SCAMS
TERMINOLOGY
TAKE ACTION
FYI
WHAT???
100
In these types of scams the scammers make their money by making you pay fees or taxes, call their premium rate phone numbers or send premium text messages to claim your prize. These premium rate calls can be very expensive, and the scammers will try to keep you on the line for a long time or ask you to call a different premium rate number.
What is Lotteries, Sweepstakes and Contests Scams?
100
Protects your computer from viruses that can destroy your data, slow your computer's performance, cause a crash, or even allow spammers to send email through your account.
What is Anti-virus Software?
100
1) Immediately log in and change the password to a strong, unique password. If you no longer have access, contact the company. 2) Monitor credit card transactions and notify the credit card company as soon as you find any you don't recognize. 3) Also create regular backups of all you personal information, this may be the only way you can recover your personal information if your computer /mobile device is hacked.
What is 3 steps to take when hacked?
100
Out of the our staff Survey 28 responded. Out of those responses ___% have been a victim of Fraud.
What is 53%?
100
refers to criminal activity that attempts to fraudulently obtain sensitive information. The scam artist will try to obtain sensitive information such as your social insurance number, driver's license, credit card information, or bank account information by email.
What is Phishing?
200
This is an example of this type scam; In response to your advertisement, you might receive a generous offer from a potential buyer and accept it. You receive payment by cheque or money order, but the amount you receive is more than the agreed price. The buyer may tell you that the overpayment was simply a mistake or they may invent an excuse, such as extra money to cover delivery charges. If you are asked to refund the excess amount by money transfer, be suspicious. The scammer is hoping that you will transfer the refund before you discover that their cheque or money order was counterfeit. You will lose the transferred money as well as the item if you have already sent it.
What is an example of Overpayment Scam?
200
A common spyware program that changes your web browser's home page automatically, even if you change it back.
What is Browser Hijacker?
200
This is who you would contact if you have not lost any money and have not provided personal or financial information (relating to a fraud or scam), and you simply want to inform the appropriate organizations.
What is Canadian Anti-fraud Centre (CAFC)?
200
Credit Unions last year experienced this $ amount in online banking fraud.
What is $500,000?
200
This is a scam where a hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge.
What is Pharming?
300
You receive a phone call or an email from someone claiming to work for a software company, maybe even a company you recognize. You are asked if, or informed that, your computer is running slowly and an offer is made to fix it once you grant remote access or download software from a specific website. The vendor seeks to convince you to pay for the service and give your credit card information. The vendor also tries to persuade you to grant remote access to your computer.
What is an example of Antivirus Scam or Internet Scam?
300
Software that installs on your computer without your knowledge when you visit certain websites. To avoid drive-by downloads, make sure to update your operating system and Web browser regularly.
What is Drive-by Download?
300
This the best weapon against fighting fraud.
What is you?
300
Once you’ve been the target of a scam, you may be targeted again. In fact, 31%of fraud victims are defrauded a second time. This is called___________. Here’s how it often works: 1. The person who scammed you keeps your information or sells it to someone else. 2. After some time has passed, you’re contacted again—either by the first scam artist or by a new one.
What is “double-dipping”?
300
Criminals use the phone to solicit your personal information. This telephone version of phishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit.
What is Vishing?
400
These type of scams start by scammers calling your phone and hanging up so quickly that you can't answer the call in time. Your phone registers a missed call and you probably won't recognize the number. You may be tempted to call the number to find out who called you. If it is a scam, you will be paying premium rates for the call without knowing.
What is Missed Call Scams?
400
An imposter obtains key pieces of personal information, such as SIN or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.
What is Identity Theft?
400
This is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the Internet in much the same way that some telemarketers automatically dial random phone numbers. Hackers send electronic probes, or pings, to thousands of computers and wait for responses. Firewalls prevent your computer from responding to these random pings. A firewall blocks communications to and from sources you don't permit. This is especially important if you have a high-speed Internet connection, such as DSL or cable.
What is firewall?
400
One in ___ that is __% of Canadians have been exposed to a tax season scam.
What is one in five (20%)?
400
The Criminal uses cell phone text messages to lure consumers in. Often the text will contain an URL or phone number. The phone number often has an automated voice response system. And again just like phishing, this message usually asks for your immediate attention.
What is Smishing?
500
Criminals want you to do their banking for them. If they earn your trust, they'll use your account to cash phony cheques, collect funds from other accounts, and move stolen money offshore. They use a variety of schemes to convince you that they're legitimate. Some will even give you money to earn your trust. By accepting and re-directing electronic deposits (such as wire transfers), you could be participating in a__________________ if those deposits were proceeds of a fraud or other criminal activity. The stories vary, but the results are the same: fraud and financial loss.
What is a money-laundering scheme?
500
A device or program that records each keystroke typed on a particular computer.
What is Keystroke Logger?
500
Installing this software will help stop Spyware being installed on your computer without your knowledge or consent.
What is anti-spyware?
500
At least ____% of Canadian small and medium enterprises – or 290,000 companies – were victims of at least one instance of workplace fraud last year.
What is 26%?
500
It's a type of scam and you're the target. An email that appears to be from an individual or business that you know. But it isn't. It's from the same criminal hackers who want your credit card and bank account numbers, passwords, and the financial information on your PC.
What is Spear Phishing?