upworthy

fraud

Photo Credit: Canva

A scammer on the computer. A senior citizen falls for it.

Scam artists have gotten more advanced when it comes to diabolically tricking people out of their money, especially senior citizens. And now with cryptocurrency, which is confusing to many and completely accessible online, there's an added layer of concern for the most vulnerable.

Which is why, more than ever, people need to be on the lookout for swindlers. Luckily, some really good folks are stepping up. On the subreddit r/scams, there are 1.6 million weekly visitors; time and time again, they help alert people to perpetual fraud.

One bank teller posted, "You all saved my customer today" and then told a heroic story about an elderly customer attempting to deposit a check.

"I had a customer come in today and he had a cheque that he wanted to deposit," the bank teller wrote. "Super normal, no red flags. He asked about how long the hold will be. Still, no red flags. Since we're in Canada and we celebrate Victoria Day, the banks are closed on Monday. So, his 5 business day hold will take us to May 21."

banks, bank teller, elderly, senior citizens, scams A bank teller dispenses money at a bank. www.flickr.com

Here's where things took a turn. "I told him that and he said he needs at least $9000 released right away," the bank teller added. "Now I'm even more curious and I asked why. He said he needs 10% to send to his crypto account so he can withdraw the $90,000 USD that his crypto account has generated."

Luckily, this bank teller's antenna went up. "Skeptical, I asked what account, how he opened it, the website—the whole ordeal," the bank teller wrote. "To my surprise, he told me. He clicked on a FACEBOOK AD and deposited a couple of $100 back a few months ago and now it's generated to $90,000 USD. But in order to get the $90,000—he needs to deposit $9,000."

"Yeah, no. I told him he's being scammed, grabbed my phone, and showed him the numerous crypto scams posted on reddit," the bank teller added. "I said his biggest blessing is losing a couple of $100 and not thousands."

There are over one hundred comments on this thread alone. One pointed out: "We all have a blind spot. In reality, most of us over fifty are hesitant to listen to our family members and neighbors. Stubborn. We think we are so smart, and gotta maintain that street cred. It took a nurse I had never met to get my attention about a health issue. It may take a bank employee to open my eyes about something like this. Thank you for diving into his problem."

This person noted how refreshing it was to see that the customer, who had truly gotten their hopes up, actually listened to the teller: "The biggest surprise here is that he actually listened and was willing to believe he'd been scammed. We see so many horror stories about people sticking their heads in the sand and refusing to accept reality, it's such a nice change of pace."

There are so many other stories that run the gamut of scams across every platform. One person told a harrowing story of their mother who got defrauded out of her entire retirement fund. The thread has over 500 comments of suggestions, as well as communal support.

@droidsavvy

Some have no idea about these 🫡

The good news is there are ways to combat these fraudsters. First, it's important to know what to look for.

The National Council on Aging (NCOA) recently posted the top five scams targeting seniors. These include "The Grandparent Scam," in which someone impersonates a grandchild asking for help, scams that appear to be loans from reputable banks, "tech support scams" (which I have personally fallen for), government scams asking for private information like Social Security numbers, and one of the most upsetting—the romance scam.

"As more people turn to online dating, con artists are seizing the opportunity," NCOA's Jessica Johnson wrote. "Romance scammers create fake social media profiles and use them to gain trust and steal money. In some cases, these scammers may be (or pretend to be) overseas. They may ask their victims to pay for visas, medical emergencies, and travel expenses to come to the U.S."

Johnson adds that as of two years ago, these scams have totaled well over one billion dollars in loss.

-Dr. Regina Koepp gives tips on scammers. www.youtube.com, Dr. Regina Koepp

As for what you can do? First, know—and let those in your life know—that if you get scammed, don't be embarrassed. Have consistent conversations about how clever these scammers have become and how common they are. Advise anyone who might be vulnerable to never give out important information to someone emailing or calling for it.

If it happens, contact local police, banks, and the Federal Trade Commission. Adult Protective Services also has resources on how to get started.

The FTC also posted these helpful tips:

  1. "Never transfer or send money to anyone, no matter who they say they are, in response to an unexpected call or message. Even if they say it’s to 'protect it.'"
  2. "Hang up and verify. Hang up the phone and call the company or agency directly using a phone number or website you know is real. Don’t trust what an unexpected caller says, and never use the phone number in a computer security pop-up or an unexpected text or email."
  3. "Block unwanted calls. Learn about your call blocking options to stop many of these scammers before they reach you."

The topic gained extra attention last year with the film Thelma, in which actress June Squibb plays a woman on a mission to recover her scammed money (her methods are not recommended, but the film, based loosely on a true story, is aces).

June Squibb stars in the movie Thlema. www.youtube.com, Magnolia Pictures

Science

17 tips to avoid getting hacked that you might have forgotten—or never even knew

A few lessons from IT professionals about securing your personal data.

Canva

There are unsavory people interested in your information.

True
Mozilla

In 2009, Scott McGready stumbled on a massive phishing scam targeting his company's email server.

Thousands of emails bombarded the company in a short period of time. They all came from the same source, pretending to be someone or something they weren't in order to lure people into clicking on shady links and giving up their personal data.

"While investigating it, I stumbled upon the phisher's database which had [the] personal data of thousands of people," McGready says. "I was surprised how little effort was required on the fraudster's part to acquire such a trove of information."


This discovery sparked McGready's interest in information security and teaching others how to protect themselves from fraud. Since then, this journey has taken him from the U.K.'s National Trading Standards department to the documentary series "Secrets of the Scammers" to his own company and beyond.

Here are just a few lessons from McGready — and some other IT professionals — about securing your personal data:

data hacking, browsing, protection, financial

Is your information protected online?

Stomchak/Wikimedia Commons

1. Know there is a LOT of data about you online.

"Having data readily available online means that things like phishing emails can be automatically tailored to targets without much effort," McGready says.

But what does "data" really mean in this case? Um. Er. Pretty much everything. Even if we don't realize it. Something as simple as your basic browsing habits and location history can actually reveal a lot about you. Even if your name's not attached to it, a savvy social hacker could still figure something out.

2. Be aware that your friends may expose info about you — even if you're not on social media.

"We tend to share every detail of our lives on social media because we feel obliged to by peer pressure — whether that be adding your birthday to your Facebook profile because the website keeps asking for it," McGready says. But it's worse when your friend tags you in that photo from high school with your school mascot in the background and — oops. There goes another security question.

social media, data leak, Facebook, friends

Things don't always go as planned with technology.

Photo by Elisa Ventur on Unsplash

3. Pay attention so you can mitigate the risks (though probably not completely avoid them).

McGready recommends keeping your social media profiles as private as possible and asking your friends and family to do the same. "Even those that intentionally aren't on social media may be easily findable by their friends or family that share the 'dinner table selfie.'"

4. It's better to be proactive than wait until you're compromised.

"We hear about data leaks almost every week, it seems," McGready says. "The general public are no longer asking 'if' their data is compromised, but rather 'when.'"

This might sound scary. But it's also a good reminder to stay sharp.

public, risk, education, accounts

Do you know everyone that's using your computer?

Image via Pixabay.

5. Check the Facebook apps and third-party services that might have access to your account.

"It's worth checking what data you share with specific companies and only giving out the bare minimum in case of a data breach in the future," McGready explains.

For example: Does Bejeweled Blitz really need permission to access everything you've ever put on Facebook, to post on your behalf, and to spam your friends and family? It's not just annoying — it puts you at risk if that information leaks.

6. Take some time to get rid of those old accounts.

A clever hacker might still be able to figure out something through your iwasdefinitelyacool15yearold@aol.com email address. "Many of us, myself included, also have a large number of 'dormant accounts' on websites that we no longer use," McGready says. "I'd fully recommend logging into these accounts and changing all the profile information before deleting the account."

science, history, websites, companies

It's important to know what accounts are open in your name.

Photo from Daderot/Wikimedia Commons.

7. Don't feel bad if it happens to you. Even IT professionals fall for it!

Georgia Bullen, technology projects director for New America's Open Technology Institute, recounts how she was hacked:

"My password wasn't secure enough and so someone had built a program that was logging into not-secure-enough accounts and then spamming."

What she felt at the time is all too familiar for anyone who's been hacked: "Embarrassed, confused, and then really worried that someone else was going to click on something from me."

8. Be smart, pay attention, and know what you're getting into with any website or service you sign up for.

This bears repeating because a little awareness can make a big difference.

security, passwords, service, defense

What type of security for your accounts do you have?

Photo by Marcello Casal Jr/ABr/Wikimedia Commons.

9. Have a solid P@$w0rds plan.

Passwords are the Achilles' heel of the modern world — but there's a trick.

"It's totally possible [for hackers] to take one password, see where you've re-used it, and then get access to those accounts as well. And that's where the bigger danger happens," explains Harlo Holmes from the Freedom of the Press Foundation.

That's why, in general, passwords should be different for every website or service used, and consist of three random words, interspersed with special characters; a DiceWare password like "correct horse battery staple" is a good place to start.

Password managers can help out by creating unique passwords for you. Which leads to...

10. Use a password manager.

Password managers can generate strong, random passwords for you. And they keep track of all of your different passwords so you don't need to memorize them yourself.

All you need to do is remember one super-secure master password in order to unlock every other possible password combination. That way, says Bullen, you can't even make the mistake of verbally giving your password away because you genuinely don't know it yourself! (Unless it's your master password, in which case, ya know, don't do that.)

11. Set up two-factor authentication (2FA) for added security.

Safety is good, but a back-up plan is even better. 2FA sends a code to a device on your person just to make sure that the person logging in is really you. Even if your password does get compromised, the hacker probably doesn't have access to your smartphone, too. (Probably.)

Mozilla's Amira Dhalla explains how it works:

12. Consider using a separate email address — with a separate strong password — for important accounts like banking.

That way, even if you do use the same password elsewhere, hackers will have a harder time getting in to your important accounts. (Make sure this secondary email account has two-factor authentication, too!)

13. Be sure to hover over links before you click them.

"Links may look legitimate, but upon hovering, they actually redirect to a completely different place," McGready says. (Don't believe me? See what happens when you click on www.upworthy.com/definitely-not-an-upworthy-page.)

14. Always double-check the URL in the address bar. (But even that's not always safe.)

Ever notice that green padlock in your browser bar? It's a good sign! ... except when it's not. As McGready explains, "While it's true that this means your data is encrypted between your computer and the website itself, it doesn't legitimize the website."

routers, world wide web, computers, Wi-Fi

Using default passwords on the computer router can leave you vulnerable..

Photo by Michael Geiger on Unsplash

15. Secure your router.

It may seem harmless to use the default password for your router, but that can actually leave you vulnerable to hackers (there are even websites that can be used to find out different routers' default settings). And someone accessing your router can access pretty much your entire home network. So it's worth taking that small extra step of setting up a strong user name and password.

16. Be wary: These days, the internet is in everything from lightbulbs to baby diapers. Which is super cool! And bad.

McGready sees "the internet of things," or IoT, as the biggest online threat on the horizon. Even if you have worried about Amazon spying on you, you probably didn't consider who else could be spying on you through a vulnerable Wi-Fi or Bluetooth system built into your smart home. "The issue comes when these wireless chips are integrated by default on all products, whether the customer wants them or not," McGready explains.

17. Exercise a little extra caution.

It all boils down to the fact that humans are too trusting.

We trust that our friends aren't going to expose our address over Twitter. We trust that some disgruntled Angry Birds employee won't hijack our linked Facebook page because we didn't pay attention to permissions. We trust the green padlock in the browser bar that keeps our credit cards secure, even if the website taking that information wants to use it for a shady purpose.

Simply put, we trust that the internet is mostly good and that people are, too.

It's hard to solve a problem you can't see — which is why McGready is so passionate about teaching online safety.

"Show the public exactly what is possible and what they should be watching out for," McGready says. "It's one thing to tell someone that a scammer can send a text which appears to be from a legitimate company or a known person; it's another thing entirely to send a text to that person's phone which comes from 'Mum.'"

There's no "one weird trick" to protect us from the dangers of technology. But we can do our due diligence — as long as we know where to start.

This article originally appeared on 06.19.17

Pop Culture

Heads up! That call from a panicky relative may be a scammer voice clone.

The FTC is warning people to look out for the latest scam trend.

via Pexels

A man makes a phone call from prison.

One of the oldest frauds in the book is the “your loved one is in trouble” scam. Scammers call posing as a grandchild or loved one in distress who claims they’ve been kidnapped or are in jail. The scammer may also impersonate a nurse, police officer, lawyer or other authority figure representing the loved one.

The scammer claims that the loved one needs money wired to the fraudster immediately to bring them to safety.

The scam is effective because the victim is under pressure to get them money quickly, so they don’t have time to consider the fact that it may be a scam. All the while, they imagine the torment the loved one is going through. The urgency of the scam makes it much more likely that the victim will hand over the money.


The FTC is warning people that scammers have given this scam a new technological twist by faking the voice of the loved one by using voice cloning powered by artificial intelligence.

“Artificial intelligence is no longer a far-fetched idea out of a sci-fi movie,” the FTCs warning reads. “We're living with it, here and now. A scammer could use AI to clone the voice of your loved one. All he needs is a short audio clip of your family member's voice—which he could get from content posted online—and a voice-cloning program. When the scammer calls you, he’ll sound just like your loved one.”

All fraudsters need to clone someone’s voice realistically is a 30-second clip of audio that they can easily rip from Facebook, TikTok, podcasts, commercials or Instagram. The voice-generating software synthesizes what makes a person's voice sound unique and then finds similar voices by searching vast databases. This allows them to replicate someone’s voice in real-time to create a phone call that sounds authentic.

It’s terribly difficult to detect the scam because voice-cloning software has become increasingly accurate. As AI technology improves, avoiding being fooled by the scam will become harder.

scams, ftc, artificial intelligence

A scammer finds his next victim.

via Pexels

"It's terrifying," Hany Farid, a professor of digital forensics at University of California, Berkeley, told The Washington Post. "It's sort of the perfect storm ... [with] all the ingredients you need to create chaos."

FTC officials say that in 2022 Americans lost $8.8 billion to fraud, with imposter scams being the most common, and there’s usually no way to get the money back. Scammers usually demand payment through cryptocurrency, money wires, or gift cards, so tracing it is impossible.

The FTC wants people to think twice if they receive a phone call from a loved one in distress or someone claiming to be their representative, especially if they ask for money.

“Don’t trust the voice,” the FTC warning reads. “Call the person who supposedly contacted you and verify the story. Use a phone number you know is theirs. If you can’t reach your loved one, try to get in touch with them through another family member or their friends.”

If you are targeted by one of these voice clone scams, report it to the FTC immediately. You could prevent the next person from being scammed.

Family

5 ways you can escape the evil clutches of identity theft.

What do you do if someone else becomes you?

True
Ad Council + AICPA

Identity theft is a very real villain in the United States.

GIF from "The Avengers."


In fact, it has been for a long time.

The very first identity thieves operated IRL. They used a technique called "ghosting," where they would take on the identity by literally obtaining and using the real documents of a dead person or, in more extreme cases, murder their victims and live their lives.

By the 1960s, scammers would frequently call an unsuspecting stranger, tell them they had just won cash, and ask for their personal information in order to release their "winnings."

Once the '80s rolled around, the authorities were more vigilant and criminals had to resort to other dirty tactics — like literally going through your trash and looking for discarded paperwork with personal information (bank statements, pay stubs, bills, you name it).

Yet as technology has continued to advance, so have the powers of identity thieves.

GIF from "Guardians of the Galaxy."

Now, someone can manipulate all your information without even being in the same country as you.

Using spyware, phishing, or pharming techniques, these criminals can hack your personal records, prevent you from getting a job, or worse, take out a loan in your name — all from the comfort of their own computer.

This is probably not a huge surprise to you. In a recent survey by the AICPA, 21% of respondents said they experienced identity theft in the past year, while 50% said they expect it to happen to them in the coming year — not a good sign.

But don't fear too much! This evil can be defeated with a solid plan of attack.

GIF from "Deadpool."

We teamed up with David Almonte, a CPA and audit senior at Grant Thornton, to find ways to combat this new breed of criminal. When asked about them, David said: "They're not trying to make things too complicated because they don't have time for that. They want the easy victims. So I think our job is to educate the people that don't know the basics."

The evildoers won't know what hit 'em. Here are five ways that'll help save the day.

1. Establish an impenetrable shield.

GIF from "Captain America: The First Avenger."

To ensure your online safety, start by using solid, complex passwords (not the word "password") for all your online accounts and changing them up every once in a while. Just make sure you memorize them and never write them down. (Don't be that person who leaves passwords sticky-noted to the computer for the whole office to see.)

In fact, some go the extra mile and install added security measures such as text or email verification. If you're not sure how to do this, just contact your bank and they'll be happy to help you out.

2. Maximize your arsenal of information.

GIF from "Iron Man 2."

You have unprecedented access to all your personal information, so use that to your advantage. But where to start? Well, if you're just paying attention to this issue now, David says, "The most important thing you can do is to get your credit report. Make sure everything's on there."

Check out your bank statements regularly as well. If you have trouble keeping track, you can download a personal finance app to make it easier to see your accounts at a glance. When you're in control, nothing will get past you.

3. Outsmart the enemy with a clever strategy.

GIF from "Guardians of the Galaxy."

Hackers aren't the only ones allowed to have tricks up their sleeves. Stay out of sight and make yourself harder to track — request paperless statements, use cash and checks more often, or even limit your online transactions.

If you're a heavy card user though, David suggests reaching for your credit card rather than your debit card when you're out on the town.

"With your credit card, you're usually liable for $50 of fraudulent charges, and most credit cards will waive that. ... If someone steals your debit card and ... say you have $5,000 in your account and they spend all $5,000, whether or not you're going to get that back, you're out $5,000 until it gets handled."

4. Set up emergency signals.

GIF from "Batman v. Superman: Dawn of Justice."

This is your last line of defense. Since our phones are always by our side, best to make the most out of it. Customize your security settings so you can monitor your accounts much better through apps, SMS notifications, or any other mobile options they may offer.

"Set up the free alerts, get the apps, everything!" adds David. You want to be contacted right away whenever a certain amount gets charged to your card.

Sadly, things can still go wrong and you could find yourself compromised. If that happens...

5. Don’t hesitate to call in reinforcements.

GIF from "Avengers: Age of Ultron."

You are never alone, my friend. And David knows that. "If you do end up getting your identity stolen or you think it got stolen, freeze all your credit cards, contact the Federal Trade Commission, your local police, and your credit card companies. The worst thing you can do is do nothing."

No matter what's thrown your way, the moment something feels wrong, you have to take action. After all, that's what superheroes always do, right?

Have no fear — you got this.