources. Expert, Advisory Board Member - AnglerPhish.com In a bit of a mood today. The following is a guest editorial [...]

SCARS Quits Twitter

SCARS Quits Twitter After many years, Twitter is simply not a place for us to be! This is actually better since our followers will have to follow us here now! We Have Had Enough We are a constant champion for online scam victims [...]

The Most Dangerous Malware EMOTET Disrupted Through Global Action

The Most Dangerous Malware EMOTET Disrupted Through Global Action Law enforcement and judicial authorities worldwide have this week disrupted one of the most significant botnets of the past decade: EMOTET Investigators have now taken control of its infrastructure in an international coordinated action! [...]

How Bad Is It, Really?

The State of Cybercriminality In Real-Time! Here is a real-time map showing global cyber threats courtesy of Kaspersky and CyberArmedSecurity.com Turn on or off the options at the bottom of the map to see the different types of attacks.  Turn on or off the options at the bottom of [...]

SCARS™ Insight: Cybercrime – It’s Worse Than We Thought – 2020

SCARS™ Insight: Cybercrime - It’s Worse Than We Thought - 2020 A United States Government Analysis Of How Bad Cybercrime Has Become Reprinted from NIST For Scam Awareness. Authored by Douglas S. Thomas The cyber-world is relatively new, and unlike other types of assets, cyber assets are potentially accessible to [...]

SCARS™ Insight: Cybercrime Is Big Business! A Continuing Series – Part 1

SCARS™ Insight: Cybercrime Is Big Business! A Continuing Series - Part 1 Source: DataQuest What Drives The Business Of Cybercrime? Easy access to consumer data, numerous avenues to attack, technology-driven sophisticated tools, and of course the prospect of making easy money continues to fuel the growth of cybercrime Every day, [...]

SCARS™ Cyber Basics: Three Random Words

SCARS™ Cyber Basics: Three Random Words Three Random Words Or What Makes A Good Password? You're probably aware that there’s a lot of guidance out there on what makes a good password — and it can be incredibly confusing. This should help. We advise that you create passwords using three [...]

BBC Tech Tent PODCAST Presented By SCARS™ :: Indian Call Centre Scam Shut Down And More

BBC Tech Tent PODCAST Presented By SCARS™ Indian Call Centre Tech Support ScamTech Support Scam Phone scammers may masquerade as tech support employees for a major company in order to take your money or install a virus on your computer. They may call from what seem to be legitimate company numbers using caller ID spoofing. Shut Down Also Facebook's Libra Cryptocurrency, and More If you want to share this podcast, click on the link below BBC Tech Tent Podcast Copyright © 2019 BBC - Downloaded With Permission of BBC Please [...]

SCARS™ Scam Alert: A New Kind Of Socially Engineered Scam

SCARS™ Scam Alert: A New Kind Of Socially Engineered Scam A New Kind Of Scam Is Appearing Thanks To Google Searches ... You are minding your own business searching Google or Bing for left-handed kumquats or spring-tailed dandy-lions and you see a link to an interesting website link in the [...]

SCARS™ Cyber Basics: Creating A Safe Password

SCARS™ Cyber Basics: Creating A Safe Password Creating A Strong Password Is An Essential Step To Protecting Yourself Online Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime. No citizen is immune to cyber risk, but #BeCyberSmart and you can minimize your chances [...]

SCARS™ Psychology of Scams Video – Stranger Trust

SCARS™ Psychology of ScamsPsychology Of Scams Psychology Of Scams is the study of the psychological or emotional effects of scams or financial fraud on victims of these crimes. It helps victims to better understand the impact of scams on them personally or on others. To find the SCARS articles on the Psychology of Scams, use the search option to enter the term and find them. Video - Stranger Trust Stranger Trust Is A Documented Psychological Phenomenon That Opens The Door To Vulnerability! To learn more about Stranger Trust CLICK HERE » Do you remember not to talk to strangers? Stranger Trust is the first step in making yourself vulnerable! Once the scammerScammer A Scammer or Fraudster is someone that engages in deception to obtain money or achieve another objective. They are criminals that attempt to deceive a victim into sending more or performing some other activity that benefits the scammer. [...]

SCARS™ Insight: Facebook 1 Billion Fake Profiles [Infographic]

SCARS™ Insight: Facebook 1 Billion Fake Profiles [InfographicInfographic Infographics (a shortened word of "information" and "graphics") are graphic visual representations of information, data, or knowledge intended to present information quickly and clearly. They can improve your understanding of a topic by utilizing graphics. Infographics have evolved in recent years to be more useful for mass communications and thus are designed with fewer assumptions about the readers' knowledge base than other types of visualizations.] Think About This? There Are About 2+ Billion Profiles On Facebook! THAT IS A LOT OF PEOPLE - MORE THAN CHINA & THE U.S. COMBINED! Now think about 1 billion fake facebook profiles? That's 50% of Facebook profiles! This Concerns Us! What [...]

Essential Tools For Every Scam Victim From SCARS Publishing

Visit shop.AgainstScams.org

Each is based on our SCARS Team’s 31 plus years of experience.

SCARS Website Visitors get an Extra 10% Discount
Use Discount Code “romanacescamsnow” at Checkout

SCARS GREN BOOK - The SCARS STEPS Guide to Scam Victim Recovery

Self-Help Self-Paced Recovery Program Guide


This program is designed to help scam victims struggling to recover on their own and for those who want to understand the overall process. You can be using other resources, such as traumaTrauma Emotional and psychological trauma is the result of extraordinarily stressful events that shatter your sense of security, making you feel helpless in a dangerous world. Psychological trauma can leave you struggling with upsetting emotions, memories, and anxiety that won’t go away. It can also leave you feeling numb, disconnected, and unable to trust other people. Traumatic experiences often involve a threat to life or safety or other emotional shocks, but any situation that leaves you feeling overwhelmed and isolated can result in trauma, even if it doesn’t involve physical harm. It’s not the objective circumstances that determine whether an event is traumatic, but your subjective emotional experience of the event. The more frightened and helpless you feel, the more likely you are to be traumatized. Trauma requires treatment, either through counseling or therapy or through trauma-oriented support programs, such as those offered by SCARS. counselingCounseling Counseling is the professional guidance of the individual by utilizing psychological methods especially in collecting case history data, using various techniques of the personal interview, and testing interests and aptitudes. A mental health counselor (MHC), or counselor, is a person who works with individuals and groups to promote optimum mental and emotional health. Such persons may help individuals deal with issues associated with addiction and substance abuse; family, parenting, and marital problems; stress management; self-esteem; and aging. They may also work with "Social Workers", "Psychiatrists", and "Psychologists". SCARS does not provide mental health counseling. or therapy, qualified support groupsSupport Groups In a support group, members provide each other with various types of help, usually nonprofessional and nonmaterial, for a particular shared, usually burdensome, characteristic, such as romance scams. Members with the same issues can come together for sharing coping strategies, to feel more empowered and for a sense of community. The help may take the form of providing and evaluating relevant information, relating personal experiences, listening to and accepting others' experiences, providing sympathetic understanding and establishing social networks. A support group may also work to inform the public or engage in advocacy. They can be supervised or not. SCARS support groups are moderated by the SCARS Team and or volunteers., or completely independent – on your own!

The SCARS Steps program is a complete program and is provided for the purpose of helping scam victims to overcome this experience. Throughout this SCARS Steps Program, we speak about issues and challenges that a victim may have and help guide them through their recovery. But each person is different and it is important to understand your own reasons for being vulnerable to being scammed.

After the trauma of being scammed, you need to take steps to recover and move on. This may be an alternative to counseling in the short term, but we still encourage you to seek out professional help & support. Throughout this SCARS Steps Program, we speak about issues, challenges, defects, or problems that a victim may have in a generalized way.

The SCARS GREEN BOOK will help you recover from your scam offline and it will always be there when you need it!

Get it here

SCARS SLATE BOOK - A Guide For Families & Friends Of Scam Victims

SCARS SLATE BOOK – Let Us Explain What Happened!

A Guide For Families & Friends Of Scam Victims


This SCARS Publishing book represents a complete guide to help the families and friends understand how these scams work and how to help the victim.

The SCARS Slate Book should be purchased by family and friends to better understand what happened to the victim and the traumatic impact on them. But it can also be shared by the victim so that they do not have to explain to family and friends about the scam. This publication is to help others to help Scam Victims to make it through this traumatic experience and recover.

Each person is different and it is important to understand how relationship scamsRelationship Scam A Relationship Scam is a one-to-one criminal act that involves a trust relationship and uses deception & manipulation to get a victim to give to the criminal something of value, such as money! Click here to learn more: What Is A Relationship Scam? work and why people are vulnerable; to being scammed, how they were lured in, then groomed and manipulated. This understanding is essential in helping them through the process of ending the scam and then on to recovery. The SCARS Slate Book will provide the information necessary to help support a victim through this process.

Get it here

SCARS RED BOOK - Your Personal Scam Evidence & Crime Record Organizer

Your Personal Scam Evidence & Crime Record Organizer


Helps you get and stay organized. This publication is to help Scam Victims organize their crime information. Complete this information before reporting to the police then bring this book with you

Before or after reporting to the police the RED BOOK gives you a dedicated tool to record all the essential facts of this crime. The Victim, the Scammers, the Money, and your Police interactions. Everything that really matters can be easily recorded for your immediate use and for the future!

As we have seen, money recovery/repayment programs can become available years after the scam ends and you need to keep all the details of this crime in case it is needed. We have also seen scammers being extradited to the U.S. and other countries, this will help in the event you testify or give statements, Additionally, this helps you have your information ready to qualify for victims’ benefits, compensation, or aid.

The Official SCARS RED BOOK is your way of recording all the important facts of this crime so that you do not lose essential information, Complete the RED BOOK then put it away with the confidence that you will have it if or when it is needed.

Get it here

SCARS BLUE BOOK - Survivor's Recovery Journal
SCARS LIME BOOK - Wisdom & Motivation for Scam Victims
SCARS CHERRY BOOK - A Guide To Understanding Your Fear
SCARS WORKBOOK - 8 Steps To Improvement
SCARS WORKBOOK - Understanding Self-Blame, Guilt, and Shame
100% of all profit goes to support FREE Scam Victims' Services

See all our books and motivational gifts for scam victims at Shop.AgainstScams.org

100% of all profit goes to help SCARS help more scam victims worldwide.

Your generous purchase allows us to maintain our scam avoidance, support, and recovery services. Please help SCARS and stand proud.

Go to Top