Governed by NACHA this network is the backbone for electronic movement of money and data
Automated Clearing House (ACH)
These were the 2nd most reported scam reported to the FTC in 2022
Online Shopping
Authentic email address, Impersonal greeting, Sounds a bit vague, Poor formatting. These are ways to spot this type of scam.
American financial criminal and financier who was the admitted mastermind of the largest known Ponzi scheme in history, worth an estimated $65 billion. He was at one time chairman of the Nasdaq stock exchange.
Bernie Madoff
This agency has an annual list called the Dirty Dozen list of scams.
IRS
These activities or clues are also more commonly known as ________. Being locked out of your email even though you haven't changed your password; seeing additional rules set up in your email settings; seeing items in your sent folder that you didn't send; Friends receiving emails from you that you didn't send.
Red Flags
Dishonest people who want to steal your money or get your personal information. They will mimic a legit business or person to try to accomplish their scam.
Imposters
These schemes are self-sustaining as long as cash outflows can be matched by monetary inflows. Once the number of investors tapers off, so does the money.
Ponzi or Pyramid Scheme
Using passwords that are easy to guess; clicking on fake websites that mirror a legitimate website to steal login credentials; unknowingly downloading viruses as a result of navigating to a malicious site or clicking on an attachment. These are all common ways that a compromise of this type of communication could happen.
An independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection.
FTC or Federal Trade Commission
This type of scheme/fraud involves artificially inflating the price of an asset through false and misleading positive information. Once the price is fully "pumped" the originator of the scam sells their stake.
Pump & Dump Scheme
Avoid the cost of hidden ____________ by researching the company, finding the terms and conditions of the offer, mark your calendar, review your statements, watch for pre-checked boxes.
Free Trials
A type of malware that encrypts a victim's files or locks them out of their systems, demanding a ransom payment for access restoration.
Ransomeware
This type of fraud is used by scammers to facilitate phishing, credential theft, malware installation, monetary theft, wire fraud, supply chain attacks, fake financial rewards and promos, solicitation for donations, and romance scams.
Email Fraud
The victim deposits a fake check through this method __________. While the checks seem legitimate, they often come with an overpayment and a request to immediately return a certain dollar amount through bank check, money order, wire, etc.
Mobile Deposit