{"id":115973,"date":"2018-12-28T08:15:38","date_gmt":"2018-12-28T07:15:38","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=115973"},"modified":"2025-07-01T22:36:21","modified_gmt":"2025-07-02T05:36:21","slug":"online-scams-in-2019","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/online-scams-in-2019\/","title":{"rendered":"New year, new scams: what to watch out for in 2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-116237\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/12\/phishing-scam-hacker-malware-700.jpg\" alt=\"phishing scams\" width=\"700\" height=\"467\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/phishing-scam-hacker-malware-700.jpg 700w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/phishing-scam-hacker-malware-700-300x200.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p class=\"p1\">No matter how often we\u2019ve been warned about phishing scams and shady web-based transactions, we still fall for the fraudsters. According to an article in Forbes, costs associated with cybercrime are expected to <a href=\"https:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/01\/17\/cyber-crime-costs-projected-to-reach-2-trillion-by-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">top $2 trillion next year.<\/a><\/p>\n<p class=\"p1\">The <a href=\"https:\/\/www.bbb.org\/scamtracker\/us\"><span class=\"s1\">Better Business Bureau Scam Tracker<\/span><\/a> shows over 142,000 scams were reported this year in the U.S. \u2014 ranging from healthcare and Medicare scams to counterfeit products and online purchases.<\/p>\n<p class=\"p1\">And it&#8217;s not just the elderly falling victim to fraud. According to the FTC, <a href=\"https:\/\/www.ftc.gov\/news-events\/press-releases\/2018\/03\/ftc-releases-annual-summary-complaints-reported-consumers\"><span class=\"s1\">40% of consumers who reported fraud were between the ages of 20 and 29<\/span><\/a>.<\/p>\n<p class=\"p1\">In any case, here are some of the biggest scams to watch out for in the coming year.<\/p>\n<h2>Online scams to avoid in 2019<\/h2>\n<h3 class=\"p1\">Phishing \u2014 evolved<\/h3>\n<p class=\"p1\">Phishing isn\u2019t exactly new. This form of fraud has been with us for a long time now. But as tech gets ever more sophisticated, so does phishing.<\/p>\n<p class=\"p1\">In the past, phishing attacks were more numbers game than anything. Hackers would cast a wide net using a generic email asking for credit card info, passwords, or other pieces of sensitive information.<\/p>\n<p class=\"p1\">Today, phishing attacks look more like they came from a specific company. Called &#8220;<a href=\"https:\/\/usa.kaspersky.com\/resource-center\/definitions\/spear-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">spearfishing<\/a>,&#8221; <strong>hackers might pose as your bank, credit card company, or a site like Dropbox or PayPal.<\/strong> Generally, targets receive an email that looks as if it came from a legitimate business. You might be prompted to click on a link to &#8220;verify account details&#8221; and from there,\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3227046\/malware\/what-is-a-fileless-attack-how-hackers-invade-systems-without-installing-software.html\" target=\"_blank\" rel=\"noopener noreferrer\">fileless malware<\/a>\u00a0is installed on your device.<\/p>\n<p class=\"p1\">Where you once had to download a file or an app to get malware, it&#8217;s now a matter of clicking a link. These fileless attacks are also more difficult to detect, as most antivirus programs only scan your hard drive.<\/p>\n<p>Here&#8217;s a look at how fileless phishing works, courtesy of CSO Online:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-116134 size-large\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2-1024x1016.png\" alt=\"Fileless malware\" width=\"840\" height=\"833\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2-1024x1016.png 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2-150x150.png 150w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2-300x298.png 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2-768x762.png 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2-1200x1190.png 1200w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-8.57.18-PM-2.png 1250w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/p>\n<h3 class=\"p1\">Mobile fraud<\/h3>\n<p class=\"p1\">With the rise of mobile traffic, it\u2019s no major surprise that fraudsters are meeting victims on their turf. Losses from mobile fraud are reportedly in the billions, expected to rise.<\/p>\n<p class=\"p1\">Mobile fraud comes in a few different forms. One example is click flooding, or click spamming, which takes advantage of users of some unpaid apps. When someone installs certain free apps, a serious of fraudulent clicks take place \u2014 which makes it seem like people are clicking on a paid ad.<\/p>\n<p class=\"p1\">Click flooding is an issue for advertisers more than consumers \u2014 as this form of fraud messes brands\u2019 marketing strategies.<\/p>\n<p class=\"p1\">Marketers might think they\u2019re getting a high volume of organic clicks and end up paying more for ads that ultimately don\u2019t work.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-116239\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/12\/phone-scam-malware-700.jpg\" alt=\"phone scams\" width=\"700\" height=\"490\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/phone-scam-malware-700.jpg 700w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/phone-scam-malware-700-300x210.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p class=\"p1\">Then there\u2019s a newer form of mobile ad fraud, SDK spoofing. This involves a bot that hides on an app, which is essentially a cheaper way to buy fake followers.<\/p>\n<p class=\"p1\">With <a href=\"https:\/\/www.adweek.com\/digital\/mobile-ad-fraud-is-surging-as-scammers-get-smarter-researchers-say\/\">SDK spoofing<\/a>, bots create fake requests made from an app to the servers of attribution companies and app publishers. The fake requests make it appear that a certain amount of users are running an app, though in reality, the app was never opened.<\/p>\n<h3 class=\"p1\">Social security scams<\/h3>\n<p class=\"p1\">According to Consumer Reports, fraudsters are increasingly making <a href=\"https:\/\/www.consumerreports.org\/scams-fraud\/fake-calls-from-social-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">harassing calls posing as the Social Security Administration<\/a>.<\/p>\n<p class=\"p1\">The SS scam is the new IRS scam, and it\u2019s more dangerous for a couple of reasons. Today, crooks have their hands on robocalling technology, so they can call more people, playing the numbers game until someone eventually pays. Second, it\u2019s gotten easier to spoof caller IDs.<\/p>\n<p class=\"p1\">You might have noticed this on your cell phone. Often, scammers call using a number from your local area code \u2014 and a similar phone number. In the case of the social security scam, scammers are using an 800 number that looks like a real deal call from the administration.<\/p>\n<p class=\"p1\"><strong>What to look out for:<\/strong> this scam is generally preying on Medicare patients and the elderly. Scammers reportedly have told people they\u2019re going to lose their benefits and ask for personal information to keep those benefits.<\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/10\/phone-spam-192.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">3 best apps for blocking spam phone calls<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/the-3-best-apps-for-blocking-spam-phone-calls\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Read Now \u25ba<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/the-3-best-apps-for-blocking-spam-phone-calls\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h3 class=\"p1\">Tech support fraud<\/h3>\n<p class=\"p3\"><span class=\"s1\">According to Experian,<a href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/what-are-tech-support-scams\/\"> tech support scams were responsible for over $15 million in losses in 2017<\/a>. These scams take a few different forms. <\/span><\/p>\n<p class=\"p1\">One example involves using phishing emails as a way to <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/07\/hyper-targeted-attack-against-13-iphones-dropped-malicious-apps-via-mdm\/\"><span class=\"s2\">send Apple users to a fake website<\/span><\/a>\u00a0where <strong>malicious code is inserted into apps like WhatsApp and Telegram.<\/strong> The code collects information like SMS data, photos, and contact details, which may be used for blackmail later on.<\/p>\n<p class=\"p1\">Users might receive a message like the one below, which looks like a routine update.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-116135 size-large\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-9.00.50-PM-1024x679.png\" alt=\"fake apple support scam\" width=\"840\" height=\"557\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-9.00.50-PM-1024x679.png 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-9.00.50-PM-300x199.png 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-9.00.50-PM-768x509.png 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/12\/Screen-Shot-2018-12-21-at-9.00.50-PM.png 1050w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/p>\n<p class=\"p1\">Other forms of tech support fraud include things like phone calls claiming your computer is infected with a virus, or you\u2019ll receive a pop-up message or locked screen prompting you to call a fake company.<\/p>\n<h3 class=\"p1\">Credit report scam<\/h3>\n<p class=\"p1\">The <a href=\"https:\/\/www.thebalance.com\/avoid-paying-for-your-free-credit-report-960500\" target=\"_blank\" rel=\"noopener noreferrer\">credit report scam<\/a>\u00a0targets job seekers and apartment hunters. Generally, you\u2019ll run into this one on Craigslist and other online job boards.<\/p>\n<p class=\"p1\">The scam occurs when the prospective employer asks that you submit a credit report as part of the application process. If you agree they\u2019ll send you to a specific reporting service, and you might end up having to pay for the report.<\/p>\n<p class=\"p1\">In some cases, the fake employer will ask you to send your social security number along with an application or an image of your license or a utility bill. These reports serve as a way to obtain personal information for later use.<\/p>\n<h3 class=\"p1\">Protect yourself<\/h3>\n<p class=\"p1\">So, how can you defend yourself against spearfishers or robocalls that seem legit?<\/p>\n<p class=\"p1\">The usual advice is: <strong>never click a link in an email that comes from a bank, government agency, or commercial institution.<\/strong> If the link comes from a company, check your account by going directly to the website by typing the URL into the navigation bar manually.<\/p>\n<p class=\"p1\">Sound advice, but protection is limited to web apps. <strong>With mobile attacks, watch out for links that come by way of text message.<\/strong><\/p>\n<p class=\"p1\">While the concept is the same as traditional phishing, mobile users tend to be more distracted and may inadvertently click on a bad link without realizing it.<\/p>\n<p>The <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0060-10-things-you-can-do-avoid-fraud\">FTC also recommends<\/a> that you <strong>hang up on recorded calls, avoid free trial offers, and be aware of how you pay for things online.<\/strong><\/p>\n<p>Finally, it might be worth looking into <a href=\"http:\/\/en.softonic.com\/articles\/top-3-anti-virus-software-on-a-budget\/\" target=\"_blank\" rel=\"noopener noreferrer\">virus protection software<\/a> for your computer, too.<\/p>\n<!-- Shortcode [playwire] does not match the conditions -->\n","protected":false},"excerpt":{"rendered":"<p>Protect yourself against these evolving threats.<\/p>\n","protected":false},"author":9161,"featured_media":116238,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[2518,2441],"tags":[1627,1626],"usertag":[839],"vertical":[],"content-category":[],"class_list":["post-115973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-how-to","tag-malware","tag-scam","usertag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/115973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9161"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=115973"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/115973\/revisions"}],"predecessor-version":[{"id":326857,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/115973\/revisions\/326857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/116238"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=115973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=115973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=115973"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=115973"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=115973"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=115973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}