SCARS|RSN™ Guides

RSN™ Guide: Victim Bashing or Blaming

RSN™ Guide: Victim Bashing or Blaming Victim Blaming or Bashing - The SCARS View Victim blaming occurs when the victim of a crime or any wrongful act is held entirely or partially at fault for the harm that befell them. The study of Victimology seeks to mitigate the perception of victims as responsible. There is a greater tendency to blame victims of rape or romance scams than victims of robbery if victims and perpetrators know each other. Hey, Don't Blame The Victim! [...]

RSN™ Guide: Romance Scam Delusion

RSN™ Guide: Romance Scam Delusion DISCLAIMER: The following is intended for informational and educational entertainment purposes only, and is not intended to be used in any way to diagnose a mental illness. All such diagnosis must be performed by a licensed doctor or psychologist. If you feel any portion of this may be applicable to you, consult a licensed doctor immediately for proper evaluation and diagnosis. de·lu·sion dəˈlo͞oZHən/ noun An idiosyncratic belief or impression that [...]

SCARS|RSN™ Guide: Legal Risks?

SCARS|RSN™ Guide: Legal Risks? A Word About Legal Risks - Do Victims Fear Legal Risks?   LEGAL DISCLAIMER: We Cannot Give You Legal Advice. We Can Only Share Our Opinion The following is an expression of non-legal opinion. You should always consult a licensed attorney regarding all matters of law, their interpretation, and to obtain a proper legal opinion. This article is for purely educational and entertainment purposes and does not represent a legal [...]

RSN™ Guide: Ways To Avoid Being Hacked

RSN™ Guide: Ways To Avoid Being Hacked From BusinessInsider Everything that connects to the Internet can get hacked. But there are several things you can do to protect yourself and your data from an attack. Here are a few tips that will mitigate the risk of getting your personal data stolen. Be Suspicious Of Emails A lot of cyberattacks are launched through simple malicious email campaigns. Email is a wonderful communication platform because you can [...]

Leave The Real Person Alone! – SCARS|RSN™ Guide

SCARS|RSN™ Guide: Leave The Real Person Alone! We Are Constantly Asked By Victims To Identify The Person In The Photo That They Fell In Love With They want to save them, or tell them how they feel, or tell them their photo is being used by scammers. Trust us, they already know they photos have been stolen by scammers! It Doesn't Matter Who He Or She Is, His Or Her Photo Was Stolen By Scammers [...]

Financial Assistance & Crime Victim Compensation – A SCARS|RSN™ Guide

SCARS|RSN™ Guide: Financial Assistance & Crime Victim Compensation For U.S.A. Crime Victims ONLY - Canada Has Similar Programs - International Residents Check With Your Own Country To See What Crime Victims’ Assistance Is Available Yes! There Is Financial Assistance Available! SCARS is a registered Crime Victims’ Assistance & Support Organization and a member of VictimConnect a service of the National Center for Victims of Crime of the United States Department of Justice. Every state has [...]

SCARS|RSN™ Guide: What Can You Expect After A Scam [Infographic]

SCARS|RSN™ Guide: What Can You Expect After A Scam [Infographic] Immediately After A Scam, You Will Have Questions Here is our After-Scam Reality Check! It is blunt but to the point - you need proper expectations to move forward with your recovery. Based upon our 27 Years of Experience this is what you should expect: You Have Been Scammed And You Can’t Undo It You Must Report The Crime To Your Local Police Even Though [...]

RSN™ Guide: Rescamming

RSN™ Guide: Rescamming Yes, it is a thing Did you know that statistically, as a victim of a scam that you have a ONE IN SEVEN chance of being a victim again? Most victims will shut down after a scam - not trusting anyone. However, for most the same tendencies that created the opportunity for the scam remains. You will still be too trusting even while you tell yourself that you trust no one. Most [...]

RSN™ Guide: Scammer Technique – Cold Reading

RSN™ Guide: Scammer Technique - Cold Reading Cold Reading Is A Scam Information Gathering Technique! Cold reading is a set of techniques used by mentalists, psychics, fortune-tellers, mediums, illusionists (readers), and scam artists to imply that the reader knows much more about the person than the reader actually does. Without prior knowledge, a practiced cold-reader can quickly obtain a great deal of information by analyzing the person's body language, age, clothing or fashion, hairstyle, gender, [...]

RSN™ Guide: Small Business Cybersecurity

RSN™ Guide: Small Business Cybersecurity YOUR SHARED RESPONSIBILITY Be More Vigilant Online For small business owners, business growth is the name of the game. It’s important to establish a cybersecurity protocol early that can grow with your business to protect your most critical assets. Not only do businesses rely on technology to perform daily functions, but the Internet provides easy ways for businesses to stay connected and informed. However, with these increased conveniences comes increased [...]

RSN™ Guide: Scammer Fake Profiles

RSN™ Guide: Scammer Fake Profiles A site visitor recently asked about the methods scammers use for fake profiles. A Typical Fake Profiles Will Have: Are all the photos stolen? How do they choose which photos to steal? Are the names all made up? Do they use different names? FAKE PHOTOS Let's talk about the photos used on fake profiles first. They are almost always stolen photos for the African scammers - the exception is when [...]

RSN™ Guide: Knowing Your Enemy

RSN™ Guide: Knowing Your Enemy In order to effectively fight an enemy, you have to understand them. We monitor the media in Western Africa for these insights - how scammers live, how they think, and their tricks and techniques. Here is a guide that was published to show new scammers how to get started: Becoming A Yahoo Boy in Nigeria: Easy Steps So you’ve searched our cyberspace, looking for how to become a yahoo boy [...]

RSN™ Guide: A to Z of Online Fraud

RSN™ Guide: A to Z of Online Fraud Most people now have access to the internet. We use our home computers, phones, and other devices to shop or bank online, keep in touch with friends and relatives, and lots of other everyday activities because we find it convenient and easy. But the same is also true of fraudsters. With all the convenience the internet brings, it is important to be aware of potential online risks. [...]

RSN™ Guide: Email Phishing Scams

RSN™ Guide: Email Phishing Scams Email scams, also called phishing scams, are when a cyber scammer contacts you out of the blue and tries to tricks you into clicking a dangerous link or filling in your personal information or bank details. Portions from Which.co.uk (copyrights acknowledged) What Is A Phishing Scam? Phishing is when a cybercriminal contacts you out of the blue (usually by email) and convinces you to hand over your personal information or [...]

RSN™ Guide: Anti-scam Hate Groups and Vigilantes

RSN™ Guide: Anti-scam Hate Groups and Vigilantes Let's talk about Anti-scam Hate Groups and Vigilantes Vigilantees tend to be the ones that create the Anti-scam Hate groups. Anti-scam Hate Group is a group, typically lead by a victim that has retained their range and anger against scammers and turned this into a kind of mania. THESE ARE THE TRUE VIGILANTES Vigilantes are those victims that are profoundly and adversely affected by the aftermath of the [...]

RSN™ Guide: Socially Engineered Scams

RSN™ Guide: Socially Engineered Scams You have probably heard that term before. What is it? Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. It is a type of confidence trick (scam) for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. [...]

Translate / Traducir »