Increase in local “Spoof” attempts.

We’ve been made aware of an increase in spoof attempts in our area. Please remember that CSE will never send messages asking for personal or sensitive data or online banking credentials. Always be diligent and never give out personal information.

Skip to Content

SCAMTIONARY: A DICTIONARY FOR SCAM TERMS

SCAMTIONARY: A DICTIONARY FOR SCAM TERMS

 

Fraud is happening more than ever, which means it’s crucial to stay informed and be vigilant. Knowing common terms and tactics that scammers use empowers you to recognize red flags and avoid falling victim to deceitful schemes.

Keeping educated on the latest fraudulent practices, can protect your personal and financial well-being, ensuring that you don't endure the hardship and stress that often accompany being scammed.

Staying informed is your first line of defense, and CSE is here to help with our…

 

SCAMTIONARY: A DICTIONARY FOR SCAM TERMS

Here are 15 Fraud Terms You Should Know:

  1. Advance-Fee Fraud: A scam where the victim is promised a significant sum of money, but must pay a small fee upfront. The scammer collects the fee and disappears without delivering the promised funds.
  2. Bait and Switch: A deceptive marketing practice where customers are lured in with the promise of a great deal on a product that is unavailable or of inferior quality, then redirected to a more expensive item.
  3. Catfishing: The act of creating a fake identity on social media or dating sites to deceive people into a romantic relationship, usually for financial gain.
  4. Identity Theft: A type of fraud where someone wrongfully obtains and uses another person’s personal data, typically for financial gain
  5. Juice Jacking: When a scammer loads malware onto public USB charging stations
  6. Malware: Malicious Software used to commit cybercrime
  7. Pharming: Redirecting users from legitimate websites to fake ones
  8. Phishing: A scam where scammers pose as legitimate entities to trick individuals into sharing financial or sensitive information such as usernames, passwords, and credit card details via email or fake websites.     
  9. Pyramid Scheme: An illegal investment scam based on a hierarchical setup of network marketing. Participants recruit others into the scheme, with the expectation of profits derived primarily from the recruiting of others rather than the sale of products or services
  10. Ransomware: Malicious software that encrypts a victim’s data, with the attacker demanding payment (ransom) for the decryption key.
  11. Skimming: The illegal copying of information from the magnetic stripe or chip of a credit or debit card, typically done by using devices such as a skimmer or shimmer.
  12. Smishing: Phishing via text message
  13. Spoofing: When a scammer disguises a communication to make it seem like it is coming from a trusted source. This can happen with emails, phone calls, websites, and more.
  14. Spyware: A type of malware scammers use to gather data from electronic devices
  15. Vishing: Phishing via phone; when a scammer makes deceptive phone calls

 

0 comments

Denotes required fields

Aa Aa Aa