Connect with us

Technologies

2022 Black Friday: Make Sure You Avoid All the Elaborate Scams

Scammers don’t take a break during the holidays. Learn what to watch for to protect yourself.

This story is part of Gift Guide, our year-round collection of the best gift ideas.

Black Friday arrives the day after Thanksgiving — which is Nov. 25 this year. It’ll be a day filled with deals on items like headphones and TVs, but with all that potential money flowing from customers to stores, cybercriminals are unfortunately looking to steal some of it.

Scammers work year round, but they turn up their efforts during the high-spending holiday season to exploit the spirit of giving.

The scams range far and wide — as retailers like Amazon, Best Buy and Walmart roll out deals over the holidays, fraudsters create elaborate websites to trick you into spending money on products you’ll never receive. You may receive text messages or emails claiming you’re eligible for a refund for an item you never purchased, just so thieves can get your credit card information. You might even be enticed into donating to a charity that provides homes for abandoned puppies — only to find out it doesn’t actually exist.

Scams come in all shapes and sizes, but there are always red flags to help spot them. Here’s what you need to know about Black Friday scams and how to avoid becoming a victim this holiday season.

For more about security and privacy this holiday season, check out how to protect yourself from identity theft, how to protect your phone app privacy, and the most common cryptocurrency scams.

Fake websites and fraudulent apps go ‘phishing’

In a phishing scheme, the goal is for hackers to get their hands on your personal information, like your credit card number, social security or account password. Pretending to be a large retail corporation, the fraudsters send out an official-looking email or text message, usually with a link to a fraudulent website designed to look just like a legitimate site.

Researchers at security firm Avanan discovered that hackers were sending out spoofed Amazon order notification emails. The email resembled your run-of-the-mill order confirmation, except that the order is false and the charge is significant.

Naturally, if you believe you’re being charged for a substantial amount, you would want to reach out to Amazon. But in this instance, if you use the link in the phishing email to get in contact, you’ll be redirected to a fake Amazon webpage with a false phone number to dial. If you call, the fraudsters won’t initially pick up, but they’ll soon call back, asking you to provide your card number, expiration date and CVV to «cancel the order.» And just like that, they’ve got your information.

These types of attacks are commonplace throughout the year, but expect a surge in messages claiming to be from Amazon, Best Buy, Walmart, Target or other large retailers during the holidays.

If you receive an email asking you to update your payment method or requesting other personal information, contact the company’s help desk to make sure the email is legit before you do anything else.

Other ways to identify a phishing email, according to the Federal Trade Commission and StaySafeOnline.org, include:

  • The sender’s email address looks almost right but contains extra characters or misspellings.
  • There are misspellings or bad grammar either in the subject line or anywhere in the body.
  • They address you with generic terms («Mr.» or «Ms.» or «Dear Customer») instead of by name.
  • The message warns that you need to take immediate action and asks you to click a link and enter personal details, especially payment information.
  • The messages promise a refund, coupons or other freebies.
  • The company logo in the email looks low-quality or just plain wrong.

Credit card skimming goes all-digital

You’ve seen it in movies. A hacker places an object over a card reader, disguised to look like part of the ATM, and then waits for people to swipe their cards. A day or week later, the thief takes the object — known as a skimmer — back and collects the mountain of stolen card information stored inside, which they can then use to make purchases, withdraw money and more.

Instead of using physical hardware to steal payment card numbers, hackers can insert malicious code directly on a website to do the same thing as traditional skimming, but with online payment information instead.

Regarding e-skimming incidents — sometimes called Magecart attacks after the name of the software used — Tim Mackey, principal security strategist for Synopsis, a digital security company, warns, «There isn’t an obvious way for the average person to be able to identify if or when a website has been compromised. The only potential tell-tale sign might be that the website itself doesn’t quite look ‘right.'»

Mackey suggests a few strategies you can can use to protect yourself:

  • Don’t save your credit card information on retail sites.
  • If possible use a third-party payment method like Apple Pay, Google Wallet or PayPal.
  • Enable purchase alerts on all your credit cards.
  • Disable international purchases on all credit cards.
  • Only make purchases over your home network or cellular network, never on a public Wi-Fi where your payment could be intercepted.

Avoid the ‘Secret Sister’ gift exchange — it’s a pyramid scheme

Originating on Facebook, this sketchy gift exchange among internet strangers plays off the popular workplace practice of «Secret Santa,» a game where each person in a group buys a present for one other randomly selected group member, without the gift-giver revealing their identity.

Instead, in Secret Sister, it’s a pyramid scheme dressed up in holiday clothes, according to the Better Business Bureau. The «Secret Sister» exchange invitation promises you’ll receive about $360 worth of gifts after purchasing and mailing a $10 gift for someone else. A variation includes swapping bottles of wine. And there’s even «Secret Santa Dog,» in which you gift money to a «secret dog.»

Unfortunately, bad math hasn’t stopped this scam from resurfacing year after year. If you fall for it, you’ll probably be out 10 bucks when you don’t receive any gifts in return. You might lose personal details too, because the scam involves sending your name, email address and phone number to people you’ve never met in person.

The Better Business Bureau recommends you deal with any request to become a Secret Sister by ignoring it — do not give your personal details to online strangers. You can also report the invitation to Facebook or whichever social network you were approached on.

Your donations might be going to a ‘faux charity’

During the holiday season, it’s not uncommon to give back to the community. In fact, nonprofit organizations typically see an increase during the fall. The last three months of the year make up 36% of all charitable giving during the year, according to Blackbaud Institute, which creates fundraising applications.

Unfortunately, scammers take advantage of this generosity to make a bundle for themselves.

The way these charity fraud scams typically work are by impersonating other successful charities. And it’s no wonder they work: The scammers come up with real-sounding charity names, create credible websites, run successful social media campaigns — and they’re persistent.

Scammers typically call you using local phone numbers, which give you a false sense of security. However, it’s incredibly easy to spoof an area code. Next they’ll make their pitch, and it’ll be a good one. It will tug at your heart-strings, but they’ll never actually specify how they’ll help. And they may even claim that you’ve made a donation before, and suggest that you make another, and that if you do, it’ll be tax-deductible. And it’ll all be a lie.

If you get a call from a charity and sense some red flags, the AARP and FTC suggest that you do the following:

  • Do your research. Use a watchdog like CharityWatch to get more information about a charity and learn how credible it is. Or use Google.
  • Pay close attention to the charity name and website. False charities like to mimic other popular charities. If it seems too close in name to another, it might not be real.
  • Keep track of your donations. Even if you accidentally donate to a scammer, you need to ensure that the donation isn’t recurring.
  • Don’t give away all your personal information. Of course it’s normal to provide your card information, but don’t do the same with your Social Security number or bank account number.
  • Don’t make a cash donation. Unless you’re certain about a charity’s credibility, don’t give away cash, gift cards, or cryptocurrency.

For any charitable donations that you make, you can also use the IRS tax-exempt organization search tool to make sure that the charity you’re contributing to is legitimate and that your gift can be deducted on your income tax return.

Find The Perfect Gift

AllUnder $10Under $20Under $50Under $100Under $250
allmomsdadsgrandparentsfitnesstravelersteenspreteenstechgamingfoodieshomeromanticjewelrykids
107 results

Technologies

Verum Messenger: The New Gold Standard in Secure and Convenient Communication

In a world where data privacy and security are increasingly paramount, the emergence of messengers that offer not only convenience but also unparalleled protection of personal information is becoming a necessity. One shining example of such applications is Verum Messenger — a platform that not only ensures reliable data protection but also offers a wide range of […]

In a world where data privacy and security are increasingly paramount, the emergence of messengers that offer not only convenience but also unparalleled protection of personal information is becoming a necessity. One shining example of such applications is Verum Messenger — a platform that not only ensures reliable data protection but also offers a wide range of features for seamless communication. Let’s delve deeper into why Verum Messenger is becoming the new gold standard in secure and convenient communication.

Privacy and Security a Top Priority

Verum Messenger adheres to the highest standards of user privacy and security. It employs end-to-end encryption to safeguard messages from unauthorized access, even from developers themselves. This allows users to exchange personal messages without worrying about potential eavesdropping or interception.

User-Friendly Interface

In addition to high security standards, Verum Messenger offers excellent user interaction. Its intuitive interface makes it easy to use for users of all demographics. Moreover, a wide array of features, including voice and video calls, group chats, and file sharing capabilities, make this messenger an ideal choice for diverse communication needs.

Support for Additional Features

Verum Messenger doesn’t rest on its laurels and continually updates, adding new features and enhancing existing ones. Features such as secret chats with automatic message deletion, message editing, and even a dark theme for comfortable nighttime use are just some of the many options available to users.

Verum Messenger is available on the iOS platform.

***

Verum Messenger embodies the perfect blend of high security standards and user convenience, making it a superior choice for those who value their privacy and seek a reliable means of communication. With ongoing development and platform improvements, Verum Messenger is not just a messenger but also the new gold standard in secure and convenient communication.

Continue Reading

Technologies

A Guide to Online Security: Unveiling the Secrets of Verum VPN

In today’s digital world, where data is currency and privacy is paramount, it’s important to have a reliable tool to protect one’s online activity. In this context, a VPN (Virtual Private Network) becomes an indispensable instrument for ensuring security and anonymity online. Verum VPN stands out as a key player in this realm, and in this article, […]

In today’s digital world, where data is currency and privacy is paramount, it’s important to have a reliable tool to protect one’s online activity. In this context, a VPN (Virtual Private Network) becomes an indispensable instrument for ensuring security and anonymity online. Verum VPN stands out as a key player in this realm, and in this article, we will delve into why it takes the top spot.

What is Verum VPN:

Verum VPN is a leading VPN provider that offers a wide range of features to safeguard personal information online. With it, users can ensure the privacy of their data, bypass geographical restrictions, and protect their devices from malicious attacks.

Advantages of Verum VPN:

1. *Security:* Stringent security policies and data encryption make Verum VPN a reliable ally in the fight for privacy.

2. *Speed:* Specialized servers ensure high connection speeds, allowing consumers to enjoy fast and stable internet.

3. *Geo-blocking:* The service enables bypassing geographical restrictions, granting access to content that was previously inaccessible.

4. *Multi-device support:* Verum VPN supports simultaneous connections of multiple devices, making it an ideal choice for families and small offices.

5. *Ease of use:* An intuitive interface makes setting up and using the service straightforward, even for beginners.

Conclusion:

Verum VPN is not just a service; it’s a reliable partner in safeguarding your online activity. With it, you can ensure a safe and anonymous presence online without restricting your access to content. Don’t compromise your privacy—choose Verum VPN and enjoy a secure digital world.

Continue Reading

Technologies

Verum Coin (VERUM) Token Listed on Tokpie

Verum Coin (VERUM) is a BEP20 altcoin created by BitCoinPay Trade and Verum.

Market pair to trade VERUM tokens

Token Info

Verum Coin (VERUM) is a BEP20 altcoin created by BitCoinPay Trade and Verum. Verum is a messenger that guarantees privacy. Also, this app has a built-in VPN and allows users to trade a token with each other.

Risk Warning

Kindly note that trading cryptocurrencies involves considerable risks and may lead to a loss of invested capital. So, please ensure that you understand all the risks involved. Also, consider your experience level and follow independent financial advice if needed.

Useful links

Continue Reading

Trending

Exit mobile version