Natural Disasters & Storm Scams & Scammers™

Home/4 - SCAM & CYBERCRIME TYPES/Natural Disasters & Storm Scams & Scammers™

SCARS|RSN™ Guide: Natural Disaster Frauds & Scams

SCARS|RSN™ Guide: Natural Disaster Frauds & Scams As Another Major Hurricane Approaches The Department Of Justice Reminds The Public To Be Aware Of Fraud And Report It To The National Center For Disaster Fraud The Department of Justice established the National Center for Disaster Fraud (NCDF) in the wake of Hurricane Katrina, when billions of dollars in federal disaster relief poured into the Gulf Coast region, which opened opportunities for criminals to exploit people during [...]

RSN™ Scam Warning: Charity Scams

RSN™ Scam Warning: Charity Scams FROM ACCC’s Scamwatch Scammers are increasingly using fake charities or impersonating real charities to take advantage of people’s generosity and compassion, with losses reported to the ACCC’s Scamwatch increasing steadily over the past four years. This week is Charity Fraud Awareness Week and Scamwatch is warning people to watch out for fake charities and offering some quick and easy precautions to take to ensure their money goes towards a legitimate [...]

SCARS|RSN™ Anti-Scam Tips: Avoiding Natural Disaster Fraud

SCARS|RSN™ Anti-Scam Tips: Avoiding Natural Disaster Fraud Tips on Avoiding Fraudulent Charitable Contribution Schemes The National Center for Disaster Fraud reminds the public to be aware of and report any instances of alleged fraudulent activity related to relief operations and funding for victims. Unfortunately, criminals can exploit disasters, such as Hurricane Harvey, for their own gain by sending fraudulent communications through email or social media and by creating phony websites designed to solicit contributions. Tips [...]

SCARS|RSN Guide: Socially Engineered / Social Engineering Scams

SCARS|RSN™ Guide: Socially Engineered / Social Engineering Scams You Have Probably Heard That Term "Social Engineering' Before, But What Is It?   Social Engineering Is ... Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. It is a type of confidence trick (scam) for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that [...]