Normal view

There are new articles available, click to refresh the page.
Yesterday — 3 December 2024Main stream

9 ways scammers can use your phone number to try to trick you

1 December 2024 at 10:00

Scammers have various methods when it comes to getting their hands on your phone number. You might think, "Well, what's the big deal? Isn't it easy to find someone's number these days, no matter what?" Yes. And if you've already had your fair share of telemarketers call you, maybe you feel like you've got it under control.

The problem is that scammers with the right knowledge and the wrong intentions can wreak havoc just by having your phone number in their possession. 

Once they do, they can use it to trick you in all sorts of ways. 

The good news is that by familiarizing yourself with their tactics, you can be one step closer to preventing yourself from falling victim to them. Here's what you need to know.

2 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)

In today’s digital age, your phone number is more than just a way for friends and family to reach you. It can be a gateway for scammers to access your personal information and wreak havoc on your life. From phishing attempts to extortion, the risks are numerous and varied. Here are nine ways scammers can exploit your phone number if it falls into the wrong hands:

Scammers can also use your phone number to launch rather easy phishing attacks. They might send text messages or make calls posing as your bank or a popular online service that you subscribe to. The goal is to call you and trick you into providing login credentials, credit card details or other personal information, which they can then use for fraudulent activities. And once they have all your other information, they can do a lot more damage just by having your phone number as that initial segue.

In some cases, scammers use your phone number for extortion or blackmail. They may claim to have compromising information about you and demand payment to keep it private. By contacting you directly, they can apply continuous pressure, making their threats seem more real and immediate.

One unique way they do this to target elderly people is by pretending to be your grandchild or another relative in distress. The scammer often claims that your grandchild is in an emergency situation — such as needing bail money or medical assistance — and urgently requests financial help. With AI voice cloning technology, they may even be able to use your grandchild's voice. This emotional manipulation usually gets the victim to pay up.

This one may not be as dramatic, but your phone number can be sold to robocall and spam message services. These automated systems bombard you with unwanted calls and texts, often promoting scams or fraudulent products. While these may seem like minor annoyances, they can lead to bigger scams if you engage with the messages or follow their instructions. Hang up on them.

HOW TO STOP ANNOYING ROBOCALLS

Phone number spoofing is a common tactic where scammers disguise their caller ID to appear as a trusted contact by calling from what appears to be a familiar number as it may have the same area code where you live, an area code where your friends or family live or even the actual phone number of someone close which you can recognize.

This makes it more likely that you'll answer the call, giving them the opportunity to deceive you into revealing personal information or transferring money. This is, of course, the case when phone spoofing is used against you. But in situations where they use YOUR phone number, they can be scamming those close to you without you even knowing!

With these phone spoofing tactics, scammers can use your phone number to impersonate government officials, such as IRS agents or Social Security administrators. They may call you claiming there’s an urgent issue, like unpaid taxes or suspicious activity involving your Social Security number. This ploy often involves threats of legal action or arrest to pressure you into providing sensitive information or making immediate payments.

Instead of pretending to be from a government agency, another trick is for scammers to try their luck by posing as a representative from a utility company, like an electric or water company. Scammers will claim that you have an overdue invoice and threaten to cut off your service unless you pay immediately. Using your phone number, they can contact you repeatedly, making the scam seem more legitimate (and pressing).

SIM swapping or a port-out scam is when scammers transfer your phone number to a new SIM card in their possession. By convincing your mobile carrier to reroute your number, they can receive all your calls and messages, including those containing two-factor authentication codes. This allows them to bypass security measures and take over your online accounts.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

With SIM swapping techniques/port-out, scammers can also use your phone number as a key to access sensitive data stored in your online accounts. By initiating password resets and intercepting verification codes sent via SMS, they can gain unauthorized access to your email, social media and banking accounts, leading to significant personal and financial damage.

Finally, scammers can use all the tactics above to not only access the accounts you already have but also create fake online accounts in your name. These accounts can be used for a variety of malicious purposes, such as spreading malware, launching further scams or conducting identity theft. The presence of your phone number makes these accounts appear more legitimate, increasing the chances of deceiving others.

10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE'S SECURITY AND PRIVACY

To protect your phone number from falling into the hands of scammers, here’s what you can do:

1. Be cautious about sharing your phone number publicly: Avoid posting your phone number on public forums, websites or social media platforms where it can be easily accessed by scammers.

2. Limit exposure of your phone number on social media and other online platforms: Use privacy settings to restrict who can see your contact information. Most social media platforms and online services offer privacy settings that allow you to control who can view your personal information. Make sure to review and adjust these settings regularly. Only share your phone number with trusted contacts.

3. Consider using a secondary number for online registrations and transactions: Services like Google Voice can provide you with a secondary number that you can use for online activities, keeping your primary number private.

4. Monitor your accounts regularly for unusual activity: Check your bank accounts, email and other online accounts for any signs of unauthorized access or suspicious activity.

5. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Use two-factor authentication apps instead of SMS-based verification where possible: Two-factor authentication (2FA) provides an extra layer of security that is more difficult for scammers to bypass compared to SMS-based verification.

7. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

8. Remove your personal information from the internet: While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you suspect that scammers already have your phone number, take the following steps:

Contact your mobile carrier to alert them of the scam calls, especially if they come from the same number. Your carrier may be able to block the number or provide additional security measures.

Consider changing your phone number if the issue persists: If scam calls continue despite your efforts, changing your phone number may be the best solution.

Report any suspicious activity to the appropriate authorities: Contact your local law enforcement or consumer protection agency to report scams and seek advice on further actions.

Consider placing fraud alerts on your accounts: Fraud alerts can help protect your credit and financial accounts from unauthorized access.

Monitor your phone for unusual calls or messages: Keep an eye out for any unexpected calls or messages, and do not respond to them.

Check your phone bill for unauthorized charges: Regularly review your phone bill to ensure there are no unexpected charges, which could indicate that your number has been used fraudulently.

By following these steps, you can significantly reduce the risk of falling victim to phone number scams and protect your personal information.

RECLAIM YOUR PRIVACY BY DISABLING YOUR CELL PHONE CARRIER'S DATA TRACKING

Scams have become much more sophisticated these days, especially with artificial intelligence, making it easier for scammers to target more people and get away with it. Always be wary of a scam. If you think something seems strange, it's probably best to go with your gut.

Have you ever experienced a scam involving your phone number? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Amazon’s VP explains how to protect yourself from holiday impersonation scams

28 November 2024 at 06:00

Black Friday is around the corner, and by the time you finish your Thanksgiving leftovers, Christmas will already be knocking. That might be an exaggeration, but what’s not is the rise in impersonation scams as the holiday season approaches. 

With shopping in full swing, Amazon becomes an especially big target. Expect to see bad actors pretending to be trusted contacts, trying to access sensitive information like Social Security numbers, bank details or Amazon account credentials.

To help you enjoy a scam-free shopping experience this holiday season, we spoke with Scott Knapp, VP of Worldwide Buyer Risk Prevention at Amazon, to learn how scammers impersonate the platform, what Amazon is doing to fight holiday scams and how you can stay safe.

5 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS(ends 12/2/24 12 pm PT)

Amazon is the world’s largest e-commerce platform, and it becomes even more relevant during the holiday season. With so many of us hunting for deals, scammers are well aware and ready to take advantage. They often use impersonation scams to trick shoppers into handing over card details or other sensitive information.

"During the 2023 holiday shopping season (Black Friday through Christmas Day), the most commonly reported impersonation scam by Amazon customers involved fake order or shipping confirmations claiming that payment was required in the U.S. There was nearly a 1.5x increase in reports of this scam from three weeks prior," Knapp said. 

Another common impersonation scam around this time involves fake purchase alerts for popular tech products. Knapp said that Amazon saw about a 13x spike in customer reports compared to three weeks earlier.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

It’s clear that many scammers are trying to target Amazon customers, so I wanted to understand what the company is doing to keep them safe. I asked Knapp a bunch of questions about how the e-tail giant is staying ahead of the latest online holiday scams, and you can read his responses below.

How is Amazon working to take down phishing websites and phone numbers used in impersonation schemes?

"Our goal is to ensure that customers are protected when they shop on Amazon. That is why we are initiating the takedown of scammers with public-private partnerships to hold bad actors accountable. We have a team – including machine learning scientists and expert investigators – who protect our store and consumers from fraud and other forms of abuse.

"In 2023 alone, we initiated takedowns of more than 40,000 phishing websites and 10,000 phone numbers being used as part of impersonation schemes. We can take down reported scam phone numbers the same day and phishing websites in just a couple of hours. We also partner with law enforcement across the globe to ensure scammers are held accountable, including having referred hundreds of bad actors to authorities."

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Can you explain how Amazon's email verification technology helps identify phishing attempts?

"We’ve made it harder for bad actors to impersonate Amazon communications through implementing industry-leading tools, including the adoption of a secure email capability to make it easier for customers to identify authentic emails from Amazon and avoid phishing attempts. Customers using Gmail, Yahoo, and other common email providers can be confident that when they receive an @amazon.com email with the smile logo in their inbox, that email is really from us."

Can you explain Amazon's A-to-z Guarantee and how it protects holiday shoppers?

"More than 60% of sales in Amazon’s store are from independent sellers—most of which are small and medium-sized businesses—providing a vast selection of amazing products, competitive prices, and convenience for consumers. When customers shop in the Amazon store, they can do so with peace of mind knowing that we stand behind the products sold in our store with the A-to-Z Guarantee.

"When a claim is filed, Amazon combines our advanced fraud and abuse detection systems with external, independent insurance specialists to analyze filings, take on the investigative work for our selling partners, present valid claims, and deny unsubstantiated, frivolous, or abusive claims. By doing this work on behalf of sellers, we save them from having to investigate these claims on their own. Innovating this process enables customers to shop confidently, which in turn drives selling partner success.

"Amazon’s protection applies to physical products purchased in our store worldwide, and in the unlikely event that customers experience issues with timely delivery or the condition of their purchase, whether purchased from Amazon or one of our approximately two million selling partners, Amazon will make it right by refunding or replacing it. Whether during the holiday shopping season, or anytime throughout the year, customers can confidently shop Amazon’s vast selection of amazing products with the A-to-z Guarantee."

BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

1. Watch out for red flags: Some telltale signs of an impersonation scam include requests for account or payment information and creating a false sense of urgency. Amazon will never ask for your password, payment or bank transfer through phone, email or any external website. Scammers might reference a purchase (real or fake), a giveaway, a prize or claim that "your account is locked," urging you to click a link, make a payment or buy a gift card.

2. Verify the email: For any questions related to an order, always check your order history on Amazon.com or via the "Amazon Shopping" app. Only legitimate purchases will appear in your order history. If you are ever unsure about the legitimacy of an email, go to Amazon’s website or app to access the Message Center and review authentic communications.

In addition, you should always check the sender’s email address by hovering over the "From" name and verify it’s a genuine Amazon email, which will come from "@amazon.com."

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Beware of phishing links: Avoid clicking on random links, especially in messages about shopping deals, order confirmations or account issues. Scammers often use fake links to mimic legitimate retailers and steal your information. 

The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Don’t fall for "too good to be true" offers: Scammers often lure victims with irresistible deals, such as huge discounts on popular products or "exclusive" offers. If an offer seems too good to be true, it probably is. These offers might be tied to fake websites or phishing attempts designed to steal your personal and financial details. Always double-check the legitimacy of any deal before making a purchase. If you’re unsure, visit the official Amazon site or app to search for the product and compare prices.

5. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

6. Report suspicious activity: If you encounter an impersonation scam, your best course of action is to report it to Amazon. Knapp says, "The more consumers report scams to us, the better our tools get at identifying bad actors so that we can take action against them and protect consumers. If consumers suspect that they have encountered a scam, they can report suspicious communications to us at amazon.com/ReportAScam, so that we can protect their accounts and refer bad actors to law enforcement to help keep consumers safe."

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Scammers will do their best to ruin your holiday season, but most of their tactics can be easily avoided with the right tools and a little common sense. Be cautious of unsolicited texts, emails or phone calls offering deals, discounts or asking for your personal information. If you're shopping on Amazon, track everything through the Amazon app and reach out to their customer support for any concerns or questions.

What features or tools do you wish online retailers would implement to enhance customer security during peak shopping times? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers 

Best gifts for Men | Women | Kids | Teens | Pet lovers 

Copyright 2024 CyberGuy.com. All rights reserved.

Spotify playlists are being hijacked to promote pirated software and scams

28 November 2024 at 10:00

Many of us use Spotify every day, whether to listen to songs, podcasts or audiobooks. Some of us create playlists of our favorite songs, while others save playlists made by others. 

In case you didn’t know, Spotify allows you to create public playlists that anyone can save and listen to. You’d think this is a harmless feature, but spammers have found a way to misuse it. 

They’re using Spotify playlists and podcasts to push pirated software, game cheat codes, spam links and malware sites. I’ll discuss the details of this emerging online scam and share tips on how to stay safe.

5 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (ends 12/2/24 12 pm PT)

As reported by BleepingComputer, this scam works by misusing Spotify’s popularity and trustworthiness. Scammers exploit Spotify playlists by injecting targeted keywords, such as "free download," "crack" or "warez," into titles and descriptions. 

These keywords are designed to align with popular search terms. Since Spotify’s web player pages are indexed by search engines like Google, these spammy results appear in user searches, driving traffic to their links. For example, a Spotify playlist titled "Sony Vegas Pro 13 Crack…" was found promoting "free" software sites in its title and description, directing users to questionable external links.

The scam isn’t limited to playlists. It extends to podcasts as well. Scammers create podcasts with multiple short episodes, typically under 20 seconds, using synthesized speech to direct listeners to click links in the description for free content. These podcasts often target users searching for pirated ebooks, audiobooks or game cheats. While the content may appear legitimate at first glance, clicking on the links often results in being redirected to unsafe pages that further exploit users.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

The main goal of this scam is to use Spotify’s trusted reputation and search engine visibility to get people to click on shady links and visit sketchy websites. Scammers make money through fake ad clicks, bogus surveys and affiliate links, while also spreading malware by tricking users into downloading harmful software or extensions. 

They also try to steal personal info through fake sign-up forms or phishing pages, which can lead to identity theft or be sold to others. By using Spotify’s indexed pages, they boost the search rankings of their spam sites, reaching more people. Some of these sites even run extra scams like fake crypto giveaways or phishing attempts to grab even more money or data from unsuspecting users.

CLICK HERE TO SIGN UP FOR THE ENTERTAINMENT NEWSLETTER

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

1. Avoid clicking on suspicious links: Be cautious when you come across playlists or podcasts with titles like "Sony Vegas Pro 13 Crack" or other promises of free software, audiobooks or game cheats. These often include links in the description that redirect to unsafe sites hosting malware, adware or phishing pages.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to official sources: Always download software, eBooks or other digital content from trusted official websites or reputable platforms. If you see a Spotify playlist or podcast offering "free" versions of paid content, it’s likely a scam. Cross-check the legitimacy of the content through known channels instead of relying on unverified links.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Use strong, unique passwords: Create complex and unique passwords for your Spotify account and avoid using personal information like birthdays or pet names. Consider using a password manager to generate and store complex passwords.

4. Be skeptical of synthesized speech and short episodes: Many scam podcasts feature short episodes (10-20 seconds) with synthesized speech directing you to click on a link in the description. These are a common tactic used to trick users into visiting unsafe pages. If the content feels automated, vague or overly promotional, it’s best to avoid it.

5. Verify curator credentials: Check the credentials of playlist curators. Legitimate curators usually have a verifiable online presence. If you can't find any information about them, it's best to avoid engaging with them.

6. Recognize phishing attempts: Be cautious of emails claiming to be from Spotify that ask you to confirm account details or click on suspicious links. These are often phishing attempts designed to steal your credentials.

7. Report and block suspicious content: If you come across playlists or podcasts that seem fraudulent or inappropriate, report them directly to Spotify. Use Spotify’s reporting tools to flag content that violates its platform rules. Blocking suspicious accounts or playlists also ensures you won’t accidentally interact with them in the future, and reporting helps Spotify improve its filtering and moderation systems.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Scammers will use any means possible to trick you. In the past, we’ve seen bad actors weaponize Google search results with malicious websites that install malware when links are clicked on. There have also been plenty of SEO scams targeting users. Companies like Spotify need to implement measures to prevent their platforms from being misused by scammers. Google also has a responsibility to ensure the quality of its search results. Just because a webpage comes from a well-known organization doesn’t mean it deserves to rank highly on the search results pages.

Do you think platforms like Spotify and Google are doing enough to prevent scams, or could they improve? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers 

Best gifts for Men | Women | Kids | Teens | Pet lovers 

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌