Anti-Scam FAQ: What Is An Antivirus Scam? Answer: People are cold called and told they have a problem with their computer which, for a fee, can be fixed. Alternatively, the victim might initiate the contact in response to an online advert or prompt claiming that their device has been infected with a virus. Other computer scam methods involve offering bogus virus protection or warranties
Anti-Scam FAQ: What Is A One Ring/Wangiri Scam? Answer: When your phone rings only once, late at night, you may be tempted to call back. But the call may be from a foreign country with an area code that looks deceptively like it's in the U.S. If you dial back, international calling fees may wind up on your bill. Such cons are also known by the Japanese term "Wangiri."
Anti-Scam FAQ: What Is A Nanny/Care Giver Scam? Answer: Sometimes scammers post fake job listings for nannies or caregivers. They offer a job but ask you to buy supplies or other equipment upfront. They may send you a post-dated check and ask you to purchase gift cards or transfer money to a vendor. The check inevitably bounces.
Anti-Scam FAQ: What Is A Mexican Collect Call Scam? Answer: Operators say you have a collect call from a family member in Mexico, sometimes even providing the family member's name. You accept the call, but it's from a stranger who offers no information about family members. You end up being billed regardless.
Anti-Scam FAQ: What Is A Rental Car Scam? Answer: Scammers are posing as rental car companies, setting up their own websites, and advertising fake customer service phone numbers, all to convince travelers they’re legit. Then, they’re asking people to pre-pay for the rental — with a gift card or prepaid debit card. To avoid rental car scammers driving off with your money: Research the rental car company by searching for the name of the company [...]
Anti-Scam FAQ: What Is A Lottery and Sweepstakes Scam? Answer: Prize scammers try to get your money or personal information through fake lotteries, sweepstakes, or other contests. Many claim that you’ve won a prize but must pay a fee to collect it. Others require you to provide personal information to enter a “contest.” These scams may reach you by postal mail, email, phone call, robocall, or text message.
Anti-Scam FAQ: What Is A Census-Related Fraud/Scam Answer: Census scams happen when someone pretends to work for the Census Bureau to steal your personal information. Use this information to learn how these scams work, and protect yourself against them. Some scam artists may pretend to be work for the Census Bureau. They'll try to collect your personal information to use for fraud or to steal your identity. These scam artists may send you letters [...]
Anti-Scam FAQ: What Is A Telephone Scam? Answer: Telephone scammers try to steal your money or personal information. Scams may come through phone calls from real people, robocalls, or text messages. Callers often make false promises, such as opportunities to buy products, invest your money, or receive free product trials. They may also offer you money through free grants and lotteries. Some scammers may call with threats of jail or lawsuits if you don’t [...]
Anti-Scam FAQ: What Is A Government Impersonator Scam? Answer: Scammers often disguise themselves as people working for the government and might pretend to offer help. But, really, they’re after your money or personal information. Government imposters may call to “verify your Social Security number,” or say your Social Security number or Medicare benefits have been “suspended” due to a mix-up. Scammers may say your tax returns must be done differently because of a name [...]
Anti-Scam FAQ: What Is Stalkerware Answer: Stalkerware apps can track your browsing history so if you suspect that stalkerware has been installed on your device DO NOT USE IT to research support services such as advocacy, shelter, court information or emergency services. Please note that anything you view may be revealed to the person monitoring you. Consider the following steps for safety: Notify someone you trust by word of mouth that you suspect stalkerware [...]
Anti-Scam FAQ: What is a denial-of-service attack? Answer: A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network. A denial-of-service condition is accomplished by flooding the targeted host or network with traffic until the [...]
Anti-Scam FAQ: What are Rootkits and Botnets? Answer: A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it. Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may [...]
Anti-Scam FAQ: What is Bluetooth? Answer: Bluetooth technology allows devices to communicate with each other without cables or wires. Bluetooth relies on short-range radio frequency, and any device that incorporates the technology can communicate as long as it is within the required distance. The technology is often used to allow two different types of devices to communicate with each other. It is an electronics "standard," which means that manufacturers that want to include this feature [...]
Anti-Scam FAQ: Why does cybersecurity extend beyond computers? Answer: Computers include more than laptops and desktops. Many electronic devices are computers—from cell phones and tablets to video games and car navigation systems. While computers provide increased features and functionality, they also introduce new risks. Attackers may be able to take advantage of technological advancements to target devices previously considered "safe." For example, an attacker may be able to infect your cell phone with a [...]
Anti-Scam FAQ: What Are Brute Force Attack Answer: According to information derived from FBI investigations, malicious cyber actors are increasingly using a style of brute force attack known as password spraying against organizations in the United States and abroad. On February 2018, the Department of Justice in the Southern District of New York, indicted nine Iranian nationals, who were associated with the Mabna Institute, for computer intrusion offenses related to activity described in this [...]