Online Presentation title goes here

advertisement
Background
Purpose
This report summarizes
research to understand
perceptions of and exposure
to online fraud and scams.
This survey, conducted by
TRG, is an update to a similar
study that was conducted in
September 2012 by Ipsos.
Method
We conducted this survey among a
nationally representative sample of
Internet users 18–74 in the USA using
an email invitation and an online
survey.
We surveyed a total of 1,006 people
between August 26–29, 2014.
2
Background
The 2012 survey
asked Internet users
about their concerns
and experiences with
four major
categories of scams
and fraud.
In 2014, we asked
questions in the
same four categories
and refer to these in
this report as
traditional scams
and fraud.
We added two new
categories to this
year’s survey:
Facebook and phone
scams and fraud.
3
Three Main Areas of Inquiry
Concern
Experience
Steps Taken
4
5
Fewer traditional scams
New scams surface
6
Big jump in the number of people
protecting their mobile devices
On average, Internet users take three
steps to protect their mobile devices
7
Use the Internet differently
Connect using multiple devices—especially mobile
Higher engagement with social media
Have more experience of and concern
about scams and fraud
Be selective in how they protect
themselves
Strongly protect their mobile devices, but less diligent
about protecting their PCs or personal information
8
9
Concerns Are On the Rise
Change since 2012
75% are extremely or very concerned about traditional
scams and fraud
Q1. Rate your level of concern for the following online scam and fraud methods.
10
Concern Is Widespread
2014
Comparing 2014 with 2012
2 yr. p
54%
Fraudulent
websites
+11
47%
41%
Phishing
Spear
phishing
+13
44%
Major
event
scams
43%
+8
+9
+4
29%
+12
Fake
antivirus
alert
34%
Tech
support
+3
30%
Health
care
insurance
NA
33%
+9
29%
Live chat
+9
Impersonate
people you
know
Loan
intimidation
+5
+4
27%
33%
Facebook
friend added
a new photo
of you
Facebook
related
+7
25%
Traffic
ticket
31%
22%
Political
survey
+7
+5
Romance
+3
+1
-4
46%
+6
Unsecured
shopping
website
+4
32%
38%
34%
Email
shopping
Wrong
transaction
+8
31%
Overpayment
Travel
+5
+3
29%
Auction
NA
Work from
home
Lottery
+7
31%
39%
32%
+5
Advance
fee
+7
33%
Job hunter
Auto
Fraud
+7
Concern
+3
33%
NA
+3
32%
Postal,
reship
+4
11
12
13
40% fewer scams
-40%
14
Experiencing Traditional Scams Is Declining
2014
Comparing 2014 with 2022
2 yr. p
33%
-5
Fake
antivirus
alert
19%
Tech
support
-7
11%
-5
31%
Work from
home
-7
-7
Impersonate
people you
know
-4
8%
Romance
-7
17%
Loan
intimidation
8%
-1
-2
TRADITIONAL
SCAMS
Overpayment
-1
NA
14%
Email
shopping
11%
-5
Health
care
16%
-9
Spear
phishing
8%
-4
-6
10%
-6-6
0
Major
event
Lottery
-9
Fraudulent
websites
10%
Advance
fee
Postal,
reship
NA
-4
-3
35%
16%
Advance
fee/Job
FBI related
Traffic
ticket
-6
26%
Phishing
7%
Political
survey
-3
39%
13%
-2
7%
Live chat
-4
Facebook
friend added
a new photo
of you
30%
-8
17%
-5
15%
13%
Travel
-4
10%
Wrong
transaction
-5
NA
8%
Unsecured
shopping
website
-8
8%
Auction
Auto fraud
-7
-2
15
41% Experienced Scams on Facebook
Respondents reported
experiencing two scams
on average
Facebook scams are more
common among
respondents who use
mobile as their primary
way of connecting to the
web: 51% vs. 38%
24%
Find out how to
see who viewed
your profile
13%
Check if a friend
has deleted you
21%
See your total
profile
views/visitors
13%
Change your
Facebook color
21%
Free stuff
10%
Just changed my
Facebook theme.
It’s amazing!
16%
See your top 10
profile peekers
here!
8%
Check your status
update and get
a free Facebook
T-shirt
Q2. This is an additional list of scams or emails that may appear on Facebook or other popular social networking sites. All of these scams are designed to get
you to click on a link, at which point your computer would become compromised (infected with malware or viruses, your personal information put at risk,
etc.). Please select all you have personally encountered
16
60% Experienced Phone Scams
39%
Respondents reported
experiencing 1.4 phone
scams on average.
Robocall
11%
Caller ID
spoofing
28%
Telemarketing
7%
Ring tone
19%
Charity and
fundraising
6%
Family member
in distress
11%
SMS phishing
6%
Mobile phone
early upgrade
Q7. Please select all of the following telephone or mobile device scams you have personally encountered.
17
18
Laptop surpasses desktop for primary
Internet access
Smartphone ownership and usage
equal to desktop
S4. Which of the following devices to you currently own or use?
S9a. On what device(s) do you access the Internet?
S9b. Which of these devices do you use most often to access the Internet?
Laptop
78%
74%
43%
Desktop
72%
67%
38%
Smartphone
72%
63%
11%
Landline phone
60%
NA
NA
Tablet
54%
49%
8%
Game device
53%
26%
0%
Music device
51%
12%
0%
Feature phone
35%
5%
0%
eReader
25%
12%
0%
19
20
42% of PCs are attacked
daily or weekly.
PC
Mobile phone
Landline phone
Tablet
Daily
20%
22%
6% 12% 11%
11%
17%
Monthly
31%
21%
14%
9% 13% 11%
Weekly
15%
12%
49%
31%
15%
Several times a year
27%
52%
Never on this device
21
Q4. Overall, how would you grade your own actions to help safeguard yourself from online scams and fraud? A = excellent, B = above average, C = fair, D = below average, F = poor.
Change since 2012
Little
change
since 2012
in the
grades
Internet
users give
themselves
22
Change since 2012
It won’t
happen to
me
23
Change since 2012
Very little
change since
2012 in how
protected
people feel
24
25
Any Steps Taken
26
73% Took Steps to Protect Mobile Devices
2014
Comparing 2014 with 2012
2 yr. p
2.9
Average
number of
steps taken
on mobile
devices -0.3
49% I download 41% I keep the
apps only from
companies or apps
publishers I trust
programs and apps
running on my mobile
device up to date
39% I always
37% I have a
32% I keep my
31% I have
31% I set my
26% I manually
antivirus and
antispyware software
up to date
+15
Q12. Select all of the steps you take to help avoid becoming a victim of online scams or fraud.
antivirus and
antispyware software
on my mobile device
+15
use a PIN to lock my
mobile device
computer’s operating
system to install
updates automatically
+17
newer or the newest
operating system on
my mobile device
install updates on my
mobile device on a
regular basis
+9
27
97% Took Steps to Protect Computers
2014
Comparing 2014 with 2012
2 yr. p
4.9
Average
number of
steps taken
on computers
-0.2
79% Have
77% Keep my
69% I use
69% I have my
62% I keep the
59% I set my
42% I have a
36% I manually
antivirus and
antispyware software
on my computer
programs on my
computer up to date
+1
Q12. Select all of the steps you take to help avoid becoming a victim of online scams or fraud.
antivirus and
antispyware software
up to date
computers operating
system to install
updates automatically
+1
privacy and security
settings on my web
browser
computer’s firewall
turned on at all times
newer or the newest
operating system on
my computer
+2
install my computer’s
updates on a regular
basis
-1
28
98% Took Steps to Protect Personal Info
2014
Comparing 2014 with 2012
2 yr. p
7.6
76%
65%
62%
60%
59%
59%
57%
53%
53%
46%
46%
39%
38%
34%
I carefully
consider what
email messages I
open
Average
number of
steps taken
to protect
personal
info
-0
I use unique
passwords for all
(or at least
most) of the
websites I visit
+2
I carefully
consider who I
communicate
with in email, on
social media, in
instant
messaging, and
via text
I access my
email or conduct
other sensitive
transactions
only when on a
secure network
-1
Q12. Select all of the steps you take to help avoid becoming a victim of online scams or fraud.
I do business
online only with
reputable
companies and
organizations
I take time to
understand how
my information
will be used
before I decide
to buy a product
or use a service
online
-2
I use long
passwords or
phrases with
upper and
lowercase
letters, numbers,
symbols, etc.
I set my privacy
settings in social
media to
“private,” so only
friends in my
network can
view my
information
+1
I disclose only
that level of
personal data
needed to
accomplish the
task or
transaction at
hand
I change my
passwords
regularly or use
password
management
software
+3
I scrutinize links
in email, instant,
or text
messages, or on
social media
before I click
them
I regularly
manage my
social media
privacy settings
+2
I shop online
only when I
know a site uses
encryption for
transactions (i.e.,
it shows https, a
closed padlock,
or a green
address bar)
I take steps to
manage my
online
reputation
0
29
30
Millennials use newer devices more than Boomers
72%
43%
Landline phone
66%
87%
78%
24%
Desktop
71%
77%
47%
Feature phone
66%
29%
Laptop
Game device
Millennials
S4. Which of the following devices to you currently own or use?
90%
39%
Music device
63%
54%
30% 21%
Smartphone
eReader
44%
Tablet
Boomers
31
Millennials want to be
“always on.” Compared
to Boomers, the
average Millennial…
Device Used To Connect
Millennials
61%
S9a. On what device(s) do you access the Internet?
73%
85%
65%
Boomers
85%
41%
58%
39%
32
Compared to
Boomers, Millennials
are six times more
likely to use a
smartphone as their
primary access device
S9b. Which of these devices do you use most often to access the Internet?
Device Most Often Used to Connect
Millennials
52%
23%
50%
Boomers
38%
19%
3%
6%
8%
33
General
68%
66%
Phone
41%
Fee-Job
43%
34%
57%
25%
Facebook
43%
52%
52%
Shopping
70%
64%
Impersonation
34
Concern Is Higher Across Most Scams
General
57%
Fraudulent
Websites
49%
Phishing
49%
Shortened
URL
48%
Major
event
48%
Healthcare
43%
Spear
Phishing
Millennials 2014
p vs. Boomers
Fee, Job
47%
Work for
hire
44%
Job hunter
39%
Postal
forward
37%
Advance
fee
Shopping
53%
Unsecured
website
44%
Email
shopping
40%
Wrong
transactio
n
38%
Travel
38%
Auction
37%
Overpaym
ent
37%
Lottery
34%
Auto
Imperson
ation
48%
Fake AntiVirus
41%
Facebook
40%
Impersona
tion
39%
FBI
37%
Tech
support
37%
Live chat
34%
Traffic
33%
Loan
Q1. Rate your level of concern for the following online scam and fraud methods.
The figures in the lower right
corner compare 2014 survey
results with those in 2012. For
example, when compared to
2012, concern about
Fraudulent websites was up 2
percentage points.
31%
Romance
30%
Political
35
Scam Attempts
Frequency (daily/weekly)
48%
77% 72%
16% 8%
Desktop or
laptop
Mobile phone
Millennials
1%
1%
Tablet
38%
5% 19%
Landline
phone
Boomers
Q9. Do you feel you received the most scams or fraud attempts on your…?
34%
28%
10%
Desktop or
laptop
Mobile phone
Millennials
34%
29%
10%
Tablet
Landline
phone
Boomers
Q10. How frequently, if ever, do you experience any scam or fraud
attempts on your different devices? Please include scam attempts through
email, SMS, or calls.
36
Millennials See a Higher Number of Traditional Scams
Millennials 2014
Comparing 2014 with 2012
p vs. Boomers
32%
-7
Fake
antivirus
alert
21%
-3
14%
15%
Facebook
friend added
a new photo
of you
Impersonate
people you
know
+12
13%
Live chat
+10
0
-8
Loan
intimidation
+5
0
26%
Phishing
Romance
9%
Political
survey
38%
15%
Tech
support
-2
10%
FBI
15%
+5
+6
13%
7%
-1
13%
Health
care
Traffic
ticket
Fraudulent
websites
+8
Shortened
URL
+14
-1
11%
Major
event
+3
23%
Spear
phishing
+6
+5
-4
33%
Work from
home
-1
-7
28%
Job hunter
-7
+7
19%
Lottery
Advance
fee
+5
22%
33%
-4
18%
Postal,
reship
TRADITIONAL
SCAMS
Email
shopping
-1
-6
14%
Overpayment
+2
18%
+4
+5
14%
Wrong
transaction
+6
Unsecured
shopping
website
+8
13%
15%
Travel
-2
13%
Auction
Auto fraud
+7
+7
37
Millennials See A Higher Number Of Facebook Scams
Millennials 2014
Comparing 2014 with 2012
p vs. Boomers
58%
Facebook
Scams
37%
Find out how to see
who viewed your
profile
37%
See your total profile
views/visitors
24%
Check if a friend has
deleted you
23%
Change your
Facebook color
+21
+29
+17
36%
Robocall
61%
Phone
Scams
17%
Caller ID spoofing
+25
+12
+17
17%
Just changed my
Facebook theme. It’s
amazing!
+12
15%
Check your status
update and get a free
Facebook T-shirt
+11
17%
Charity and fundraising
21%
SMS phishing
0
14%
Ring tone
+6
29%
Free stuff
+26
31%
Telemarketing
-12
0
30%
See your top 10
profile peekers here!
-12
11%
Family member in
distress
+10
+13
12%
Mobile phone early
upgrade
+5
+7
38
After experiencing a scam or
fraud…
Facebook Usage After Scam Attempt
60%
48%
35%
27%
25%
5%
About the same
Less often
Millennials
Q13. You mentioned earlier you had encountered at least one Facebook-related scam or fraud attempt. Since
encountering the scam or fraud attempt(s), do you find yourself using Facebook
More often
Boomers
39
Millennials More Likely to Protect Mobile Devices
Millennials 2014
Comparing 2014 with 2012
p vs. Boomers
97%
Took steps
to protect
PCs
68% Have antivirus and
antispyware software on
my computer
68% Keep my antivirus
and antispyware software
up to date
63% I use privacy and
security settings on my web
browser
60% I have my computer’s
firewall turned on at all
times
59% I keep the programs
on my computer up to
date
50% I set my computers
operating system to install
updates automatically
44% I have a newer / the
newest operating system
on my computer
38% I manually install my
computer’s updates on a
regular basis
-4
84%
Took steps
to protect
-0.2
mobile
devices
-18
+2
+4
55% I download apps
only from companies or
apps publishers I trust
48% I keep the programs
and apps running on my
mobile device up to date
48% I always use a PIN to
lock my mobile device
40% I have a newer / the
newest operating system
on my mobile device
34% I manually install
updates on my mobile
device on a regular basis
32% I set my computers
operating system to install
updates automatically
31% I have antivirus and
antispyware software on
my mobile device
31% I keep my antivirus
and antispyware software
up to date
+15
Q12. Select all of the steps you take to help avoid becoming a victim of online scams or fraud.
+2
+2
+2
40
Boomers More Likely to Protect Personal Information
Millennials 2014
Comparing 2014 with 2012
p vs. Boomers
98%
Took steps
to protect
personal
information
63%
I carefully
consider what
email messages I
open
55%
I carefully
consider who I
communicate
with in email, on
social media, in
instant
messaging, and
via text
54%
I use long
passwords or
phrases with
upper and
lowercase
letters,numbers,
symbols, etc
50%
I set my privacy
settings in social
media to
“private,” so only
friends in my
network can
view my
information
49%
47%
47%
37%
35%
38%
I scrutinize links
in email, instant,
or text
messages, or on
social media
before I click
them
I disclose only
that level of
personal data
needed to
accomplish the
task or
transaction at
hand
I shop online
only when I
know a site uses
encryption for
transactions (i.e.,
it shows https, a
closed padlock,
or a green
address bar)
+10
47%
I do business
online only with
reputable
companies and
organizations
0
-25
46%
I access my
email or conduct
other sensitive
transactions
only when on a
secure network
-15
Q12. Select all of the steps you take to help avoid becoming a victim of online scams or fraud.
46%
I regularly
manage my
social media
privacy settings
+15
46%
I use unique
passwords for all
(or at least
most) of the
websites I visit
-17
I take time to
understand how
my information
will be used
before I decide
to buy a product
or use a service
online
-19
I change my
passwords
regularly or use
password
management
software
-8
I take steps to
manage my
online
reputation
+5
41
Millennials
60%
50%
Feel fully or very protected
Boomers
57%
62%
Extremely or very unlikely to
become a victim
Q4. Overall, how would you grade your own actions to help safeguard yourself from online scams and fraud? A = excellent, B = above average, C = fair, D =
below average, F = poor.
Q5. When thinking about all the steps you take to help safeguard yourself from online scams and fraud, how protected do you feel?
Q6. When thinking about all the steps you take to help safeguard yourself from online scams and fraud, how would you rate your probability of becoming a
victim of an online scam or fraud?
75%
76%
Self grade A or B
42
43
Respondent Demographics
Male
Married
Female
Not
married
Other
18-34
35-54
55-74
Some college
Associate,
Masters+,
or less
Bachelor
Professional
44
Respondent Demographics (con’t.)
Children <18 living in household
<$35K
$35-74K
>$75K
Yes
No
* Five percent declined to answer this question
Retired
18%
Hispanic
15%
Caucasian
64%
Other 3%
Asian 4%
African
American
13%
Student
4%
Selfemployed
8%
Part-time
10%
Unemployed
16%
Other
3%
Full-time
41%
45
Device Profiles
Laptop / Desktop
Smartphone
Tablet
iOS
39%
iPad/Mini
41%
Other
4%
Apple
15%
Microsoft 7%
Windows 4%
Blackberry 3%
Windows
81%
Android
51%
Win 7
Win 8
47%
32%
Win XP
Win Vista
10%
7%
D1. Which of the following best describes the computer you use most often to access the Internet?
D1a. Which operating system is on the desktop or laptop you use most often to access the internet?
D2. Which tablet do you use most often to access the internet?
D3. Which of the following best describes the operating system your smartphone uses?
D4. Which gaming device(s) you use to connect to the Internet?
Blackberry 5%
Other/Don’t Know 3%
Android
47%
Game Device
12%
14%
16%
Nintendo
XBox
Playstation
8%
Other
46
47
Survey Methodology
USA
General internet users
Balanced mix of ages and genders across adults 18 to 74
Sample size N=1006
Web-based survey methodology (CAWI)
Survey length approximately 20 minutes. Click to see survey. ->
Responses collected August 26–29, 2014
Respondents could take the survey on a PC or mobile device
NCSAM Online Scams & Fraud Questionnaire 2014 v-Programming Draft
PN: Show S1, S2, and S3 on same screen
ASK ALL
S1. What is your gender?
Male
1
Female
2
Prefer not to state TERM 3
PN: SET QUOTAS, max of 520 Males or 520 Females
ASK ALL
S2. Which of the following groups represents your age?
17 years old or younger
1
18-24
2
25-29
3
30-34
4
35-39
5
40-44
6
45-49
7
50-54
8
55-59
9
60-64
10
65-69
11
70-74
12
75-79 TERM
13
80 years old or older TERM
14
PN: SET QUOTAS, MUST get 250 completes codes 9-12 and 250 completes codes 2+3
ASK ALL
S3. Which of the following best describes your current employment status?
Employed by someone else, working 30 hours or more per week
Employed part-time by someone else, working less than 30 hours per week
Self-employed, working outside your home
Self-employed, working in your home
Student
Retired
Not currently employed
Other
1
2
3
4
5
6
7
8
Prospective respondents drawn from online panels and recruited via email. Research
sponsor will not be revealed.
Sample sourced from Microsoft pre-approved list of online panels.
Respondents completing the survey will receive standard panel incentives
48
Definitions: General Scams
During the survey, respondents could see a description of the scam or fraud by placing their cursor
over the name of the scam or fraud.
Phishing scams: Phishing is a virtual trap set by cyber thieves who use official-looking emails, phony websites, instant messages, and posts on social networks
that mimic those of trusted businesses and brands, to trick you into revealing personal information.
Spear-phishing scams: Spear-phishing is a phishing scam that targets a specific organization in which criminals seek unauthorized access to confidential data.
Spear- phishing attempts are not typically initiated by random hackers, but are more likely to be carefully researched and conducted by perpetrators seeking
financial gain, trade secrets, or military information.
Fraudulent website scams: These websites are often set up by phishers and other scammers as the destination for a phishing attack. These sites look
legitimate, often impersonating your bank, credit card company, or other trusted institution. The sites are designed to trick you into either providing your
sensitive personal information or downloading malicious software onto your computer.
Major event scams: These scams exploit concern and interest around current events or other popular topics, preying on your sympathies or your need to be
“in the know,” to lure you into clicking a link to a fraudulent website that downloads malware onto your machine. Scams have revolved around relief for natural
disasters such as the 2011 tsunami in Japan, links to celebrity videos everyone is talking about, or supposed cheap tickets to high-demand sporting events
such as the World Cup or Olympics.
Shortened URL scams: Given the demand for shortened URLs driven by social media like Twitter, scammers are now using these shortened URLs to trick you
into clicking links that otherwise might appear suspicious to you. Many of us now know how to spot a suspicious URL in a link, but if the URL is shortened
using one of the common URL shortenings such as bit.ly or owl.y, it may not be so obvious. Scammers are now disguising their links to fraudulent websites or
malware downloads by first converting them to shortened URLs before sending them in tweets, social networking posts, or other communications.
Health care / insurance scams: The scammer typically offers “free” medical equipment, discounted health plan, or other healthcare services in exchange for
money and or personal information. The products or services are never delivered.
49
Definitions: Advanced Fee, Job Scams
During the survey, respondents could see a description of the scam or fraud by placing their cursor
over the name of the scam or fraud.
Advance-fee fraud (e.g., “Nigerian Prince”) scams: These email scams seek to trick you into wiring money, or try to gain access to your bank account or
debit card, by asking you to be an accomplice who will help the sender—often some “foreign dignitary”—to transfer large sums of money into their account
for a cut of the total. However, before the transaction can be finalized, the fraudster requires an up-front payment to cover "taxes," "attorney costs," "bribes," or
other advance fees.
Job hunter scams: Scams targeting job hunters that attempt to gain access to personal information such as bank account or social security numbers and
requires a fee to be considered for a job. Money launderers often create job postings on popular sites such as Monster.com that say they're recruiting
American citizens to "process payments" or "transfer funds," because as foreign nationals, they can't do it themselves. When you respond to the ad, you’re
offered a “job” and asked to provide personal and bank account information. The criminal may wipe out our your bank account, or even worse, ask to use your
bank account to move stolen or bad checks and keep a percentage as your pay. You may then be liable to your own bank for depositing the scammer's checks,
and even find yourself implicated in the crime.
Work-from-home scams: These take on various forms, but typically fall into two categories: 1) asking you to work from home stuffing envelopes, assembling
crafts, etc., or 2) "helping" you start your own home-based business (e.g., mystery shopper, network marketer, etc.). The only money anyone sees is the money
the scammer pockets from the “start-up costs” you send.
Postal forwarding or reshipping scams: These scams begin with online ads seeking a “correspondence manager” for an offshore corporation that lacks a U.S.
address or bank account, and needs someone to accept goods and ship them overseas in exchange for a percentage of the goods transferred. Stolen products
are shipped to your address, which you reship to the thieves, who fence them overseas. Or, you may be asked to accept wire transfers into your bank account
and then transfer the money (stolen funds) to the account of your “new boss,” obscuring the money trail. Either way you can end up with your bank accounts
drained, and you may even be implicated in the criminal operation.
.
50
Definitions: Shopping & Auction Scams
During the survey, respondents could see a description of the scam or fraud by placing their cursor
over the name of the scam or fraud.
Lottery or “Congratulations, you’ve won!” scams: These scams inform you that you’ve won a lottery or a particular item—typically the hot gadget du jour such as an iPod or Xbox.
But, before you can receive the winnings or prize, you’re asked to send money in advance to cover processing fees or taxes. They seek to trick you into wiring money, or try to gain
access to your bank account or debit card. If you send the fee, the scammer may invent other fees.
Auction scams: These scams list items on auction sites such as eBay. When you “win” the auction and pay for the item, you never receive it, or the descriptions don't match the
product.
Wrong transaction scams: Scammers send an email from a hotel or airline that you recently patronized, citing an incorrect charge to your credit card. They then ask you to go to a
(fraudulent) website and complete a form for a refund.
Email shopping scams: Scammers send an email from your favorite store offering a huge discount. The link takes you to a fraudulent site that can install malware on your computer or
access sensitive personal information.
Unsecured shopping websites: An unsecured website does not use encryption technology to protect information being sent to and from the site. While unsecured websites are not
scams themselves, they are common targets for fraud, so if you enter sensitive information there, it can easily be stolen and used for identity theft. You can distinguish secure websites
from unsecure ones by looking for “https://” vs. “http://” at the beginning of a site’s URL. The ‘s” indicates the site is secure. You can also look for a closed padlock either next to the
web address or in the lower right corner of the window.
Auto fraud scams: Scammers attempt to sell you a car online that they do not own. Often the reason stated is an impending move, which the scammer uses as a reason to rush the
sale and avoid meeting in person. The scammer then asks you to wire money to a third party who will hold the money in “escrow” until the car is delivered. The scammer takes the
money and doesn’t deliver a vehicle.
Overpayment scams: In these scams, a buyer “overpays” you for something you may be selling online—either through a popular auction site or classified ads service. The scammer
overpays with a money order that looks real, but is fake. He or she then asks you to send or wire back the difference. You are out the money you send and if you provided the scammer
with any account information to “refund” the money, you could lose the money in your bank account as well.
Travel Scams: You receive an email telling you that you've won a vacation. The vacation that you've "won" likely isn't free. And the "bargain-priced" luxury travel package you're
offered may not fit your idea of luxury.
51
Definitions: Impersonation Scams
During the survey, respondents could see a description of the scam or fraud by placing their cursor
over the name of the scam or fraud.
Tech support scams: These begin with a scammer posing as a tech support person from a respected company, like Apple, Dell, or Microsoft. You might come
into contact with these scammers by searching for technical support in a search engine, or the scammers might cold-call you. The scammer claims that your
computer is infected with a virus or has some technical problem, and offers to fix it. He or she suggests that you go to a fraudulent website to download the
software. If you do so, you may install malicious software that could capture sensitive data, such as user names and passwords. The thieves might also try to
charge you to remove the “virus.”
FBI-related scams: A caller claims that you are delinquent on your taxes or some government loan or subsidy and must repay the money owed to avoid legal
action. The caller purports to be from the FBI, IRS, or other government agency, or to represent a law firm or collection agency. You are then directed to a
fraudulent website to pay your “debt.”
Loan intimidation scams: A caller claims you are delinquent on a loan and must repay it to avoid legal consequences. The caller purports to be a
representative who collects debts for legitimate-sounding agencies or companies. You are then directed to a fraudulent website to pay your “debt.”
Traffic ticket scams: email claims that you were issued a traffic ticket and must pay the fine to avoid legal action. Callers purport to be agents who collect
debts for legitimate-sounding agencies. You are then directed to a fraudulent website to pay your “fine.”
Live chat scams: Through malicious code already installed on your machine, scammers generate a “live chat” pop-up when you visit your bank’s website. (The
bank’s website has not been hacked—the pop-up is generated from your own, already compromised computer.) The pop-up impersonates a bank service rep
who tells you that the bank system doesn’t recognize you and asks you to provide information to confirm your identity. This scam is particularly effective
because it occurs while you are visiting a site that you know is secure and authentic.
52
Definitions: Impersonation Scams (con’t.)
During the survey, respondents could see a description of the scam or fraud by placing their cursor
over the name of the scam or fraud.
Political survey scams: Initially, you receive a phone call from an organization purportedly conducting a political survey. After answering a few questions, you
are told that you have won a prize of some sort and told you must pay a processing fee to receive it. You are given a web address where you can verify the
legitimacy of the call and there you are asked for your credit card information.
Romance scams: On an online dating service or other social network, a scammer poses as someone who likes you and asks for your email address, at which
point you get marketing email or other spam. Or, the scammer asks you to send money to pay for a trip to visit you or to help them deal with some personal
“family emergency.”
Fake antivirus alert scams: These scams try to trick you into downloading malware onto your computer by delivering a fake alert that tells you your computer
is infected with a virus. Fake virus alerts are usually generated by a “Trojan”—a program that takes control of your computer after you open an email
attachment, click on a pop-up advertisement, or visit a malicious website.
Scams impersonating people you know (e.g., fraudulent requests to wire money): These scams typically start when a friend or family member’s email or
social networking account has been compromised. The scammer impersonates your friend or family member and sends you an email detailing some crisis
(e.g., having been robbed while travelling overseas), and asks you to wire money.
Facebook friend added a new photo of you scam: This scam sends you a fake email from Facebook claiming a close friend has tagged you in a photo. It
asks you to click on the attachment to see the photo. Clicking it releases malware in the form of a “Trojan”—a program that takes control of your computer.]
53
54
Download