In the VSECU Blog you'll find financial and lifestyle resources to help empower possibilities for your personal success.
We have explained how spoofing can be used to deceive a fraud victim. Now let’s look at a few other common methods fraudsters use in conjunction with spoofing to gather information and carry out their scams: phishing, vishing, and smishing.
Between information stolen from data breaches and personal details we share on social media, fraudsters can be equipped with a lot of information about who we are. However, they may need to gather additional information not readily available in order to access our personal and financial accounts and perpetrate their schemes. So that we can better protect ourselves, it is important that we understand some of the typical methods fraudsters use to collect this information. This is the first in a series of blog posts on common fraud tactics. In it, we’ll examine a method known as spoofing.
The modern world is filled with convenience that would have been nearly unimaginable twenty years ago. From where I sit in Montpelier, I can have food delivered from five different grocery stores within two hours. I can place an order online at a local store, have my items gift wrapped, and sent to my family on the other side of the country in only two clicks. Unfortunately, our modern world can also have its drawbacks. Much of the convenience we experience every day relies on putting our personal information on countless websites, order forms, phone trees, social networks, and mobile apps. The more places our information is stored, the more we open ourselves up to fraudulent activity. Luckily, there are some simple ways to reduce risk and keep your information private without sacrificing convenience.
What is a grandparent scam? No, it is not when a child receives a “No” from their parents and then goes and asks their grandparents because they’re more likely to get the answer that they want. It is far more manipulative than that.
Sign up for our blog and get Six Tips for Improving Your Credit Score free!
It’s that time of year again when we try to find the perfect gifts for our friends and loved ones. We’ll probably be doing most of our holiday shopping online this year to avoid crowded stores. In addition to taking care of your physical health and safety, it is important to be careful with your personal information so that you do not become a victim of cybercrime. Cyber criminals are working overtime during the holiday season when consumers are making more purchases and providing their personal information more frequently. Your information can be stolen from your computer or from the company that you are buying goods from through viruses, malware, and ransomware. Be street smart on the web and use the tools at your disposal to protect yourself from cybercrime. Here are a few tips to help you shop online safely.
Two of the most lucrative scams for fraudsters involve online banking and wire fraud. In most cases, the two methods provide quick access to victims’ funds. However, there are several signs you can look for that indicate you might be the target of online financial fraud. For both online banking and wire fraud, we’ll cover what fraudsters typically do when they are trying to gain access to your money and how you can protect yourself.
WHAT IS A ROMANCE SCAM? A romance scam is a specific type of confidence scam, in which a person is defrauded after another person has gained their trust. In this scenario, the fraudster creates a fake identity to gain the victim’s affection and trust, then exploits this relationship for their financial gain.
Check fraud is a criminal act in which one person convinces another to exchange real money or property for a bogus check. In many cases, the fraudster creates a sense of excitement and urgency, giving their victims very little time to think rationally. By the time the victim realizes what has happened, they may have lost thousands of dollars (maybe even more), with no way to recoup their losses.