SlideShare une entreprise Scribd logo
1  sur  8
By Alexandra McK, Emily Y and Zoe S
SCAMS – HOW TO PREVENT AND AVOID
THEM
SCAMS
A scam is defined as ‘a dishonest scheme or a fraud.’ For this presentation, we will focus on
digital scams, which are described as ‘a fraud which uses Internet services or software with
Internet access to defraud victims or to otherwise take advantage of them.’
So why do people scam?
There are multiple reasons. For some, it is their form of income, while others do it just for fun.
Either way, these scams can be devastating to their victims, destroying them emotionally and
financially.
COMMON SCAMS
According to NetSafe, the three most common reported scams in 2012 are: Cold-calling
computer viruses, Bank phishing & tax refunds, and Online auctions & trading scams.
However, NetSafe estimates that the number of unreported scams are much greater, and
expects that as many as 2,000 adult New Zealanders are targeted every day with scams.
WHAT TO LOOK OUT FOR
Scammers have many different ways of extorting money from people, but frequently have
some or all of these tell-tale signs:
– Poor grammar or spelling, especially if they claim to be from an English-speaking country.
– Anything, from a job to a car, for a price which is too good to be true. Often, it is.
– Emails from businesses such as Microsoft or the bank claiming they will shut down your
account if you don’t enter your username and passwords. These companies would never
do this.
– A need for money. With scams, money is always what it boils down to.
– After they have requested money, the scammers often insist that you send the money to
them via organizations such Western Union or PayPal, as once this money is sent, it is
completely untraceable.
HOW TO PREVENT SCAMS
– Read the fine print. Scammers know that most people can’t be bothered reading it before
agreeing to the Terms and Conditions. Buried in the text are terms that force you to pay monthly
fees forever.
– Keep your firewalls and/or antivirus programs up to date. These block out most of the spam that
you would otherwise be receiving.
– Don’t give out personal information or money to strangers. No matter what the situation, if you
are unsure about something, do some research. If it is a scam, then you could have potentially
saved yourself thousands of dollars.
– If you have been scammed, report it to the Ministry of Consumer Affairs' Scamwatch website or
to the police.
– Research the site before you use it to see whether it is valid and/or safe.
– Always think first before entering your personal details, and only enter compulsory
details, making up names and addresses etc. if necessary.
– If a message pops up, DO NOT click on it. Instead leave the computer and contact NetSafe or
another professional.

Contenu connexe

Tendances

Finding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses WebinarFinding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses WebinarKount
 
Greater manchester police phishing email alert
Greater manchester police   phishing email alertGreater manchester police   phishing email alert
Greater manchester police phishing email alertEddie Hirst MSc MSyl
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy ExplainedTrading Atlas
 
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention PlanLowers & Associates
 
The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying Instant Checkmate
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDjonaspatrick12
 
Who hates payday loans most
Who hates payday loans mostWho hates payday loans most
Who hates payday loans mostChristelleH
 
The Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public SafetyThe Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public SafetyAmazon Web Services
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs#TheFraudTube
 
Cyber threats in numbers: 2013
Cyber threats in numbers: 2013Cyber threats in numbers: 2013
Cyber threats in numbers: 2013Legal artviser
 

Tendances (16)

Finding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses WebinarFinding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses Webinar
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Greater manchester police phishing email alert
Greater manchester police   phishing email alertGreater manchester police   phishing email alert
Greater manchester police phishing email alert
 
Civil forfeiture
Civil forfeitureCivil forfeiture
Civil forfeiture
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 
Phishing
PhishingPhishing
Phishing
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy Explained
 
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
 
The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying
 
Ban Karo
Ban KaroBan Karo
Ban Karo
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Who hates payday loans most
Who hates payday loans mostWho hates payday loans most
Who hates payday loans most
 
The Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public SafetyThe Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public Safety
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs
 
Cyber threats in numbers: 2013
Cyber threats in numbers: 2013Cyber threats in numbers: 2013
Cyber threats in numbers: 2013
 

En vedette

Sample event production design
Sample event production designSample event production design
Sample event production designDavid Nix
 
Bluewave Capabilities 2016
Bluewave Capabilities 2016Bluewave Capabilities 2016
Bluewave Capabilities 2016David Nix
 
Broadcom Bangalore Openings
Broadcom Bangalore OpeningsBroadcom Bangalore Openings
Broadcom Bangalore OpeningsKathir Avan
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCloud Congress
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networkingsuniltomar04
 
Galileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOMGalileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOMThe European GNSS Agency (GSA)
 
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehiclesTechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehiclesHardway Hou
 

En vedette (10)

Sample event production design
Sample event production designSample event production design
Sample event production design
 
Bluewave Capabilities 2016
Bluewave Capabilities 2016Bluewave Capabilities 2016
Bluewave Capabilities 2016
 
Broadcom Bangalore Openings
Broadcom Bangalore OpeningsBroadcom Bangalore Openings
Broadcom Bangalore Openings
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
2014 IoT Forum_Broadcom
2014 IoT Forum_Broadcom2014 IoT Forum_Broadcom
2014 IoT Forum_Broadcom
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
 
Galileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOMGalileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOM
 
ICCD talk
ICCD talkICCD talk
ICCD talk
 
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehiclesTechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
 
2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller
 

Similaire à Scams

Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimAnthony Semadeni
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptbcanawakadalcollege
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxremisisdulawan22
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingTim McAlpine
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communicationRosetta
 

Similaire à Scams (20)

Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptx
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Phishing
PhishingPhishing
Phishing
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money Thing
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Scams

  • 1. By Alexandra McK, Emily Y and Zoe S SCAMS – HOW TO PREVENT AND AVOID THEM
  • 2. SCAMS A scam is defined as ‘a dishonest scheme or a fraud.’ For this presentation, we will focus on digital scams, which are described as ‘a fraud which uses Internet services or software with Internet access to defraud victims or to otherwise take advantage of them.’ So why do people scam? There are multiple reasons. For some, it is their form of income, while others do it just for fun. Either way, these scams can be devastating to their victims, destroying them emotionally and financially.
  • 3. COMMON SCAMS According to NetSafe, the three most common reported scams in 2012 are: Cold-calling computer viruses, Bank phishing & tax refunds, and Online auctions & trading scams. However, NetSafe estimates that the number of unreported scams are much greater, and expects that as many as 2,000 adult New Zealanders are targeted every day with scams.
  • 4.
  • 5. WHAT TO LOOK OUT FOR Scammers have many different ways of extorting money from people, but frequently have some or all of these tell-tale signs: – Poor grammar or spelling, especially if they claim to be from an English-speaking country. – Anything, from a job to a car, for a price which is too good to be true. Often, it is. – Emails from businesses such as Microsoft or the bank claiming they will shut down your account if you don’t enter your username and passwords. These companies would never do this. – A need for money. With scams, money is always what it boils down to. – After they have requested money, the scammers often insist that you send the money to them via organizations such Western Union or PayPal, as once this money is sent, it is completely untraceable.
  • 6.
  • 7.
  • 8. HOW TO PREVENT SCAMS – Read the fine print. Scammers know that most people can’t be bothered reading it before agreeing to the Terms and Conditions. Buried in the text are terms that force you to pay monthly fees forever. – Keep your firewalls and/or antivirus programs up to date. These block out most of the spam that you would otherwise be receiving. – Don’t give out personal information or money to strangers. No matter what the situation, if you are unsure about something, do some research. If it is a scam, then you could have potentially saved yourself thousands of dollars. – If you have been scammed, report it to the Ministry of Consumer Affairs' Scamwatch website or to the police. – Research the site before you use it to see whether it is valid and/or safe. – Always think first before entering your personal details, and only enter compulsory details, making up names and addresses etc. if necessary. – If a message pops up, DO NOT click on it. Instead leave the computer and contact NetSafe or another professional.