Skip to content

Daily Information (609)296-2300

Trending Scams

Knowledge is a powerful defense. Check out these trending scams

Imposter scams

"Your package was returned, and you need to reschedule your delivery"

How it works:

  1. Initial Contact: You receive a communication about an issue - it may be with a delivery, your account, a family member or a device.
  2. Deceptive instructions: You may be urged to provide information such as a code, or take an action such as provide remote access, move money to another account or digital wallet, ignore warning messages.
  3. The scammer wins: After following the instructions, the scammer now has access to your money, and it’s unlikely you’ll see your money again.

Help protect your money – pause, verify, help prevent scams
Valid organizations will never ask you to take these actions. Verify all requests for information or money. Talk to your friends and family about the tactics scammers use.

Investment Scams

"They guaranteed a quick return on the investment, and I was receiving those returns in the beginning"

How it works:

  1. Initial Contact: The scammer will reach out through social media, text or email with a unique investment opportunity or a chance to get rich quick.
  2. Deceptive instructions: You'll be convinced to invest your money and will start to receive small returns.
  3. Fake returns: You're then encouraged to invest larger sums of money based on the returns you are receiving but suddenly all communications stop.

Help protect yourself and your money
Always validate investment opportunities. Use caution if asked to provide personal or financial information, especially if asked to send money through digital currency or instant money transfers.

Tech support scams

"They needed remote access to remove a virus from my device"

How it works:

  1. Initial Contact: Scammers reach out, via computer pop-up or phone call, claiming there is an issue with your device.
  2. Deceptive instructions: You are instructed to provide remote access to the device and to download an app to fix the issue.
  3. Access to personal information: Once you grant remote access or download the app, the scammer has access to your personal information. They can install malware on your device and demand a payment before they give back your access.

Help protect yourself and your money
No matter the reason given, be cautious about granting device access or downloading unfamiliar apps to fix issues with your devices. Run a full system virus and spyware scan and power off the device.

Online sales

"I thought I’d scored really hard-to-get tickets"

How it works:

  1. Initial Contact: Scammers create a fake website or post a “great deal” on social media for an item you’re had your eye on.
  2. Deceptive instructions: They ask you to pay in less common ways such as cash, gift cards or wire transfers.
  3. Pressured to act: You’ll be pressured to act quickly so you don’t miss out on the deal.

Help protect yourself and your money
Slow down and use caution if pressured to act quickly. Research the seller and products independently, check reviews for possible scam notices. Most online promotions that sounds too good to be true - typically are.

 

Common scams that target the at-risk population

Cyber criminals often target those who are at risk, using sophisticated social engineering tactics. Cyber criminals will try to earn their trust or establish an emotional relationship that may lead to exploitation or create a sense of urgency to produce fear and lure victims into immediate action to access their personal data and/or money.

Scams targeting those at risk can take many forms. Here are some common types to look out for:

  • Romance/confidence scams occur when a cyber criminal creates a fake online identity and attempts to establish a trusting and believable  relationship, then deploys different methods to ask for money.
  • Tech support scams occur when a cyber criminal poses as a service or support representative to resolve technology issues and gain remote access to devices or accounts in order to compromise data and finances.
  • Lottery/sweepstakes scams may happen when criminals make contact by phone, email, mail or social media claiming a victim has won a prize. However, to claim the prize, they may be required to pay bogus upfront fees or taxes.
  • Email compromise may happen when a criminal contacts an individual through their email address and uses a hacked or fake account that looks legitimate to trick the target into sending funds.
  • Grandparent scams occur when a scammer impersonates a grandchild and creates an urgent problem. The cyber criminal will appeal to the emotions of the grandparent and then request money to solve the problem.
  • Impersonation is a common tactic that scammers will use to target individuals. Scammers may impersonate government officials, a loved one, a trusted person or even their bank.

Here are some tips that can help protect and prevent scams that target those at risk:

  • Be careful what you post about yourself or your family online, including personally identifiable information such as your address or cell phone number.
  • Monitor your privacy settings on online accounts.
  • Verify unsolicited phone calls or emails. When in doubt, try to contact the person or organization through a verified website or alternate phone number.
  • Never share information with people you don’t know, especially if they contacted you.
  • Never click on pop-up messages as they are regularly used to spread malicious software.
  • Trust your instincts. If an offer looks too good to be true, it probably is.
  • Remember that anyone can become a target for a scam, even if you do not have disposable income.
  • Reach out to a family member or a friend that you trust to help you validate any suspicious correspondence you receive.
  • If you have been targeted, report the incident to local law enforcement immediately and contact your bank.