{"id":98742,"date":"2018-06-23T04:04:07","date_gmt":"2018-06-23T04:04:07","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=98742"},"modified":"2025-07-01T23:23:30","modified_gmt":"2025-07-02T06:23:30","slug":"3-online-scams-to-watch-out-for-in-2018-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/3-online-scams-to-watch-out-for-in-2018-and-how-to-avoid-them\/","title":{"rendered":"3 online scams to watch out for in 2018 (and how to avoid them)"},"content":{"rendered":"<p><span style=\"font-weight: 400\">No matter what precautions we take online, cybercriminals will eventually find a way around them. So what can be done? <\/span><\/p>\n<p><span style=\"font-weight: 400\">Well, half the battle is being aware. Scams are a lot like the common cold virus: they mutate all the time. Once we defeat one, a new and unfamiliar one comes along. This makes catching them all the more difficult, and why antivirus software just isn\u2019t enough. <\/span><\/p>\n<p><span style=\"font-weight: 400\">We won\u2019t ever know the details of every scam in existence, but we can learn their general appearance and practice common sense. Technology is so ingrained in our lives, there are thousands of different vulnerabilities hackers can exploit. But if we\u2019re vigilant, if we \u201carm\u201d ourselves with the knowledge of scamming practices, we can parry these attacks before they do us harm. <\/span><\/p>\n<p><span style=\"font-weight: 400\">So let\u2019s take a look at the scams to watch out for in 2018.<\/span><\/p>\n<!-- Shortcode [playwire] does not match the conditions -->\n<h3><b>Phishing attacks<\/b><\/h3>\n<p><span style=\"font-weight: 400\">A phishing attack is when a criminal tricks you into revealing personal information by pretending to be a trusted person or institution, such as a friend, colleague, bank, or even a service like Netflix. <\/span><\/p>\n<p><span style=\"font-weight: 400\">The most common phishing attacks are by email, and often include links to fake sites that capture your details. Everything, including logos, language, and design, is made to look as close to a genuine email as possible, so you\u2019ve got to be on your guard. They\u2019re usually easy to spot if you hover your mouse over the sender to reveal the real email address. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Over the years, phishing scams have become ever more elaborate. They\u2019ve spread to social media, where hackers pose as friends to encourage you to click links to fake sites that steal your data. There are even <\/span><a href=\"https:\/\/www.digitaltrends.com\/mobile\/google-play-phishing-scam\/#ixzz4RDu61ckg\"><span style=\"font-weight: 400\">fake apps<\/span><\/a><span style=\"font-weight: 400\"> that do the same. Perhaps most worrying is <\/span><a href=\"http:\/\/www.computerweekly.com\/news\/450427653\/Security-experts-air-concerns-over-hackers-using-AI-and-machine-learning-for-phishing-atttacks\"><span style=\"font-weight: 400\">hackers\u2019 use of artificial intelligence to convince you they\u2019re genuine<\/span><\/a><span style=\"font-weight: 400\">. <\/span><\/p>\n<p><i><span style=\"font-weight: 400\">What action can you take?<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Check the real email address of senders by hovering your mouse over the sender\u2019s address \u2013 if it looks strange, don\u2019t open it. <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Don\u2019t open any links from friends unless you\u2019re 100% sure it\u2019s authentic (if in doubt, speak to the friend first). <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Hover your mouse over links and you\u2019ll see the URL at the bottom left of your browser. Only click if it\u2019s genuine \u2013 if you&#8217;re not sure, use a <a href=\"https:\/\/www.phishtank.com\/\">URL Checker<\/a>.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Download solid antivirus, anti-malware, anti-spam, and anti-phishing software with real-time protection.<\/span><\/li>\n<\/ul>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/email-logo-192.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">How to detect scam emails<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"how-to-detect-fakescam-emails-and-avoid-phishing-attacks-hi-res-version\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Find out now<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"how-to-detect-fakescam-emails-and-avoid-phishing-attacks-hi-res-version\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h3><b>Ransomware<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Ransomware is type of malicious software (malware) that essentially locks down your device until you pay a ransom to the attacker. Or it can steal sensitive information and then blackmail you. Attackers usually demand ransoms in decentralized currency like <a href=\"https:\/\/en.softonic.com\/articles\/everything-you-ever-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\">Bitcoin<\/a>. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Ransomware is particularly frightening because once it happens, there\u2019s very little you can do to fix it. They\u2019re often used to create botnets, which are networks of hijacked computers doing the bidding of cybercriminals. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Ransomware usually starts with downloading an attachment from a fake email, but it can propagate without the user doing anything. <\/span><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/how-did-wannacry-ransomworm-spread\/\"><span style=\"font-weight: 400\">WannaCry<\/span><\/a><span style=\"font-weight: 400\">, the devastating ransomware that infected thousands of computers in 2017, used Microsoft Windows vulnerabilities to spread. <\/span><\/p>\n<p><i><span style=\"font-weight: 400\">What action can you take?<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Check the real email address of senders by hovering your mouse over the sender\u2019s address \u2013 if it looks strange, don\u2019t open it. <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Don\u2019t open any links or attachments from friends unless you\u2019re 100% sure it\u2019s authentic (if in doubt, speak to the friend first). <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Download solid antivirus, antimalware, anti-spam, and anti-phishing software with real-time protection.<\/span><\/li>\n<\/ul>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/08\/malware192192.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">5 tips to prevent security issues with your phone<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Boost your security now<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h3><b>Fake news<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Fake news is propaganda on steroids. In the past, the war of words between opposing factions took place in newspapers, on television, and at podiums. You knew who was speaking. You knew their biases, so could take what was written or said with a grain of salt. <\/span><\/p>\n<p><span style=\"font-weight: 400\">But the internet has allowed the power-hungry and malicious to challenge truth itself. This is done by creating alternative \u201ctruths\u201d through the propagation of fake news. It&#8217;s news that\u2019s designed to look, sound, and feel \u201creal\u201d, despite being entirely false or grossly misinterpreted. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Because we all live in social media bubbles, fake news can continuously bounce around our news feeds, amplified by comments from like-minded friends or other fake stories. This creates a false sense of credibility to rumors, hearsay, and outright lies. The tribalism it creates divides societies \u2013 <\/span><a href=\"https:\/\/www.nytimes.com\/2017\/09\/07\/us\/politics\/russia-facebook-twitter-election.html\"><span style=\"font-weight: 400\">it can even influence elections<\/span><\/a><span style=\"font-weight: 400\">. <\/span><\/p>\n<p><i><span style=\"font-weight: 400\">What action can you take?<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use fact-checking sites like <\/span><a href=\"http:\/\/www.politifact.com\/\"><span style=\"font-weight: 400\">Politifact<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/www.snopes.com\/\"><span style=\"font-weight: 400\">Snopes<\/span><\/a><span style=\"font-weight: 400\">, and <\/span><a href=\"https:\/\/www.factcheck.org\/\"><span style=\"font-weight: 400\">FactCheck<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Read related news stories to get a balanced view<\/span><\/li>\n<\/ul>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/06\/FAKE_NEWS.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">How to Spot Fake News on WhatsApp and Facebook<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/how-to-spot-fake-news-on-facebook-and-other-social-networks\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Click here to learn how<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/how-to-spot-fake-news-on-facebook-and-other-social-networks\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<p>Hopefully, this list has equipped you with the knowledge you need to stay safe online. Remain vigilant, protected, and be wary of things that seem too good to be true.<\/p>\n<div class=\"sc-related-articles-grey\">\r\n<p class=\"sc-related-articles-grey__title\">More Softonic Articles<\/p>\r\n  <div class=\"sc-related-articles-grey__row\">\r\n    <a title=\"5 tips to prevent security issues with your phone\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\">\r\n    <div class=\"sc-related-articles-grey__article\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/03\/Screen-Shot-2018-03-19-at-12.34.02.png)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>5 tips to prevent security issues with your phone<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"8 tricks to strengthen your WhatsApp security\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-strengthen-your-whatsapp-security\">\r\n    <div class=\"sc-related-articles-grey__article sc-related-articles-grey__article--last\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/whatsapp-web-screenshot-1024x576-1024x576.png)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>8 tricks to strengthen your WhatsApp security<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n  <div class=\"sc-related-articles-grey__row\">\r\n    <a title=\"7 mistakes that put your internet security at risk\" href=\"https:\/\/en.softonic.com\/articles\/mistakes-internet-security-risk\">\r\n    <div class=\"sc-related-articles-grey__article\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/06\/5mistakesHeader-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>7 mistakes that put your internet security at risk<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"8 tricks to boost your security on Google Chrome\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-boost-your-security-on-google-chrome\">\r\n    <div class=\"sc-related-articles-grey__article sc-related-articles-grey__article--last\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/crome-security-1024x576-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>8 tricks to boost your security on Google Chrome<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>No matter what precautions we take online, cybercriminals will eventually find a way around them. So what can be done? Well, half the battle is being aware. Scams are a lot like the common cold virus: they mutate all the time. Once we defeat one, a new and unfamiliar one comes along. This makes catching &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/3-online-scams-to-watch-out-for-in-2018-and-how-to-avoid-them\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;3 online scams to watch out for in 2018 (and how to avoid them)&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9103,"featured_media":102220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[2441],"tags":[1027,1035],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-98742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","tag-security","tag-social-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/98742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9103"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=98742"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/98742\/revisions"}],"predecessor-version":[{"id":327824,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/98742\/revisions\/327824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/102220"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=98742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=98742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=98742"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=98742"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=98742"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=98742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}