01 logo

Protect yourself from scams

Scams target everyone

By Ivan WasswaPublished 3 years ago 3 min read

Scams prey on everyone.

In Australia, scams prey on people of different ages, socioeconomic origins, and income levels. There isn't a certain demographic that is more likely to fall for a scam; every one of us could fall victim to one at some point.

Scams work because they appear to be the real thing and surprise you when you least expect it. In order to scam you out of your money or personal information, con artists are becoming more sophisticated and utilizing new technology, new goods and services, and significant events.

Keep yourself safe.

Recognize the existence of scams. When dealing with unwanted calls or emails from individuals or corporations, whether by phone, mail, email, or in person

Keep in mind that if something seems too good to be true, it generally is.

Be aware of who you are dealing with. Do a little more investigation if you've only ever met someone online or if you have any doubts about the reliability of a company. Look up anyone who may have dealt with them online by performing a Google image search on the people's pictures. Contact your acquaintance directly to confirm that it was indeed them who sent the message or email if it appears strange or out of character for them.

Never click on links or attachments in emails, pop-up windows, or strange texts; instead, delete them: If unsure, confirm the contact's identity by consulting an impartial source, such asIf in doubt, confirm the contact's identification using a dependable resource, such as a phone book or web search. Use the contact information that was not supplied to you in the message.

Even if the caller mentions a well-known organization like Telstra, hang up if they call you requesting for remote access to your computer. The free upgrade or fix that scammers promise to install on your computer really contains a virus that will allow them access to your passwords and personal information.

Keep your personal information private. Before throwing away your bills and other essential documents, lock your mailbox and shred them. Keep your pin codes and passwords in a secure location. Take great care.Be aware of any strange requests for payment. The use of unique payment methods, such as prepaid debit cards, gift cards, iTunes cards, or digital currencies like Bitcoin, is frequently requested by con artists.

When shopping online, exercise caution. Always choose an online shopping provider that you are familiar with and trust, and be wary of deals that appear too good to be true. Consider your options carefully before using virtual currencies (like Bitcoin) because they lack the same security measures as traditional payment options and you cannot get your money back after it has been sent. Study up on internet purchasing fraud.

Following-up fraud

When you're feeling vulnerable, scammers will frequently try to take advantage and use a follow-up scam to get additional money from you.

Typical follow-up frauds include:

promises from police enforcement to look into your scam and get your money back in exchange for payment. The services provided by law enforcement are free.

A woman contacts you to explain she is the scammer's wife and wants to flee him but needs money to do so. A doctor contacts you to warn you that the scammer urgently needs medical costs to be paid or they would die.

These are just a handful of the follow-up techniques con artists could employ to try to steal additional money from you. New methods could

Detecting signs of a phony dating profile

Look for anything peculiar in a new dating profile selection of:

language skills that match the backdrop of the photo's location and interests.

Online-sourced phony photographs are frequently used by scammers.

Try searching for images of your admirer to see whether they are who they claim to be. You can utilize image search tools like TinEye or Google.

cybersecurity

About the Creator

Ivan Wasswa

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.