Preventing Scams and Fraud this Holiday Season

(Statepoint) Scams and fraud are more deceiving these days, reaching you in more ways than ever before. The FTC reported 2.8 million fraud reports from consumers in 2021 alone, with reported fraud losses increasing 70% from 2020 and more than $5.8 million.

Scammers begin their traditional uptick at the start of the holiday season, and identity theft protection expert Carrie Kerskie says being aware of what new cyber and phone fraud trends to look out for is your biggest defense against unwanted fraud.

“The more that we can get this information out there the better,” Kerskie recently told T-Mobile Stories, “Unfortunately when it comes to technology, privacy and identity theft, the same old advice that was given 10, 15 years ago is still the gospel of what you’re supposed to do. And that is outdated. None of it works. It’s not true, it’s not relevant anymore.”

Scammers have expanded from targeting consumers with only traditional email and phone calls. The most recent trending scams are occurring using person-to-person payment platforms or P2P, remote access software and even public Wi-Fi.

Kerskie says the most desirable accounts to criminals include bank accounts, mobile phone accounts, credit card accounts and Amazon accounts. Now, with P2P payment platforms, criminals can get access to your bank account and use it to transfer money within moments.

The latest tactic that concerns Kerskie is using remote access software to gain access to everything on your computer without having to directly ask you for things like your social security number, bank account or credit card number. While many workers use remote access software safely from their companies’ IT departments, criminals are also using this software in their scams.

Criminals also try to access your information in settings like coffee shops or libraries using public Wi-Fi. A laptop or smartphone using public Wi-Fi can easily fall victim to scams. An easy fix is to use your smartphone’s wireless data and hotspot to help keep your personal information secure.

Kerskie says there are ways to keep scammers and fraud at bay ahead of the holiday shopping season.

Prioritize Privacy: Kerskie says, if it’s easy for you, it’s easy for a criminal. Privacy means having strong and unique passwords with a minimum of 12 characters, and for pins using random numbers and taking advantage of extra security. Enabling multi-factor authentication on your various apps and accounts will also protect yourself from potential threats.

Use Available Resources: Take advantage of the free anti-fraud safeguards offered by your mobile carrier. In the case of T-Mobile's Scam Shield, services include enhanced caller ID, scam ID and blocking, which flags suspicious calls and gives customers the option of blocking those numbers. Additionally, customers can get a free second number to keep their personal number personal, or even change their primary number completely.

Validate or Eliminate: Whatever potential threat you come across via email, text message, letter or even a phone call, try to validate the information. If you cannot confirm the information is true or confirm the senders’ validity, throw it away, block the phone number or email address and report it as spam or junk mail.

Understanding how potential cyber threats and fraud work will help protect you this holiday season and beyond.

PHOTO SOURCE: (c) tsingha25 / iStock via Getty Images Plus

More Resources

Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 403, exiting

More Personal Technology Information:

Related Articles


Temporary Fixes to Spyware, Ad-ware, and Virus Infections
So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner.
Taking Advantage of the iPod Experience
Music lovers have been carrying around radios and other bulky music devices in order to take their tunes along withthem as they go from place to place. With the iPod - a portable unit that's manufactured by Apple - the music experience offers a higher quality in a much more compact size.
Deleting and Destroying Data Forever
Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there.
iPod users get the picture
iPod users start to get the picture and it's turning out to be colorful fun!!The latest generation of hi tech gadget users are watching the different media they use start to converge as Apple launches its latest grab for the market with iPod Photo. Not only can you listen to all your music on the go, or organize your business and social life, but now your entire photo collection can be viewed at hand too.
Enhanced Web Browsing With Toolbars
As the Web grows more crowded and just plain "noisy" withinformation bombarding us from every angle, most peoplewelcome any tool, trick or shortcut to help them wadethrough the mountains of data to find what they want.Since your web browser represents your main window to theInternet, it makes sense for any tool which enables you tofind what you need and get around faster online should sitright where you need it most.
Connect Your IPAQ to Linux
Choose Not To ConformPalm pilots and pdas are constantly growing in the ways that people use them in their everyday lives. Having a pocket pc is becoming the standard rather than the exception.
The Best MP3 Players Under $100
You don't have to fork out $250 for a super-diggy-whizbang mp3 player, do you? There are cheap mp3 players to be had, with a host of features perfectly suitable for everyday use. Here is a small sampling of some of the highest-rated cheap mp3 players.
Basic Computer Thermodynamics
That desk in front of you and everything else around you is made up of atoms. An atom consists of electrons orbiting around a nucleus.
Is DVD Storage An Attractive Alternative For Your Computer Backup?
If you have a computer for home use or for your business and don't take comprehensive backup for full protection then you are in the danger-zone.Maybe you do not take any backup at all.
How to Buy a Plasma Television Set
Most people think that all you have to do to purchase a new plasma television set is to walk into a shop, look around, and purchase the first set that catches your attention. This is how you're supposed to do it, right? Wrong! Buying a television, whether it has a plasma monitor or a LCD monitor, takes careful planning.
Selecting the Perfect Big Screen TV
Selecting a TV isn't as easy as it used to be in years goneby. Rather than going to the local department store and choosing a console that would take up a large portion of the living room, we now have other options.
How to Switch to Firefox and Why You should
First things first, what is Firefox? Well, it's a browser. Ok but what's that? A browser is a computer program used to view web pages, to browse through the world wide web.
Refurbished Computers on the Internet
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers.
PC Owners - The Largest Criminal Gang Ever?
The year is 1981. IBM has just released the Personal Computer; a low cost machine it hopes will create a winning brand.
Spyware Remover
Your first step in removing dangerous infections from your computer should be downloading a free program called Hijack This. Make sure you download the file and extract it to a directory on your hard drive, you can call it HijackThis.
Compile .BAT Files into Native Windows Applications (.EXE)
Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files.
What Exactly are Screensavers? - part I
After reading this good article you will know some important information about screensavers and their history. You will find out how screensavers are different from other applications and what advantages you'll have if you use them.
Does Microsoft Show Hackers How To Attack?
After another security hole recently surfaced in Microsoft's Windows operating system, the software giant released a patch this past Friday to plug the possibly devastating "back door" which allows hackers to potentially seize control of any pc running Windows.The latest threat, "Download.
Lives With Games Tradition and Industry
The United States Of America citizen feels that games is a part of their life while developed countries such as the United Kingdom and Japan would feels that Games is high prospects to gain profit either in domestic level or internationally. Games is very influence in human life at this time.
How to Use SQLXML to Retrieve Data from SQL Server Database?
Using SQL Server 2000 and above versions you can retrieve data from SQL Server in XML format directly from the database. Many XML related features were incorporated in the SQL Server database.