Financial Resources

Don’t get reeled in by phishing scams

DATE | 05/11/20
4
Min
Read
array(5) { [0]=> array(5) { ["file"]=> string(19) "phishing-150x87.jpg" ["width"]=> int(150) ["height"]=> int(87) ["mime-type"]=> string(10) "image/jpeg" ["url"]=> string(74) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-150x87.jpg" } [1]=> array(5) { ["file"]=> string(20) "phishing-300x174.jpg" ["width"]=> int(300) ["height"]=> int(174) ["mime-type"]=> string(10) "image/jpeg" ["url"]=> string(75) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-300x174.jpg" } [2]=> array(5) { ["file"]=> string(20) "phishing-480x278.jpg" ["width"]=> int(480) ["height"]=> int(278) ["mime-type"]=> string(10) "image/jpeg" ["url"]=> string(75) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-480x278.jpg" } [3]=> array(5) { ["file"]=> string(20) "phishing-768x445.jpg" ["width"]=> int(768) ["height"]=> int(445) ["mime-type"]=> string(10) "image/jpeg" ["url"]=> string(75) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-768x445.jpg" } [4]=> array(3) { ["width"]=> int(900) ["height"]=> int(521) ["url"]=> string(67) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing.jpg" } } ===========array(5) { [0]=> array(10) { ["media_query"]=> int(0) ["url"]=> string(74) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-150x87.jpg" ["width"]=> int(150) ["next_break"]=> int(150) ["ratio"]=> bool(false) ["acceptable_h"]=> int(0) ["acceptable_w"]=> int(0) ["max_image_width"]=> int(1400) ["image_full_width"]=> int(900) ["percent_width"]=> int(1) } [1]=> array(10) { ["media_query"]=> int(150) ["url"]=> string(75) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-300x174.jpg" ["width"]=> int(300) ["next_break"]=> int(300) ["ratio"]=> bool(false) ["acceptable_h"]=> int(0) ["acceptable_w"]=> float(150) ["max_image_width"]=> int(1400) ["image_full_width"]=> int(900) ["percent_width"]=> int(1) } [2]=> array(10) { ["media_query"]=> int(300) ["url"]=> string(75) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-480x278.jpg" ["width"]=> int(480) ["next_break"]=> int(480) ["ratio"]=> bool(false) ["acceptable_h"]=> int(0) ["acceptable_w"]=> float(300) ["max_image_width"]=> int(1400) ["image_full_width"]=> int(900) ["percent_width"]=> int(1) } [3]=> array(10) { ["media_query"]=> int(480) ["url"]=> string(75) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing-768x445.jpg" ["width"]=> int(768) ["next_break"]=> int(768) ["ratio"]=> bool(false) ["acceptable_h"]=> int(0) ["acceptable_w"]=> float(480) ["max_image_width"]=> int(1400) ["image_full_width"]=> int(900) ["percent_width"]=> int(1) } [4]=> array(10) { ["media_query"]=> int(768) ["url"]=> string(67) "https://www.weabenefits.com/wp-content/uploads/2020/05/phishing.jpg" ["width"]=> int(900) ["next_break"]=> int(900) ["ratio"]=> bool(false) ["acceptable_h"]=> int(0) ["acceptable_w"]=> float(768) ["max_image_width"]=> int(1400) ["image_full_width"]=> int(900) ["percent_width"]=> int(1) } }
Phishing (pronounced FISH-ing) is one way scammers try to get you to reveal personal or confidential information for illicit use. Learn how to avoid their hook so you’re less likely to take the bait.
Response required. We emailed you a little while ago to ask for your help resolving an issue with your PayPal account…We noticed some unusual log in activity with your account. Please check that no one has logged in to your account without your permission. To help us with this and see what you can and can’t do with your account until the issue is resolved, log in to your account and go to the Resolution Center…

Have you ever received an email like this? This is just one example of many common phishing emails that tend to make the rounds. Most of us have received more than one—in fact, over 100 billion spam emails like this are sent every day.

Phishing is a scam in which a person uses fake emails, texts, and/or phone calls to try to get you to share valuable information such as your Social Security number, account numbers, or user names and passwords. Once they have this information, they may steal your money, your identity, or both. They may also try to access your computer or network by installing ransomware or other programs after you’ve clicked a link in one of their emails or texts. These programs can lock you out of your computer and allow thieves to steal your personal information.

Don’t take the bait

There are a few common tactics you can watch out for that scammers use to try and entice you to hand over your personal information.

Familiarity. Using familiar company names, or pretending to be someone you know, is known as email spoofing. The email appears to be from a trustworthy source, like a legitimate company, family, friend, or even coworker, and lends the recipient a false sense of security that makes them more likely to open files and click on links.

Website spoofing is often used in concert with the fake email by linking it to a website that looks legitimate, but isn’t. When the user goes to the site, they may be asked for sensitive financial or login information. These fraudulent websites may also contain malicious code that ends up on the user’s computer.

Timing. Attackers often take advantage of current events and certain times of the year, such as natural disasters, health scares (like COVID-19), major political elections, and holidays.

Attention. Attracting your attention with lucrative offers or eye-catching statements is another common tactic. For example, a message may claim you just won an iPhone, gift, or large amount of money. Remember, if it seems too good to be true, it probably is.

Enticement. Scammers will try to encourage you to click on a link or open an attachment. They often tell a story to trick you by claiming they’ve noticed suspicious activity, such as stating there’s a problem with your account, directing you to make a payment, or announcing you’re eligible for a refund.

Limited time only. Phishers rely on urgency to increase the odds of pressuring you to ACT NOW and quickly hand over your sensitive information. A legitimate website for a bank, credit card company, or other organization isn’t going to have an air of desperation about it by posting urgent messages on their website. If you see this on a site you visit, double check the URL to make sure you’re actually in the right place.

Please update your account. Hi Dear, We’re having some trouble with your current billing information. We’ll try again, but in the meantime you may want to update your payment details. Update account now. Need help? We’re here if you need it. Visit the Help Centre or contact us now. –Your friends at Netflix

Avoid getting hooked

  • Stay vigilant and be wary of unsolicited requests for your personal information online, by email, or by phone.
  • Do not share any user names, account numbers, or passwords with anyone, and don’t use the same password across accounts.
  • Never trust alarming emails, and don’t open attachments from strange emails you may receive.
  • Use security software on your computer and keep it up to date.
  • Set your mobile phone software to update automatically so you don’t miss critical updates that protect against security threats.
  • Use two-factor authentication on all accounts that offer it—besides using a password, you also add a second step like a fingerprint or special code. This makes it harder for scammers to log in to your accounts if they do get your user name and password.
  • Back up your data someplace not connected to your home network, such as an external hard drive or cloud storage site.
  • Unsure about a link to a website? Look the business up separately online and call them directly, telling them about the message you received. Your bank, for example, will never ask you to send your password or personal information by mail or email.
  • While not a guarantee of a website’s legitimacy, look for secure websites with a valid Secure Socket Layer (SSL) certificate. They’ll begin with “https” and have a closed padlock icon in the status bar. (Eventually all sites will be required to have a valid SSL.)
  • Carefully read any email messages you receive. Is it missing your name? Is there bad grammar or spelling? Is it asking you for personal information?
  • Hover over links (don’t click on them!) to see the actual URL you will be directed to. Look at the web address carefully—it may just be one letter off or something similar.

Sources: Federal Trade Commission Consumer Information, Cybersecurity and Infrastructure Security AgencyPhishing.org


Top frauds of 2019

According to the Federal Trade Commission (FTC), these were the top schemes reported by more than 3.2 million people in 2019.

  1. Number one fraud: Imposter scams. Imposters pretended to be calling from the government or familiar business, a romantic interest, or a “family member” with an emergency. People reported losing more than $667 million to these schemes, which they often paid with a gift card.
  2. Top government scam: Social Security imposters induced fear by threatening people with arrest by marshals or police officers until the imposters received money. The median individual loss was $1,500.
  3. Phone calls were the main way people reported being contacted by scammers. Those who didn’t hang up and followed through on scammers’ requests had a median loss of $1,000.

During 2019, FTC law enforcement actions led to more than $232 million in refunds to people who lost money. If you spot a scam, report it at the Federal Trade Commission Complaint Assistant.