Antivirus Scam

Anti-Scam FAQ: What Is An Antivirus Scam? Answer: People are cold called and told they have a problem with their computer which, for a fee, can be fixed. Alternatively, the victim might initiate the contact in response to an online advert or prompt claiming that their device has been infected with a virus. Other computer scam methods involve offering bogus virus protection or warranties

2021-06-22T11:10:31-04:00June 22nd, 2021|Categories: |0 Comments

One Ring Call Phone Scam / Wangiri Scam

Anti-Scam FAQ: What Is A One Ring/Wangiri Scam? Answer: When your phone rings only once, late at night, you may be tempted to call back. But the call may be from a foreign country with an area code that looks deceptively like it's in the U.S. If you dial back, international calling fees may wind up on your bill. Such cons are also known by the Japanese term "Wangiri."

2021-06-18T12:38:53-04:00June 18th, 2021|Categories: |0 Comments

Nanny/Care Giver Scam

Anti-Scam FAQ: What Is A Nanny/Care Giver Scam? Answer: Sometimes scammers post fake job listings for nannies or caregivers. They offer a job but ask you to buy supplies or other equipment upfront. They may send you a post-dated check and ask you to purchase gift cards or transfer money to a vendor. The check inevitably bounces.

2021-06-18T12:27:10-04:00June 18th, 2021|Categories: |0 Comments

Mexico Collect Call Scam

Anti-Scam FAQ: What Is A Mexican Collect Call Scam? Answer: Operators say you have a collect call from a family member in Mexico, sometimes even providing the family member's name. You accept the call, but it's from a stranger who offers no information about family members. You end up being billed regardless.

2021-06-18T12:28:33-04:00June 18th, 2021|Categories: |0 Comments

Rental Car Scams

Anti-Scam FAQ: What Is A Rental Car Scam? Answer: Scammers are posing as rental car companies, setting up their own websites, and advertising fake customer service phone numbers, all to convince travelers they’re legit. Then, they’re asking people to pre-pay for the rental — with a gift card or prepaid debit card. To avoid rental car scammers driving off with your money: Research the rental car company by searching for the name of the company [...]

2021-06-18T11:35:57-04:00June 18th, 2021|Categories: |0 Comments

Lottery and Sweepstakes Scams

Anti-Scam FAQ: What Is A Lottery and Sweepstakes Scam? Answer: Prize scammers try to get your money or personal information through fake lotteries, sweepstakes, or other contests. Many claim that you’ve won a prize but must pay a fee to collect it. Others require you to provide personal information to enter a “contest.” These scams may reach you by postal mail, email, phone call, robocall, or text message.

2021-06-18T11:32:59-04:00June 18th, 2021|Categories: |0 Comments

Census-Related Fraud

Anti-Scam FAQ: What Is A Census-Related Fraud/Scam Answer: Census scams happen when someone pretends to work for the Census Bureau to steal your personal information. Use this information to learn how these scams work, and protect yourself against them. Some scam artists may pretend to be work for the Census Bureau. They'll try to collect your personal information to use for fraud or to steal your identity. These scam artists may send you letters [...]

2021-06-18T11:32:11-04:00June 16th, 2021|Categories: |0 Comments

Telephone Scams

Anti-Scam FAQ: What Is A Telephone Scam? Answer: Telephone scammers try to steal your money or personal information. Scams may come through phone calls from real people, robocalls, or text messages. Callers often make false promises, such as opportunities to buy products, invest your money, or receive free product trials. They may also offer you money through free grants and lotteries. Some scammers may call with threats of jail or lawsuits if you don’t [...]

2021-06-16T16:34:00-04:00June 16th, 2021|Categories: |0 Comments


Anti-Scam FAQ: What Is Tabnapping? Answer: Tabnapping is a type of phishing scam that fraudsters use to get people’s personal information. Tabnapping targets people who keep multiple tabs open in their browser, often for long periods of time. The fraudsters then use JavaScript to change the contents and label of an open, but not active, tab to resemble the log-in screen of a bank, email provider or online shopping store. When a user clicks [...]

Government Impersonator Scams

Anti-Scam FAQ: What Is A Government Impersonator Scam? Answer: Scammers often disguise themselves as people working for the government and might pretend to offer help. But, really, they’re after your money or personal information. Government imposters may call to “verify your Social Security number,” or say your Social Security number or Medicare benefits have been “suspended” due to a mix-up. Scammers may say your tax returns must be done differently because of a name [...]

2021-06-10T09:06:15-04:00June 10th, 2021|Categories: , |0 Comments


Anti-Scam FAQ: What Is Stalkerware Answer: Stalkerware apps can track your browsing history so if you suspect that stalkerware has been installed on your device DO NOT USE IT to research support services such as advocacy, shelter, court information or emergency services. Please note that anything you view may be revealed to the person monitoring you. Consider the following steps for safety: Notify someone you trust by word of mouth that you suspect stalkerware [...]

Understanding Denial-of-Service Attacks

Anti-Scam FAQ: What is a denial-of-service attack? Answer: A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network. A denial-of-service condition is accomplished by flooding the targeted host or network with traffic until the [...]

2021-06-02T06:09:55-04:00June 2nd, 2021|Categories: |0 Comments

Understanding Hidden Threats: Rootkits and Botnets

Anti-Scam FAQ: What are Rootkits and Botnets? Answer: A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it. Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may [...]

2021-06-02T06:05:52-04:00June 2nd, 2021|Categories: |0 Comments

Understanding Bluetooth Technology

Anti-Scam FAQ: What is Bluetooth? Answer: Bluetooth technology allows devices to communicate with each other without cables or wires. Bluetooth relies on short-range radio frequency, and any device that incorporates the technology can communicate as long as it is within the required distance. The technology is often used to allow two different types of devices to communicate with each other. It is an electronics "standard," which means that manufacturers that want to include this feature [...]

Cybersecurity for Electronic Devices

Anti-Scam FAQ: Why does cybersecurity extend beyond computers? Answer: Computers include more than laptops and desktops. Many electronic devices are computers—from cell phones and tablets to video games and car navigation systems. While computers provide increased features and functionality, they also introduce new risks. Attackers may be able to take advantage of technological advancements to target devices previously considered "safe." For example, an attacker may be able to infect your cell phone with a [...]

2021-06-02T05:58:54-04:00June 2nd, 2021|Categories: |0 Comments

Brute Force Attacks Conducted by Cyber Criminals

Anti-Scam FAQ: What Are Brute Force Attack Answer: According to information derived from FBI investigations, malicious cyber actors are increasingly using a style of brute force attack known as password spraying against organizations in the United States and abroad. On February 2018, the Department of Justice in the Southern District of New York, indicted nine Iranian nationals, who were associated with the Mabna Institute, for computer intrusion offenses related to activity described in this [...]

2021-06-02T05:56:13-04:00June 2nd, 2021|Categories: |0 Comments