Page 22 - Seniors Today -April20
P. 22

2. Impersonation scam: This is the next
                                                            category of scam that is quite traumatic by
                                                            nature. Typically, the way this is played out
                                                            is a scammer pretends to be from a well-
                                                            known business house like a mobile service
                                                            provider or an internet service provider. The
                                                            scammer may call and ask for remote access
                                                            to your computer to ‘fix a problem’. They
                                                            may also e-mail you fake tax challans or
                                                            invoices threatening to cancel your service
                                                            or charge excessive penalty fees, if some kind
                                                            of overdue payment is not paid immediately.
                                                            Once the fraudster has remote access to your
         Watch out for scamsters so you don’t end up with an empty wallet  computer, he can often infect your computer
          Cybercriminals need to know the e-mail            with malware. It is often seen that the
         address and associated phone number of the         victims get trapped in such conversations
         user to lead this part of the scam. Contact        and succumb to the threats posed by the
         details can often easily be compromised.           cybercriminals.
         The scammer can then capitalise on the             Tip: Be suspicious of calls or messages
         password recovery process that allows an           you receive out of the blue. Also, just delete
         e-mail user to gain access to your account         any suspicious texts, pop-up windows or
         by a verification code sent to their mobile.       e-mails and don’t ever click on links or open
         The attacker later texts you with a message,       attachments and most importantly, never
         asking you to share the verification code          give anyone remote access to your computer.
         while posing as the e-mail provider. In these
         quick steps, a cybercriminal gains access          3. Lottery, sweepstakes and competition
         and takes over your e-mail account. With           scams
         access to your account, the scammer could          Sometimes an e-mail or a text message lands
         just lock you out! The attacker could also         in your inbox from an overseas lottery or
         add an alternate e-mail address to your            sweepstakes company out of nowhere. The
         account without your knowledge and start           idea of these scams is to trick you into giving
         getting your messages to this new address.         your personal details for giving money
         Meanwhile, you don’t even know if your             upfront or receive the prize. Once you are
         private messages have been intercepted!            deceived, Scammers typically claim that you
          Be careful when you get suspicious SMS            need to pay fees or taxes before your prize
         text messages asking about your e-mail             money is released.
         verification codes. If you are not sure about      Tip: Remember, you cannot win a prize if
         the legitimacy of such request, contact the        you haven’t entered!
         e-mail service provider directly.
         Tip: Remember as a best practice, always           4. Dating and romance scams
         use a unique password in all your accounts         Well, this is the category of scam where not
         and don’t get trapped to have the same             only youngsters get trapped, but people from
         password across your accounts.                     all age groups and sex could be the potential


    22
   17   18   19   20   21   22   23   24   25   26   27