SlideShare une entreprise Scribd logo
1  sur  8
By Alexandra McK, Emily Y and Zoe S
SCAMS – HOW TO PREVENT AND AVOID
THEM
SCAMS
A scam is defined as ‘a dishonest scheme or a fraud.’ For this presentation, we will focus on
digital scams, which are described as ‘a fraud which uses Internet services or software with
Internet access to defraud victims or to otherwise take advantage of them.’
So why do people scam?
There are multiple reasons. For some, it is their form of income, while others do it just for fun.
Either way, these scams can be devastating to their victims, destroying them emotionally and
financially.
COMMON SCAMS
According to NetSafe, the three most common reported scams in 2012 are: Cold-calling
computer viruses, Bank phishing & tax refunds, and Online auctions & trading scams.
However, NetSafe estimates that the number of unreported scams are much greater, and
expects that as many as 2,000 adult New Zealanders are targeted every day with scams.
WHAT TO LOOK OUT FOR
Scammers have many different ways of extorting money from people, but frequently have
some or all of these tell-tale signs:
– Poor grammar or spelling, especially if they claim to be from an English-speaking country.
– Anything, from a job to a car, for a price which is too good to be true. Often, it is.
– Emails from businesses such as Microsoft or the bank claiming they will shut down your
account if you don’t enter your username and passwords. These companies would never
do this.
– A need for money. With scams, money is always what it boils down to.
– After they have requested money, the scammers often insist that you send the money to
them via organizations such Western Union or PayPal, as once this money is sent, it is
completely untraceable.
HOW TO PREVENT SCAMS
– Read the fine print. Scammers know that most people can’t be bothered reading it before
agreeing to the Terms and Conditions. Buried in the text are terms that force you to pay monthly
fees forever.
– Keep your firewalls and/or antivirus programs up to date. These block out most of the spam that
you would otherwise be receiving.
– Don’t give out personal information or money to strangers. No matter what the situation, if you
are unsure about something, do some research. If it is a scam, then you could have potentially
saved yourself thousands of dollars.
– If you have been scammed, report it to the Ministry of Consumer Affairs' Scamwatch website or
to the police.
– Research the site before you use it to see whether it is valid and/or safe.
– Always think first before entering your personal details, and only enter compulsory
details, making up names and addresses etc. if necessary.
– If a message pops up, DO NOT click on it. Instead leave the computer and contact NetSafe or
another professional.

Contenu connexe

Tendances

Finding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses WebinarFinding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses WebinarKount
 
Greater manchester police phishing email alert
Greater manchester police   phishing email alertGreater manchester police   phishing email alert
Greater manchester police phishing email alertEddie Hirst MSc MSyl
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy ExplainedTrading Atlas
 
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention PlanLowers & Associates
 
The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying Instant Checkmate
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDjonaspatrick12
 
Who hates payday loans most
Who hates payday loans mostWho hates payday loans most
Who hates payday loans mostChristelleH
 
The Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public SafetyThe Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public SafetyAmazon Web Services
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs#TheFraudTube
 
Cyber threats in numbers: 2013
Cyber threats in numbers: 2013Cyber threats in numbers: 2013
Cyber threats in numbers: 2013Legal artviser
 

Tendances (16)

Finding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses WebinarFinding Revenue in Friendly Fraud Losses Webinar
Finding Revenue in Friendly Fraud Losses Webinar
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Greater manchester police phishing email alert
Greater manchester police   phishing email alertGreater manchester police   phishing email alert
Greater manchester police phishing email alert
 
Civil forfeiture
Civil forfeitureCivil forfeiture
Civil forfeiture
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 
Phishing
PhishingPhishing
Phishing
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy Explained
 
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
18 Fraud Facts to Drive Your 2018 Fraud Prevention Plan
 
The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying The Online Epidemic Of Cyberbullying
The Online Epidemic Of Cyberbullying
 
Ban Karo
Ban KaroBan Karo
Ban Karo
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Who hates payday loans most
Who hates payday loans mostWho hates payday loans most
Who hates payday loans most
 
The Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public SafetyThe Role of Cloud Technology in Public Safety
The Role of Cloud Technology in Public Safety
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs
 
Cyber threats in numbers: 2013
Cyber threats in numbers: 2013Cyber threats in numbers: 2013
Cyber threats in numbers: 2013
 

En vedette

Sample event production design
Sample event production designSample event production design
Sample event production designDavid Nix
 
Bluewave Capabilities 2016
Bluewave Capabilities 2016Bluewave Capabilities 2016
Bluewave Capabilities 2016David Nix
 
Broadcom Bangalore Openings
Broadcom Bangalore OpeningsBroadcom Bangalore Openings
Broadcom Bangalore OpeningsKathir Avan
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCloud Congress
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networkingsuniltomar04
 
Galileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOMGalileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOMThe European GNSS Agency (GSA)
 
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehiclesTechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehiclesHardway Hou
 

En vedette (10)

Sample event production design
Sample event production designSample event production design
Sample event production design
 
Bluewave Capabilities 2016
Bluewave Capabilities 2016Bluewave Capabilities 2016
Bluewave Capabilities 2016
 
Broadcom Bangalore Openings
Broadcom Bangalore OpeningsBroadcom Bangalore Openings
Broadcom Bangalore Openings
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
2014 IoT Forum_Broadcom
2014 IoT Forum_Broadcom2014 IoT Forum_Broadcom
2014 IoT Forum_Broadcom
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
 
Galileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOMGalileo, the point of view of a chip manufacturer: BROADCOM
Galileo, the point of view of a chip manufacturer: BROADCOM
 
ICCD talk
ICCD talkICCD talk
ICCD talk
 
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehiclesTechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
TechShanghai2016 - Reliable automotive-grade Isolators for new energy vehicles
 
2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller
 

Similaire à Scams

Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimAnthony Semadeni
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptbcanawakadalcollege
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxremisisdulawan22
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingTim McAlpine
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communicationRosetta
 

Similaire à Scams (20)

Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptx
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Phishing
PhishingPhishing
Phishing
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money Thing
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 

Dernier

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Scams

  • 1. By Alexandra McK, Emily Y and Zoe S SCAMS – HOW TO PREVENT AND AVOID THEM
  • 2. SCAMS A scam is defined as ‘a dishonest scheme or a fraud.’ For this presentation, we will focus on digital scams, which are described as ‘a fraud which uses Internet services or software with Internet access to defraud victims or to otherwise take advantage of them.’ So why do people scam? There are multiple reasons. For some, it is their form of income, while others do it just for fun. Either way, these scams can be devastating to their victims, destroying them emotionally and financially.
  • 3. COMMON SCAMS According to NetSafe, the three most common reported scams in 2012 are: Cold-calling computer viruses, Bank phishing & tax refunds, and Online auctions & trading scams. However, NetSafe estimates that the number of unreported scams are much greater, and expects that as many as 2,000 adult New Zealanders are targeted every day with scams.
  • 4.
  • 5. WHAT TO LOOK OUT FOR Scammers have many different ways of extorting money from people, but frequently have some or all of these tell-tale signs: – Poor grammar or spelling, especially if they claim to be from an English-speaking country. – Anything, from a job to a car, for a price which is too good to be true. Often, it is. – Emails from businesses such as Microsoft or the bank claiming they will shut down your account if you don’t enter your username and passwords. These companies would never do this. – A need for money. With scams, money is always what it boils down to. – After they have requested money, the scammers often insist that you send the money to them via organizations such Western Union or PayPal, as once this money is sent, it is completely untraceable.
  • 6.
  • 7.
  • 8. HOW TO PREVENT SCAMS – Read the fine print. Scammers know that most people can’t be bothered reading it before agreeing to the Terms and Conditions. Buried in the text are terms that force you to pay monthly fees forever. – Keep your firewalls and/or antivirus programs up to date. These block out most of the spam that you would otherwise be receiving. – Don’t give out personal information or money to strangers. No matter what the situation, if you are unsure about something, do some research. If it is a scam, then you could have potentially saved yourself thousands of dollars. – If you have been scammed, report it to the Ministry of Consumer Affairs' Scamwatch website or to the police. – Research the site before you use it to see whether it is valid and/or safe. – Always think first before entering your personal details, and only enter compulsory details, making up names and addresses etc. if necessary. – If a message pops up, DO NOT click on it. Instead leave the computer and contact NetSafe or another professional.