ReportWire

Tag: scammers

  • I Fell for a $1.25 Million Scam — Now MrBeast Is Helping Me Hunt Down the Scammers | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    This is hard to admit, but I got scammed out of $1.25 million.

    The money is gone, and I can’t get it back. But instead of hiding, I’ve decided to share my story. My recent post on X about the $1.25 million scam went viral with more than 4 million views and thousands of reposts and comments.

    MrBeast even chimed in that he would give a $100,000 reward to anyone who could help track down the scammers.

    Now that I’ve had even more time to process the situation, I think it’s time to share the lessons I’ve learned from my $1.25 million mistake.

    How it began

    A few years ago, I donated $1.2 million to MrBeast’s #TeamSeas campaign to help clean up the oceans. After the donation, I was invited to spend a few days with Jimmy (MrBeast) and his team.

    So, when they reached out to me again for a donation to MrBeast’s Team Water campaign, I naturally wanted to help. During the discussion, we even talked about planning another meet-up.

    A few weeks after I donated $1 million to the project, I was added to what looked like a private group text with other major donors; it didn’t feel out of place at all. In fact, it seemed like the natural next step.

    The group looked legitimate. The names were impressive: Mark Rober, Shopify’s Tobi Lütke, Stake’s Ed Craven, Adin Ross. There was banter, casual voice notes and even more talk about the donor trip. It all lined up with what I’d been expecting — and I felt like I was in the “cool crowd.”

    Then came the pitch: a crypto investment tied to a major exchange. Everyone in the group “joined.” I didn’t want to be the outsider. So I wired the money. $1.25 million.

    Later, I checked in with the real Jimmy and felt my stomach drop. The group text was fake. My money was gone.

    Related: The 3 Biggest Mistakes That Made Me a Better Entrepreneur

    Lesson 1: Don’t make big decisions when you’re distracted

    When the scam was unfolding, I was away at a retreat that I’d been planning all year. This was terrible timing for me, but perfect for the scammers.

    I was relaxed and in the completely wrong headspace for any major decisions. My guard was down, and I was the perfect target.

    Having reviewed the texts afterward, I see several red flags that would have given me pause any other day. However, I was distracted and made a rash decision.

    Tip: Don’t make major decisions when you’re distracted, traveling or emotionally charged. Give yourself the space and energy to sit with the choices and only make a decision with a clear head.

    Lesson 2: Listen to reality, not the story you’re telling yourself

    When I was added to the text group, I honestly wanted it to be real. I’d talked with MrBeast’s team previously about planning a trip, and my brain connected the dots, telling me this was all part of the plan.

    This also had me overlooking red flags. I didn’t verify the phone numbers, and I didn’t double-check anything. I trusted what I wanted to be true instead of what the evidence showed. I was naive, and it cost me $1.25 million.

    Entrepreneurs make this same mistake all the time. We fall in love with our product, our marketing strategy or our “next” big idea. When our customers and data tell us otherwise, we often struggle to accept that reality and continue pushing what we want instead of what is right.

    Tip: Don’t fall in love with the story you tell yourself. Trust the data, trust what your customers are telling you, and be willing to adjust or pivot.

    Lesson 3: Don’t be afraid of mistakes — share them

    This was easily the most embarrassing mistake of my life. I’m a successful entrepreneur, and I made more than $50 million before 30 — being scammed was not supposed to happen to me.

    But, it did.

    The easiest way to deal with this mistake would be to hide it. But, I didn’t.

    Instead, I shared it. First with my family and close friends, then publicly online. The responses ranged from “idiot” to “martyr,” but overwhelmingly, people appreciated the honesty. Some even admitted they’d been scammed too, but had never told anyone.

    And then something unexpected happened: MrBeast himself spoke up. He offered a $100,000 reward for credible information leading to the scammers.

    Sharing reframed the story. From personal embarrassment to a community problem worth solving.

    Tip: Don’t hide from your mistakes. Own them, talk about them, and turn them into lessons others can learn from.

    Related: Beware of SEO Scammers — Here’s How to Spot and Avoid Mediocre SEO Agencies

    Final thoughts

    I’ll never see the $1.25 million I lost again. But I can use it as the most expensive learning experience of my life.

    If you take nothing else from my story, take these:

    1. Don’t make important decisions while distracted.
    2. If it’s too good to be true, it probably is.
    3. Don’t be afraid to talk about your mistakes.

    If you’re curious about how this scam actually played out, I’ve made everything public. On Great.com, we’ve posted the full chat logs, the wallet addresses and even the phone numbers tied to the scammers. You can see exactly what I saw — and if you spot something that could help track them down, you could earn the $100,000 reward from MrBeast.

    This is hard to admit, but I got scammed out of $1.25 million.

    The money is gone, and I can’t get it back. But instead of hiding, I’ve decided to share my story. My recent post on X about the $1.25 million scam went viral with more than 4 million views and thousands of reposts and comments.

    MrBeast even chimed in that he would give a $100,000 reward to anyone who could help track down the scammers.

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    Erik Bergman

    Source link

  • Snapchat is rolling out new safety tools aimed at protecting teens from sextortion

    Snapchat is rolling out new safety tools aimed at protecting teens from sextortion

    Snapchat is working to make it harder for teenagers to be contacted on the app by people they don’t know, its latest effort to stop the sexual and financial exploitation scam known as sextortion.The company on Tuesday announced a set of new safety features, including expanded warning pop-ups that appear when a teen receives a message from someone they don’t share mutual friends with or have in their contacts. Now, teens will also receive a warning message if they receive a chat from a user who has been blocked or reported by others or who is from a region where the teen’s other contacts aren’t located, “signs that the person may be a scammer,” Snapchat said in a blog post Tuesday.Related video above: FBI warns of growing sextortion threat targeting young peopleAnd Snapchat will now prevent the delivery of friend requests for teens to or from an account that they don’t share mutual friends with that is also located in regions often associated with scammers.In addition to expanding Snapchat’s broader suite of youth safety measures, the new features are aimed specifically at preventing financial sextortion, a worrying and growing type of scam across social media where bad actors gain the trust of young users, convince them to send sexual or explicit photos and then demand payment in exchange for keeping the pictures a secret.”These features were designed to better protect teens from potential online harms and to enhance the real-friend connections that make Snapchat so unique,” Snap’s Global Head of Platform Safety Jacqueline Beauchere said in an exclusive statement to CNN ahead of the announcement.Video below: FBI agent shares tips for parents to prevent sextortionLaw enforcement officials have in recent years warned of an uptick in online sextortion scams, in which bad actors, typically located overseas, target children and teens, often with profiles that appear to belong to friendly fellow teenagers. In some cases, sextortion has resulted in suicides.Meta in April also announced new features aimed at combating sextortion, including informing users when they’ve interacted with someone who engaged in financial sextortion. And the chief executives of Meta and Snap, along with other social media leaders, were called to testify earlier this year in a Senate subcommittee hearing about their efforts to protect young people from online exploitation.Also among Snapchat’s announcements on Tuesday are improvements to the app’s blocking tools, which will prevent users from simply creating new accounts to get around a block. Now, when a user blocks another account, any new accounts created on the same device will also automatically be blocked.Snapchat is also introducing more frequent reminders to all users, including teens, about their location settings on the app’s “Snap Map” feature, which is toggled off by default but which users can update to share their location live with friends. The company said it will make it possible for users to update their location settings, remove their location from the map and customize which friends they share their location with – all in one spot on the app.The updates build on Snapchat’s existing teen safety features, which include a “Family Center” where parents can supervise the behavior of 13- to 17-year-old users, and mechanisms for removing age-inappropriate content.Editor’s Note: If you or someone you know is struggling with suicidal thoughts or mental health matters, please call the National Suicide Prevention Lifeline at 988 (or 800-273-8255) to connect with a trained counselor or visit the NSPL site.

    Snapchat is working to make it harder for teenagers to be contacted on the app by people they don’t know, its latest effort to stop the sexual and financial exploitation scam known as sextortion.

    The company on Tuesday announced a set of new safety features, including expanded warning pop-ups that appear when a teen receives a message from someone they don’t share mutual friends with or have in their contacts. Now, teens will also receive a warning message if they receive a chat from a user who has been blocked or reported by others or who is from a region where the teen’s other contacts aren’t located, “signs that the person may be a scammer,” Snapchat said in a blog post Tuesday.

    Related video above: FBI warns of growing sextortion threat targeting young people

    And Snapchat will now prevent the delivery of friend requests for teens to or from an account that they don’t share mutual friends with that is also located in regions often associated with scammers.

    In addition to expanding Snapchat’s broader suite of youth safety measures, the new features are aimed specifically at preventing financial sextortion, a worrying and growing type of scam across social media where bad actors gain the trust of young users, convince them to send sexual or explicit photos and then demand payment in exchange for keeping the pictures a secret.

    “These features were designed to better protect teens from potential online harms and to enhance the real-friend connections that make Snapchat so unique,” Snap’s Global Head of Platform Safety Jacqueline Beauchere said in an exclusive statement to CNN ahead of the announcement.

    Video below: FBI agent shares tips for parents to prevent sextortion

    Law enforcement officials have in recent years warned of an uptick in online sextortion scams, in which bad actors, typically located overseas, target children and teens, often with profiles that appear to belong to friendly fellow teenagers. In some cases, sextortion has resulted in suicides.

    Meta in April also announced new features aimed at combating sextortion, including informing users when they’ve interacted with someone who engaged in financial sextortion. And the chief executives of Meta and Snap, along with other social media leaders, were called to testify earlier this year in a Senate subcommittee hearing about their efforts to protect young people from online exploitation.

    Also among Snapchat’s announcements on Tuesday are improvements to the app’s blocking tools, which will prevent users from simply creating new accounts to get around a block. Now, when a user blocks another account, any new accounts created on the same device will also automatically be blocked.

    Snapchat is also introducing more frequent reminders to all users, including teens, about their location settings on the app’s “Snap Map” feature, which is toggled off by default but which users can update to share their location live with friends. The company said it will make it possible for users to update their location settings, remove their location from the map and customize which friends they share their location with – all in one spot on the app.

    The updates build on Snapchat’s existing teen safety features, which include a “Family Center” where parents can supervise the behavior of 13- to 17-year-old users, and mechanisms for removing age-inappropriate content.

    Editor’s Note: If you or someone you know is struggling with suicidal thoughts or mental health matters, please call the National Suicide Prevention Lifeline at 988 (or 800-273-8255) to connect with a trained counselor or visit the NSPL site.

    Source link

  • Pennsylvania couple loses over $30,000 to scammers pretending to be their child

    Pennsylvania couple loses over $30,000 to scammers pretending to be their child

    WARWICK TWP., Pennsylvania — Police in Bucks County are investigating after a couple was robbed of over $30,000 by scammers.

    It happened Saturday at a home in the Hidden Ponds neighborhood of Warwick Township, Pennsylvania.

    The husband and wife spoke with ABC Philadelphia affiliate WPVI, describing what happened, but asked not to be identified.

    They say their goal is to potentially save someone else from becoming a victim.

    “We never thought this could happen to us. We know better, we know better, we know better,” the woman said. “If we can save anyone from going through this, that’s why we decided to do this.”

    The incident began with a frantic phone call from a sobbing woman claiming to be the couple’s daughter.

    Officials say scammers are getting more sophisticated and manipulative.

    “We’re parents, we know our child, we know the sound of her voice, we know her voice patterns, and we know her cry, and I swear to you that sobbing sounded just like my child,” the woman said.

    The couple was then told by a person claiming to be a police officer that their adult daughter had been arrested for a violent crash involving their son-in-law and grandkids. The scammer said the crash ended up killing a pregnant woman’s baby in the other vehicle. The scammers told the couple their daughters phone had been confiscated as evidence so they could not call her. The couple was also told their daughter did not want them to contact other family members as she wanted to do that herself, later.

    The couple says a second call came soon after, from a so-called “court-appointed attorney.”

    The “attorney” said thousands of dollars would be needed to bail their daughter out of jail.

    Ultimately, the couple turned over roughly $34,000 to the scammers via so-called couriers who came right to their home, once in the morning and once in the afternoon. The couple handed over around $17,000 each time.

    “I can’t even begin to explain how devastating and excruciating this is,” the woman said.

    She said soon after they’d handed over the money, they got a call from their son-in-law and knew they’d been scammed. That’s when they called the police.

    Police are now asking residents of the Hidden Pond, Warwick Estates, and Robinson Farms neighborhoods to check surveillance video on the following dates and look for the listed vehicles:

    1. April 6, 2024, 10 a.m. to 11 a.m.: An older model red Nissan Rogue or Murano
    2. April 6, 2024, 2 p.m. to 3 p.m.: A black Kia Sportage

    Police are looking to track down the two vehicles and the people inside who may have been the fake couriers.

    Playing on fear and emotions, police say this happens way too often.

    “Some of our most vulnerable people are being victimized on a regular basis,” said Warwick Township Police Chief Mark Goldberg.

    “We are a small town. We see it if not weekly, monthly, where some member of our community has lost thousands of dollars as they’re victimized in one of these scams,” he said.

    The department says it is constantly trying to educate and inform people about these bad actors.

    “If they’re informed and have information and they understand the specific scenario, because this specific scenario has happened here before, so they can recognize it for what it is and know that it’s a scam,” Goldberg said.

    The police chief hopes this encourages residents to be more cautious and able to recognize when someone might be trying to rip them off.

    “You have to be suspicious. It’s unfortunate but that’s our world. You have to be suspicious. You have to be vigilant and you really have to look out for yourself,” Goldberg said.

    Usually, in these cases, victims are out of luck in finding the scammers or recovering their money. However, Goldberg said they are working on some surprising and unexpected leads in this case.

    Anyone who has information or saw a suspicious car or person in Hidden Ponds on Saturday, April 6, is asked to contact the police.

    Copyright © 2024 WPVI-TV. All Rights Reserved.

    WPVI

    Source link

  • 9 Essential Strategies to Protect Your Heart and Wallet: Outsmarting Scammers on Dating Sites

    9 Essential Strategies to Protect Your Heart and Wallet: Outsmarting Scammers on Dating Sites

    9 Essential Strategies to Protect Your Heart and Wallet from Scammers on Dating Sites

     

    You can read the blog below or watch it on YouTube by clicking here.

    The internet has changed how we find companionship and connection, making it easier to meet new people through dating sites.

    There are lots of potential matches out there, including many authentic, good-hearted men looking for a partner just like you.

    However, as you’re navigating the dating sites, you want to be aware that scammers are there as well.

    These men are con artists who will find a way to touch both your heart and your wallet.

    I don’t want to scare you because there are good men online for you to date.

    Yet, you want to be aware of the clues that will tip you off to these con artists.

    So, I’ve put together 9 telltale tips to help you identify the red flags that will safeguard both your emotions and your finances as you journey through the world of online dating.

    1. The Profile Pitfall

    Your profile is your window to the dating world; hence, when it comes to personal details about your job and income keep it vague.

    You can say you’re a nurse or an executive but don’t mention where or how much you make.

    Also, you want to be aware of coming across as needy and lonely in your profile.

    It makes you perfect prey for scammers looking to hook you into their scams.

    2. The Overseas Ordeal

    He might tell you that he lives in a metropolitan city in the US but his work takes him elsewhere in the world.

    Or he will claim to be on an oil rig or in the military.

    He says he’s coming back to the states soon and, wants you to wait for him because he’s so excited to meet you.

    These are huge red flags that are signs you’re probably dealing with a scammer!!!

    3. Scamming Women Is His Job

    These men are Professional Heartbreakers.

    Most live in poorer countries around the world where jobs that pay well are scarce.

    By working a couple of hours each day, and using a well crafted script, he can easily communicate with women in the US, find their weak spots, and make a fortune.

    He often has an appealing British lilt to his voice that seems to promise romance and he uses it to his advantage to hook you.

    4. What He’ll Tell You About Himself

    He uses pictures of great looking men to lure you in knowing you’ll feel special being contacted by someone who is so handsome.

    Look closely at those profile pictures.

    They are often stock photos found on the internet of handsome models in ads selling items like hats or sunglasses.

    When you ask for more pictures, he’ll send family pictures of children or grandchildren.

    The big tip-off:  he’s not in these family pictures because he can’t find family pics of the models’ image he’s used.

    5. He Uses Romance to Lure You In

    Women love romance and scammers know this has been missing in your life for a long time.

    So he steals poems off the internet and sends them to you as if they were his own.

    Your heart just melts and you bond with him which makes you even more vulnerable to his scheme.

    6.  He’ll Always Have An Excuse For Why He Can’t See You

    He’ll tell you that he can’t wait to see you and that he’s making arrangements to travel in a month or two when he can get away from his business.

    Right before you’re supposed to meet, he’ll give you an excuse for why he has to cancel the trip.

    Broken promises of meeting in real life happen over and over again.

    This is another HUGE TIP OFF you’re dealing with a scammer.

    7.  You Can’t Find Anything Concrete About Who This Man Is 

    Try searching his picture on Google.

    More than likely nothing will show up.

    The absence of a digital footprint is another tip off you’re connecting with a scammer.

    8. How the scam works 

    He’ll spend hours chatting with you multiple times a day.

    His male attentiveness feels amazing because he knows its probably been a while since a man has been this devoted to you.

    But beware…. he is not there for conversation; he’s hunting for your weaknesses.

    Sharing a similar tragedy is a common tactic scammers use to gain trust and pave the way for exploiting their victims.

    For example, if you’ve lost a close member of your family, don’t be surprised if he tells you he has too.

    He uses these holes in your heart to get you to trust him knowing it will be easier for you to bond with someone who has experienced the same loss as you.

    And that’s when he’s ready to reign you in for the scam.

    He shares news with you about a HUGE business opportunity he’s about to close but the bank isn’t able to extend the credit he requires to close the deal.

    He just needs a little more money to finish it or he’ll lose everything including the personal investments he and his family have made, a situation that’s undoubtedly stressful and disheartening for him.

    This is when he asks you for your help.

    He’s laid the groundwork needed to capture your heart.

    He knows from your conversations that you’re in love with him and he counts on you not wanting to see him suffer this devastating loss.

    You want to help him so you wire the money he needs to his bank account.

    And you never hear from him again.

    9. A blueprint for keeping yourself beyond the reach of these swindlers

    • Date men closer to home.
    • Keep emails short and sweet, ideally between 5-10 at the most. Al technology has given scammers the ability to write decent emails. The tipoff is they are usually too perfect and filled with descriptive words that most men wouldn’t use.
    • Spend no more than a couple of hours on 1 or 2 phone calls max. This keeps you from divulging too much information that allows him to get closer to you.
    • Meet a man within 2-3 weeks of initial contact. (If a man tells you he’ll be out of the country for a month or two, tell him to give you a call when he gets back.)
    • When you’re uncertain, use Google Images to upload his profile picture. (This step lets you verify if the image truly represents him or if it might have been borrowed from someone else’s identity.)

    Armed with the strategies and insights for avoiding scammers, the online world is still one of the best ways to meet a good man.

    Remember to stay safe, keep an open mind, and maintain realistic expectations throughout your journey.

    If you’d like further guidance and support, know that it’s always within reach—there are numerous resources you can explore below.

    You’re not alone on this journey.

    Believing in You!

    Lisa


    Your Next Steps to Love after 50. . . .

    💞 Feeling like you are on a merry-go-round of mismatched dates? Lets press pause and talk about how we can write a new love story for you. Click here to start our conversation. Tell me your story – I am here to listen and guide you towards meeting someone truly special.

    If you are still gearing up for that step, I have plenty of insights and inspiration for you:

    1. Subscribe to my YouTube Channel for heartfelt dating wisdom and uplifting success stories from women who have been just where you are. They found love, and so can you. Click here to watch and learn.

    2. Discover a new chapter in your dating life with my book, “The Winning Dating Formula.” It is more than a book; it is your journey to love mapped out. And it is just a click away on Amazon. Click here and start attracting the love you deserve.

    3. Join our Finding Love after 50 Facebook group to find camaraderie and connection. It is a warm and welcoming space to share your journey and receive support every step of the way. Click here to become part of our community.

    4. On the lookout for a dating site that resonates with you? Browse through my personal selection of the best dating sites tailor-made for fabulous over 50s. Click here and say goodbye to guesswork.

    Let these resources be your steppingstones to a love life filled with promise and joy. When you are ready, I am here to take that journey with you. Together, lets find your Mr. Right! 🌹

    Love this article? Sign up by clicking here to receive my weekly blog.

    Copyright© 2024 Lisa Copeland. All rights reserved.

    Lisa

    Source link

  • California Implements New Cryptocurrency Laws to Combat Bitcoin ATM Scams

    California Implements New Cryptocurrency Laws to Combat Bitcoin ATM Scams

    Bitcoin (BTC) ATMs have become both convenient and worrying, with scammers taking advantage of unsuspecting victims. Authorities in the US and other jurisdictions are now waging a war against crypto-ATM-based scams.

    California takes a stance on new cryptocurrency laws

    The state of California has introduced rules for cryptocurrency transactions. Senate Bill 401, signed by Governor Gavin Newsom, means you can only make $1,000 worth of cryptocurrency transactions at ATMs each day, and starting in 2025, the maximum they can charge you is $5, or 15% of the transaction. Whichever is higher.

    Initially, some Bitcoin ATMs allowed up to $50,000 in transactions with fees ranging between 12% and 25% above the value of the digital asset. These changes are intended to protect people from scams and high fees, explained Sen. Monique Lemon, one of the co-authors.

    Scammers taking advantage of the convenience of Bitcoin ATMs have been a growing concern, with the Federal Trade Commission reporting that more than 46,000 people have lost more than $1 billion to cryptocurrency scams since 2021. New transaction limits give victims more time to spot scams before loss of money. But Charles Bell of the Blockchain Advocacy Coalition worries that these rules could hurt the cryptocurrency industry and small businesses.



    You may also like:

    Explore Australia’s rapid rise in the global cryptocurrency ATM scene

    FBI Alerts About Bitcoin ATM and QR Code Scams

    The Federal Bureau of Investigation (FBI) has raised the alarm about fraudulent schemes exploiting ATMs for cryptocurrencies and quick response (QR) codes for payments. These schemes take various forms, including online impersonation, romance scams, and lottery fraud, all using cryptocurrency ATMs and QR codes as tools.

    QR codes, which smartphone cameras can scan, simplify cryptocurrency payments. However, criminals are now using it to trick victims into paying money. Victims are often asked to withdraw money from their accounts and use a QR code provided by scammers to complete transactions at physical cryptocurrency ATMs.

    Once the victim makes the payment, the cryptocurrency is transferred to the scammer’s wallet, making recovery nearly impossible due to the decentralized nature of cryptocurrencies. The FBI offers several tips to protect against these schemes, focusing on caution, verification, and avoiding cryptocurrency ATM transactions that promise anonymity using only a phone number or email.



    You may also like:

    Bitbuy is partnering with Canada’s largest Bitcoin ATM provider

    Cryptocurrency regulation efforts in California

    The passage of Senate Bill 401 in California is part of a broader effort to regulate the cryptocurrency industry while protecting consumers. Another law, scheduled to take effect in July 2025, will require digital financial asset companies to obtain licenses from the California Department of Financial Protection and Innovation. This represents a clear shift towards tightening government regulation and oversight in the world of digital finance.

    Gavin Newsom’s decision to sign these bills into law demonstrates California’s commitment to strengthening the cryptocurrency industry and protecting its citizens. Balancing innovation and security remains a challenge, especially in a rapidly evolving digital landscape.

    Bitcoin Depot’s historic debut on the NASDAQ

    In July, Bitcoin Depot, a leading bitcoin ATM operator, went public on the Nasdaq. This milestone comes after Bitcoin Depot merged with GSR II Meteora, a blank check company.

    The move to go public demonstrates the growing legitimacy and acceptance of cryptocurrencies in major financial markets.

    Authorities vs. illegal crypto ATMs

    The UK Financial Conduct Authority (FCA) is taking a strong stance against illegal cryptocurrency ATM operators. Using its power under money laundering regulations, the Financial Conduct Authority (FCA) has carried out raids on cryptocurrency ATMs suspected of illegal activities across England.

    The measures, which follow previous operations in east London and Leeds, are part of the Financial Conduct Authority’s (FCA) efforts to crack down on unregulated cryptocurrency operations. This highlights global pressure for stronger cryptocurrency regulation, mirroring steps taken in California. The balance between innovation and security remains a fundamental concern for regulatory bodies around the world.



    Read more:

    McLennan County Bitcoin ATM Lawsuit Resolved

    Editorial Team

    Source link

  • AI Fraud is Coming. Here’s What to Look Out For. | Entrepreneur

    AI Fraud is Coming. Here’s What to Look Out For. | Entrepreneur

    A new wave of fraudulent investment schemes is coming — and it’s powered by AI.

    Alan Rosca

    Source link

  • 3 Common Lies of a Get Rich Quick Scheme (and How to Avoid Them) | Entrepreneur

    3 Common Lies of a Get Rich Quick Scheme (and How to Avoid Them) | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    If you’ve recently received an email from a Nigerian Prince asking for a small sum of money now to help him out of a financial bind, don’t bother. I have already paid it and should be receiving an expeditious reward in the form of gold bricks. It’s a great feeling.

    Thank goodness I didn’t fall for any scams. You’re probably familiar with them; The Ponzi scheme, for example, whereby current investors are paid only by new investors until the jig is up and the new investors dry up. Without naming names, one very famous financial advisor used this ruse and Madoff with millions.

    Matt Fore

    Source link

  • Why In-Office Work Is The Real Threat to Cybersecurity | Entrepreneur

    Why In-Office Work Is The Real Threat to Cybersecurity | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    Imagine a home filled with sophisticated locks, CCTV cameras, and a state-of-the-art security system. Yet, the owner leaves the back door wide open. This is precisely what’s happening in the world of corporate cybersecurity. As organizations fret over the potential risks of remote work, new research suggests the real dangers lurk within the office itself. That finding from a groundbreaking study from the Farmer School of Business at Miami University is definitely a surprise to me and my clients who I help transition to hybrid and remote work, and it will inform some valuable conversations going forward.

    The unexpected benefits of remote work on cybersecurity

    The Farmer School of Business researchers discovered that remote workers exhibit a higher level of cybersecurity awareness and take more security-related precautions than their in-office counterparts (forthcoming in the July issue of Computers & Security). That’s right — working from home might actually make employees more vigilant when it comes to cybersecurity. In my emailed interview with the author Joseph K. Nwankpa, he told me “When we surveyed remote workers, we expected the results to reveal cybersecurity complacency, but surprisingly, the survey revealed remote cyber vigilance.”

    This surprising outcome can be attributed to the so-called “Peltzman Effect” and the complacency framework, which the study draws upon to explore how remote working may trigger a moral hazard regarding employee cybersecurity awareness and security-based precaution-taking. Remote employees tend to feel a heightened sense of responsibility for their own cybersecurity, while office workers often become complacent, trusting their companies to handle cyber threats on their behalf.

    Related: Employers: Hybrid Work is Not The Problem — Your Guidelines Are. Here’s Why and How to Fix Them.

    Complacency: The Achilles’ heel of office workers

    Imagine being on a cruise ship with an impeccable safety record. You might feel so secure that you skip the safety drill and neglect to learn the location of the lifeboats. This is the complacency effect in action. Office workers, surrounded by the perceived safety of their company’s cybersecurity measures, may be less likely to follow best practices and take necessary precautions.

    The study cites prior research that reveals how employees working within the corporate office and boundaries trust their firms to develop, maintain and update security countermeasures to mitigate cybersecurity threats and risks. As a result, these employees are not apt or mindful of security threats and concerns, leading to constrained cybersecurity awareness.

    On the other hand, remote workers, like sailors navigating stormy seas, understand that they must be constantly vigilant. This heightened awareness leads them to take more security-based precautions, ultimately keeping their company’s digital assets safer.

    Indeed, the human element of security is enhanced through a switch to remote work. Thus, Nwankpa stated “Our study found that working from the office within corporate firewalls and security boundaries induced employees to exhibit risky cybersecurity behavior, such as diminished cybersecurity awareness and precaution-taking. However, switching to remote work made employees feel insecure, leading to heightened cybersecurity awareness and cybersecurity precautionary measures.”

    The pivotal role of information security policy compliance

    The study also found that information security policy compliance played a significant role in remote workers’ heightened cybersecurity awareness. This suggests that companies must prioritize and enforce their security policies to ensure that all employees, whether in the office or at home, are adequately prepared to handle cyber threats.

    The research model used in the study examined the impact of remote working on security-based precaution-taking and the role of cybersecurity awareness in the relationship between remote working and security-based precaution-taking. The data collected from 203 remote workers across the U.S. provided strong support for the research model, indicating that remote working is positively associated with cybersecurity awareness and security-based precaution-taking.

    Furthermore, the study reveals that as remote workers gain cybersecurity awareness, they are more likely to apply security-based precaution measures. This reinforces the idea that fostering cybersecurity awareness among remote workers can lead to better protection of organizational information assets against threats.

    Related: Why Cybersecurity Needs to be Prioritised as Small Businesses Face the Cost-of-Living Crisis

    Remote Work: A potential solution to cybersecurity woes

    Contrary to popular belief, the findings of this study demonstrate that remote work can actually improve cybersecurity. Companies can leverage this knowledge to their advantage, promoting remote work arrangements and fostering a culture of vigilance and cybersecurity responsibility among their employees.

    One way to achieve this is by understanding the relationship between cybersecurity awareness and security-based precaution-taking. By focusing on this relationship, organizations can clarify how and when remote working can create positive cybersecurity behavior among end-users, as suggested by the study.

    Organizations should not shy away from embracing remote work arrangements, as the study reveals that these can lead to better cybersecurity outcomes. By fostering a culture of trust, personal responsibility, and cybersecurity awareness among remote employees, companies can empower their workforce to take the necessary precautions and maintain a high level of vigilance, ultimately leading to a more secure digital environment.

    The importance of training and employee engagement

    To further enhance cybersecurity in a remote work setting, organizations should invest in comprehensive training programs that cover both technical and behavioral aspects of cybersecurity. By making employees aware of the potential threats and risks, as well as providing them with the tools and knowledge needed to protect themselves and the company, businesses can significantly reduce their vulnerability to cyberattacks.

    In addition, organizations should actively engage their remote employees and encourage open communication about cybersecurity issues. By involving employees in the decision-making process and addressing their concerns, companies can create a sense of ownership and shared responsibility for the organization’s cybersecurity.

    Reevaluating Cybersecurity Strategies for a Hybrid Workforce

    As the business world moves towards a more hybrid workforce, with a mix of office-based and remote employees, it is crucial for organizations to reevaluate their cybersecurity strategies. Companies must consider the unique challenges and opportunities presented by remote work and adapt their policies and practices accordingly.

    This may involve updating security protocols, implementing new technologies, and rethinking the traditional office-centric approach to cybersecurity. By embracing the unexpected benefits of remote work and adapting to the evolving digital landscape, organizations can create a more secure and resilient future.

    The groundbreaking study from the Farmer School of Business at Miami University opens the door for further research into the distinctions between remote and office work and their implications on cybersecurity. Future research could explore how different remote work arrangements, such as hybrid models or fully remote workforces, may impact cybersecurity awareness and precaution-taking behavior among employees.

    Moreover, researchers could investigate the role of various factors, such as organizational culture, leadership, and technology, in shaping employees’ cybersecurity behavior in both remote and office environments. This would provide valuable insights to help organizations develop more effective strategies for managing cybersecurity in an increasingly connected and remote world.

    Related: Cybersecurity Practices That Protect Your Small Business

    Cognitive Biases and their Impact on Cybersecurity

    Cognitive biases can significantly influence how employees perceive and respond to cybersecurity threats, both in remote and office settings. By understanding the impact of these biases, organizations can tailor their cybersecurity strategies to address these psychological factors and promote more effective security behaviors among their workforce. Let’s explore two specific cognitive biases that may impact cybersecurity in the context of remote work and office environments: the status quo bias and the optimism bias.

    The status quo bias refers to the tendency for people to prefer maintaining their current state or situation, even when change could potentially bring about benefits or improvements. In the context of cybersecurity, employees working in a corporate office environment may be more prone to the status quo bias, as they might assume that their organization’s existing security measures are sufficient to protect them from cyberthreats.

    This complacency can lead to a lack of personal responsibility and a decreased likelihood of adopting new security behaviors or updating existing practices. The Farmer School of Business study highlights this issue, revealing that employees working in corporate offices often trust their organizations to handle cybersecurity threats and, as a result, may neglect their own role in safeguarding company data and assets.

    To counteract the status quo bias, organizations should continuously emphasize the evolving nature of cyber threats and the importance of individual responsibility in maintaining security. Encouraging employees to stay updated on the latest security best practices and providing regular training on new threats can help keep cybersecurity at the forefront of their minds and reduce the impact of the status quo bias.

    The optimism bias refers to the inclination of individuals to underestimate the likelihood of negative events occurring, while overestimating the probability of positive outcomes. In the context of remote work and cybersecurity, the optimism bias may manifest as office-based employees believing that they are less likely to fall victim to cyberattacks than their remote counterparts.

    This overconfidence may lead office-based workers to overlook potential security risks and neglect precautionary measures, such as adhering to company security policies. The Farmer School of Business study supports this assumption by showing that remote workers are more likely to have a higher level of cybersecurity awareness and take more security-related precautions than those working in an office.

    To mitigate the effects of optimism bias, organizations should provide remote employees with clear and realistic information about the cybersecurity risks associated with remote work. Sharing real-life examples of cyberattacks targeting office-based as well as remote workers and emphasizing the importance of personal responsibility can help raise awareness and encourage employees to be more vigilant.

    Conclusion

    The study from the Farmer School of Business at Miami University serves as a wake-up call for organizations to rethink their approach to cybersecurity in the age of remote work. By embracing the benefits of remote work, fostering a culture of cybersecurity awareness, and adapting their strategies to the evolving digital landscape, companies can ensure the protection of their valuable digital assets and navigate the treacherous waters of the cyber world with confidence.

    Gleb Tsipursky

    Source link

  • How to Use New Technology to Combat Phone Scammers | Entrepreneur

    How to Use New Technology to Combat Phone Scammers | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    In 2019, Congress passed the TRACED Act to give the Federal Communications Committee (FCC) additional tools to combat robocalls. It’s a problem plaguing public sector call centers and constituents; people still receive millions of robocalls (automated or pre-recorded messages) and scam calls (made by criminals) every year in the U.S.

    It is incumbent that government agencies utilize the technological tools available today to combat fraudulent, phone-related activity, boosting public trust and the constituent experience.

    The not-so-smartphone problem

    The household landline is steadily declining; roughly one-third (37%) of homes still have one. In an incredible technological revolution, smartphones have become the preferred telephone device for most homes and individuals. Smartphones are powerful, but their ability to root out scam calls is still decidedly inefficient. Today’s smartphones don’t pull caller ID data from a centralized registry of phone numbers. Instead, they rely on information from your contact list to identify incoming calls. Essentially, you tell your phone who’s calling — not the other way around.

    Most people don’t realize cell phones lack a caller ID, causing problems for public agencies trying to reach beneficiaries or constituents. To deal with the over 3 billion spam calls received per month, most people simply ignore numbers they don’t recognize.

    Due to this breakdown in public trust, many government agencies won’t initiate contact via phone. Rather, they’ll return calls from consumers who request help. However, if a recipient misses a call, they’re faced with the daunting prospect of returning it — only to navigate endless menus and jump through hoops to reach a live person on the other end. The result is a further breakdown in trust and loss of confidence in the efficacy of public sector call centers.

    Phone service providers have developed technical ways to alleviate the problem of eroded trust. Many major providers employ a certification system for phone numbers registered to customers. This development resulted from the STIR/SHAKEN caller identification framework set forth by Neustar Management and mandated by the FCC as part of the TRACED Act.

    With caller ID authentication standards like STIR/SHAKEN, phone service providers verify a caller’s actual number matches the caller ID information, enabling higher trust for the receiver of the call. It’s a small step, but it indicates how the public sector can better leverage technological tools to solve these problems. Unfortunately, the scammers have a vote in this process too, and they’re not going away without a fight.

    Related: Rising AI Threat Sounds Like Your Loved One on the Phone — But It’s Not Really Them

    Robocalling isn’t going anywhere

    Robocalls and scam calls aren’t subsiding anytime soon — they’re too lucrative for the fraudsters who perpetrate them. In 2021, fraudulent calls cost Americans over $29 billion. Without positive identification in the form of verified caller ID, the public is never sure they’re talking to a legitimate service. The result is a concerning loss of trust in government call centers.

    Fraud doesn’t stop at government call centers. Law enforcement agencies have seen an alarming jump in a spoofing technique known as swatting. The basic concept is the same, but the agency is the initial victim of the scam — with potentially deadly consequences for those whom agencies are charged with protecting.

    Many government call centers have tried to combat spoofing practices by eliminating initial contact with customers via telephone, but millions of people fall for these scams every year. Some agencies send public reminders that they won’t call about an issue, but scammers make their calls convincing enough to succeed.

    Related: How To Avoid Spam Calls And Focus On Important Ones

    How technology can help

    All is not lost. Scam calls are a technical problem that requires a technical solution. There are many tools public agencies and private organizations can implement to rebuild trust with consumers. One example is emerging technology in providing better caller ID by applying a token to verified phone numbers or displaying a branded logo on the receiver’s phone. Services like this allow organizations to ensure outbound calls aren’t mislabeled as spam calls or blocked by the telephony system and that they actually originate from the correct entity.

    It’s similar to your fingerprint: difficult to fake and uniquely tied to your identity. Calls can be certified as they’re routed by verifying the phone number belongs to the person (or call center) placing the call.

    Major cell phone providers often use each other’s databases as trusted sources, too, so this tool isn’t limited to a single provider. It can also stop spoofed outbound calls at the source and identify likely fraudulent calls so people can screen them appropriately.

    Another emerging caller ID technology has worked remarkably well for the Virginia Department of Health (VDH). During the height of COVID-19, the VDH reached out to patients and close contacts daily. When only an unidentified phone number was displayed, many calls went unanswered, wasting the department’s time and resources.

    When the VDH branded the calls as they displayed on recipients’ phone screens, presenting the department’s logo and name on the recipient’s smartphone, its first-time answer rate jumped 105% almost immediately.

    Related: This Saas-Based Startup Is Disrupting Call Centre Market With AI-Based Voice Bots

    Tools to repair trust

    Scammers are constantly innovating, but the technology sector innovates alongside them. Call carriers, third-party service providers and the federal government continue to develop new anti-spoofing tools, processes and policies to protect consumers — and public sector agencies must be sure to use them. Through constant vigilance, they can combat fraudulent phone calls, bolster public trust and improve the customer service experience.

    Scott Straub

    Source link

  • Overlooking These 4 Critical Measures Expose Your Company to Cyber Attacks | Entrepreneur

    Overlooking These 4 Critical Measures Expose Your Company to Cyber Attacks | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    Here’s a sobering truth: 95% of cyberattacks can be traced to human errors. The more employees you have, the greater your risk of being a cybercrime victim. We all imagine legions of hackers trying to tear through our firewalls, and yes, occasionally, some will make it through. But the much-more-common truth is that unsuspecting employees inadvertently grant those cybercriminals access to corporate systems and data, or they are influenced by these hackers to perform questionable (or even illegal) actions.

    Even worse are the willful fraudulent actions of the humans sitting between the keyboard and the chair. Some employees themselves try to cheat the system by changing amounts, bank account details, or other data to benefit their personal financial situation. Then, there are other outside humans up to no good, such as when a supplier or partner sends fake or altered documents to the company, such as vendor invoices with fake bank account details or wrong amounts.

    None of these occurrences are an indictment of company leaders, security practices or judgment. They just highlight that technology alone can’t stop every cyberattack. The key to maximizing protection and minimizing exposure to these attacks is to combine technology with the human touch.

    Related: Cybercrime Will Cost The World $8 Trillion This Year — Your Money is in Danger. Here’s Why Prioritizing Cybersecurity is Crucial to Mitigate Risk.

    1. Secure data starts and ends with humans

    Many cyberattacks succeed due to simple but preventable human error or improper reaction to a scam. For example, an employee might reveal usernames and passwords after clicking on a link in a phishing email. They might open an email attachment that unknowingly installs ransomware or other equally destructive malware on the corporate network. Or they might simply choose easily guessed passwords. These are just a few examples that can allow cyber thieves to attack.

    To minimize human error-related risks, consider implementing the following measures to ensure your business stays well-protected.

    • Strengthen employee awareness and training: Arrange periodic training on cybersecurity best practices, recognizing phishing emails, avoiding social engineering attacks, and understanding the importance of secure data handling. In 2022, around 10% of cyberattack attempts were thwarted because employees reported them, but they can only report such attempts if they recognize them.
    • Build a culture of security: Make sure everyone in their role is actively protecting company assets by promoting open communication about security issues, recognizing employees who demonstrate sound security practices, and incorporating security into performance evaluations.
    • Employ stricter access controls: Access controls limit who can view or change sensitive company data and systems. Applying the “principle of least privilege” access controls and educating employees on the risks of account sharing can limit unauthorized accesses and data leaks.
    • Use password managers: Strong passwords are difficult to crack but challenging to remember. Password manager software can create and store difficult-to-guess passwords without users having to “write them down.”
    • Enable multifactor authentication (MFA): MFA adds an extra layer of security by requiring an additional verification method — such as a fingerprint or a one-time code — just in case a bad actor does snitch an employee’s password.
    • Implement fraud detection processes for incoming documents: These processes attempt to identify fraudulent documents (like fake invoices) on receipt before they can be processed.

    2. Reduce exposure to cyberattacks and fraud with technology and automation

    While lack of awareness, training, recognition and processes account for the success of most cyberattacks, you still need technology barriers to try and keep determined hackers out of your systems. Finance and accounting offices are top targets for cyberattacks and fraudsters, so the accounts payable (AP) systems are a prime target if they do get in.

    In fact, 74% of companies experience attempted or actual payment fraud. Accounts payable fraud exploits AP systems and the associated data and documents with mischief like:

    • Creating fake vendor accounts and fake invoices for them.
    • Altering payment amounts, banking details or dates on valid invoices.
    • Tampering with checks.
    • Making fraudulent expense reimbursement.

    Related: What Is Phishing? Here’s How to Protect Against Attacks.

    3. Keeping the bad guys out

    Of course, you’ll want your IT department to use technology to thwart unauthorized attempts to access the network and systems in the first place. Besides the venerable firewall, some trusty systems include:

    • Intrusion Detection and Prevention System (IDPS) monitors network traffic for malicious activities or policy violations and can automatically take action to block or report these activities.
    • Artificial Intelligence (AI) plays a significant role in cybersecurity by using machine learning algorithms to analyze volumes of data, identify patterns, and make predictions about potential threats. It can identify attack vectors and respond to cyber threats quickly and efficiently that humans can’t match.
    • Data Encryption ensures that only authorized parties with the correct decryption key can access a file’s content, protecting sensitive data at rest (stored on devices) and in transit (across networks).

    4. Protecting against fraud from the inside

    Whether a cybercriminal slips through all those barriers or an unscrupulous employee is bent on committing AP fraud, various types of automation can detect and prevent the cyber attack from succeeding.

    • Automated monitoring of employee activities: This can help identify suspicious behavior and potential security risks. The software tracks user activity, analyzes logs for signs of unauthorized access, and regularly audits user access rights. Of course, employees should know they are being monitored and to what extent.
    • Automating the payment process end-to-end on a single platform: It takes human error (and human scruples) out of the equation, except when there’s an exception. Encrypted receipt/intake of electronic invoices from suppliers, automated matching of invoices to orders, and electronic payments —all without human intervention — are examples of how automation removes the opportunity (and temptation) to commit AP fraud.
    • Document-level change detection takes this protection one step further: This automated technology can detect when a sneaky cyberthief with access to the underlying systems makes unauthorized access attempts, modifications, or deletions to sensitive documents, including orders, invoices, and payment authorizations. These tools alert administrators and provide detailed audit trails of document activity, helping detect and prevent AP fraud, whether it comes from outside or inside.
    • Detection of unusual data patterns: Alert AP staff to take a further look before allowing the invoice to be processed and paid. Using machine learning and AI, automated systems can compare data with historical data, flagging suspicious changes in bank details, vendor’s legal name, and address as well as unusual payment amounts.

    Related: How AI and Machine Learning Are Improving Fraud Detection in Fintech

    It’s almost impossible to protect yourself entirely against cyber theft and AP fraud, especially when most of the vulnerabilities and culpabilities are human. You must focus your security efforts on the perfect balance between state-of-the-art technology and the humans between the keyboard and the chair. Proper and continuous training can reduce the human errors that allow cyberattacks to succeed. And technology and automation can help prevent attacks from reaching people in the first place. But the right combination of the two, though, is the key to defeating would-be fraudsters.

    Francois Lacas

    Source link

  • 8 Ways You Can Save Yourself and Others From Being Scammed

    8 Ways You Can Save Yourself and Others From Being Scammed

    Opinions expressed by Entrepreneur contributors are their own.

    Statistics on the number of scam websites that litter the internet are disturbing. During 2020, Google registered more than 2 million phishing websites alone. That means more than 5,000 new phishing sites popped up every day — not to mention the ones that avoided Google’s detection. In 2021, the U.S. Federal Bureau of Investigation (FBI) reported nearly $7 billion in losses from cybercrime that is perpetrated through these sites.

    What exactly are scam websites? Scam websites refer to any illegitimate website that is used to deceive users into fraud or malicious attacks. Many scammers operate these fake websites and will download viruses onto your computer or steal passwords or other personal information.

    Reporting these sites as they are encountered is an important part of fighting back. In other words, if you see something, say something. Keeping quiet, even if you avoid falling prey, allows the scammers to aim at another target.

    Perhaps you’ve received a suspicious link in an email? Or maybe a strange text message that you haven’t clicked on. Fortunately, there are many organizations out there that have launched efforts aimed at reducing the threat that they pose. In general, these organizations put scam websites on the radar by collecting and sharing information about them. In some cases, they prompt an investigation into the scammers behind the sites.

    Related: Learn How to Protect Your Business From Cybercrime

    It’s free to report a suspicious website you’ve encountered, and it takes just a minute. Here are eight ways you can report a suspected scam website to stop cyber criminals and protect yourself and others online.

    1. The Internet Crime Complaint Center

    The IC3, as it is known, is an office of the FBI that receives complaints from those who have been the victims of internet-related crime. The IC3 defines the internet crimes that it addresses to include illegal activity involving websites. Complaints filed with the IC3 are reviewed and researched by trained FBI analysts.

    2. Cybersecurity and Infrastructure Security Agency

    CISA, which is an agency of the U.S. Department of Homeland Security, targets a wide range of malicious cyber activity. It specifically requests reports on phishing activity utilizing fraudulent websites. Information provided to CISA is shared with the Anti-Phishing Working Group, a non-profit focused on reducing the impact of phishing-related fraud around the world.

    3. econsumer.gov

    The econsumer.gov site, run by the International Consumer Protection and Enforcement Network, is for reporting international scams. It is supported by consumer protection agencies and related offices in more than 65 countries. A secure version of their site is used by law enforcement agencies to share info on scams.

    4. Google Safe Browsing

    While Google does not have a mechanism for reporting all varieties of website scams, there is a form for reporting sites that are suspected of being used to carry out phishing. Reports made via the form are managed by Google’s Safe Browsing team. Google’s Transparency Report provides information on the sites that it has determined to be “currently dangerous to visit.”

    Related: Is That Instagram Email a Phishing Attack? Now You Can Find Out.

    5. PhishTank

    This service was founded by Cisco Talos Intelligence Group to “pour sunshine on some of the dark alleys of the Internet.” Phishtank includes an ever-growing list of URLs reported as being involved in phishing scams. To date, it has received more than 7.5 million reports of potential phishing sites. It says that more than 100,000 of the sites are still online.

    Related: 6 Ways Better Business Bureau Accreditation Can Boost Your Business

    6. Antivirus Apps

    Antivirus providers such as Norton, Kaspersky, and McAfee have forms that can be used to identify pages that users feel should be blocked. Scam sites would definitely fall under that category. With some antivirus platforms, reporting forms can only be accessed by registered users. Norton’s is open to anyone.

    7. Web host

    There is a chance that the DNS service hosting the scam site will take action to shut it down. There are a variety of online resources that can help you to find the DNS of a particular site. Once you identify it, send a message to their customer service reporting the site in question and the experience that you had.

    8. Share your experience on social media

    This is actually more like sounding an alarm than filing a report, but it might protect one of your connections who stumbles upon the same site or is targeted by the same type of scam. At the very least, it could draw attention to the fact that scam sites affect real people. A post on Facebook about a close call you had with a scam might better equip your network to avoid any dangerous entanglements. If it does, they’ll thank you.

    Jay Feldman, DO

    Source link

  • Want to Get Verified on Instagram? Don’t Fall For These 3 Verification Scams

    Want to Get Verified on Instagram? Don’t Fall For These 3 Verification Scams

    Opinions expressed by Entrepreneur contributors are their own.

    Whether you’re a thought leader, influencer or entrepreneur, you probably have “get verified on Instagram” on your to-do list. And you should. The coveted blue check mark is valuable for any business leader, but especially for those whose work relies on having a positive public persona.

    Not only does the check mark put you in an elite group — less than 5% of Instagram accounts are granted a verified status — but it also protects you from imposters hijacking your online presence. Which of the dozens of Ryan Reynolds’ Instagram accounts is the real one? The one with the blue check mark.

    So, how do you get verified on Instagram? There are those who would tell you that the process is easy and requires only a little bit of time, a few forms and some money. Don’t believe them. Those people are scammers who are trying to get access to your private information or take your money.

    As Instagram explains on its website, verification is something that is offered to those who “represent a well-known, highly searched-for person, brand or entity.” If that does not describe you or your brand, you should be suspicious of anyone who offers you an easy path to getting a blue check mark.

    Here are three common Instagram verification scams you should be careful to avoid.

    Related: Is That Instagram Email a Phishing Attack? Now You Can Find Out.

    1. Don’t trust an invitation to apply

    If you are a well-known person or represent a well-known brand, you can apply on your own to be considered for verification. Once you apply, you should expect a response within 30 days. What you should not expect is that Instagram will reach out to you to let you know that you are eligible for verification if you have not applied for that status.

    A recent Instagram verification scam lured people in through email messages saying they were eligible for the blue check mark. The next step, according to the email, was to supply the email address associated with the account and the password.

    This scam utilizes a strategy commonly known as phishing, in which bad actors hope to entice someone to provide them with private information by offering them something of value. The information phished for can include usernames, passwords, bank account numbers, social security numbers and more. Once the information is obtained, the account can be hacked to obtain more information, use it for illegitimate purposes, and even lock the genuine account owner out in some cases.

    This Instagram phishing scam walked its victims through a series of forms that gathered information, all with the promise that it would result in obtaining the blue check mark. The fact that the forms were hosted on “instagramforbusiness.info,” rather than the company’s “instagram.com” site, was a telltale sign that it was not a legitimate process.

    Related: Why Having a Personal Brand Is Crucial to Making Money Online (and How to Build Yours)

    2. Don’t trust a message saying that you have been pre-approved

    Another phishing scam goes a step further by informing the target that they have already been approved and only need to click on a link to claim their check mark. Instagram will not approve you for verification on its own initiative. Even if you have applied for verification, this type of message should still be viewed as suspicious.

    Instagram says on its website that it will inform applicants that they have been approved for verification through a notification that will appear in the Activity tab in the Instagram app. It expressly states that it will never “reach out to ask you to confirm your verification.”

    When an email message seems suspicious, reviewing the originating address is one way to quickly reveal . An example of an Instagram verification scam uncovered in early 2022 involved targets receiving messages from “info@business-objectionchannel.com” that promised verification. Some sleuthing revealed that the domain name “business-objectionchannel.com” had been recently registered.

    Related: Instagram’s Verification Self-Submission Form Update Allows for a More Complete Verification Request

    3. Don’t trust a promise to deliver verification for a fee

    Because Instagram’s verification is not something that can be purchased, any offer to provide verification in exchange for a fee, regardless of the dollar amount, will almost certainly be a scam. This is especially true when the offer requires only a fee and no other information.

    An Instagram verification scam uncovered in South Florida in 2021 not only promised verification for as little as $50 but also provided victims with screenshots that showed message exchanges between the scammers and local celebrities who used the service. The messages were later discovered to be fabricated. Those who paid for the service did not get what they were promised.

    However, there are legitimate businesses, such as public relations firms, that can help get their clients verified on Instagram and other social media platforms for a fee. The distinction with those businesses is that they first help their clients to become notable through media appearances, thus making them eligible for verification.

    Overall, it is important to remember that verification — on Instagram and other social media platforms — serves the purpose of authenticating notable accounts. In other words, it is the way Instagram helps its users to connect with the true Ryan Reynolds. As such, it is not something that is easy to obtain.

    For entrepreneurs, thought leaders and influencers, achieving a blue checkmark is often seen as something that can boost their credibility, even if they have not yet achieved the “notable” status that justifies verification. If that is where you are, be careful. Your desire to become verified could result in you falling victim to a scam.

    Jay Feldman, DO

    Source link

  • Ameritech Financial: Billions of Robocalls Scamming Consumers, Including Student Loan Borrowers

    Ameritech Financial: Billions of Robocalls Scamming Consumers, Including Student Loan Borrowers

    Press Release



    updated: Nov 26, 2018

    Right now, about 30 percent of all cell phone calls come from robocall scammers. Next year, that number will increase to half of all calls, according to First Orion. The ability of scammers to mask caller identity is a main reason for this huge increase in fraudulent calls. Scam robocalls play upon the anxiety, greed, or naivete of callers. The most common calls are for cut-rate healthcare, telecom “warnings,” “free vacations,” and “help” with student loan debt. Individuals with student loan debt, in particular, are convenient marks for scammers, since their debt so often overburdens their ability to pay for it. Ameritech Financial, a document preparation company, assists borrowers in applying for and maintaining enrollment in federal repayment programs, such as income-driven repayment plans (IDRs) that can possibly lower monthly payments based on income and family size.

    “Scam calls range from being simply annoying to being devastating for those who fall victim to their deceptive practices,” said Tom Knickerbocker, Executive Vice President of Ameritech Financial. “It makes sense that many of these calls involve student loan debt, since it is such a widespread challenge for millions of Americans. For those overwhelmed by student loan debt, one way to lower the risk of falling for a scam is to better understand your options. We can help you decide which is the best IDR for you, and make sure you continue to maximize the benefits available to you for the life of the loan.”

    It makes sense that many of these calls involve student loan debt, since it is such a widespread challenge for millions of Americans.

    Tom Knickerbocker, Executive Vice President of Ameritech Financial

    Neighborhood spoofing allows robocalls to look like local calls. Ninety percent of fraudulent robocalls will come from a familiar area code in 2019, according to The Inquirer. These calls are continuing to increase in sophistication. Scammers employ the same A-B testing as marketers, constantly shifting to techniques that are most effective. In one highly unnerving call, scammers appear to be calling from the phone number of the person receiving the call. Scammers then say that their cell phone account has been flagged for security purposes. They eventually ask for social security information or credit card numbers to clear up this non-existent issue. 

    There were nearly 500 million robocalls in October relating to healthcare, nearly 10 percent of the 5.1 billion robocalls to Americans that month. The scams are fooling some people because it is open enrollment for many health insurance plans. They often suggest that existing healthcare accounts have been compromised, or they offer extremely low-priced plans. Scammers almost always attempt to get consumers to share sensitive information.

    Stressed out student loan borrowers are also prominent on the radar of scammers. One fraudulent robocall suggests that the Department of Education is no longer accepting entry into the Public Service Loan Forgiveness program. The call entices borrowers to sign up for long-term forbearance and stop future payments. Similar to the other scams, the idea is to string callers along until they give up credit card or social security information.

    “It looks like these scams are only increasing in number and sophistication,” said Knickerbocker. “Fortunately, even if you can’t keep up with your student loan debt, you have better options than answering unsolicited phone calls. We can be your trusted advocate as we help you navigate your student loan debt and repayment options. IDRs might be a great way for you to lower your monthly payment enough to take control of your financial circumstances. We can walk you through the entire process so that you can get back to living your life.”

    About Ameritech Financial

    Ameritech Financial is a private company located in Rohnert Park, California. Ameritech Financial has already helped thousands of consumers with financial analysis and student loan document preparation to apply for federal student loan repayment programs offered through the Department of Education.

    Each Ameritech Financial telephone representative has received the Certified Student Loan Professional certification through the International Association of Professional Debt Arbitrators (IAPDA).

    Ameritech Financial prides itself on its exceptional Customer Service.

    Ameritech Financial Newsroom

    Contact

    To learn more about Ameritech Financial, please contact:

    Ameritech Financial

    5789 State Farm Drive #265

    Rohnert Park, CA 94928

    1-800-792-8621

    media@ameritechfinancial.com

    Source: Ameritech Financial

    Source link