Personal Development, Business, Finance, and Investing for Everyone
An investment in knowledge always pays the best interest.
Frauds and Scams target you. You should protect yourself. Fraud is an act, expression, omission, or concealment that deceives another to the fraudster’s advantage while scams are fraudulent business schemes to mislead/swindle/victimize a person or persons with the goal of financial gain. Common Types Of Frauds And Scams Text Scams Fraudulent text messages stating that your mobile phone number won in a raffle contest either by a government institution or popular game show. Sample text message usually say: You won in the Rap Foundation; Credit Card and ATM Skimming Illegal copying of information from the magnetic strip of the credit card or ATM through a skimming device. Scammers use the information stolen to: access somebody’s account; manufacture counterfeit cards or use in online transactions. Your card may be skimmed if: (a) used on an ATM terminal with an attached skimming device or if (b) an employee of a gasoline station or a restaurant surreptitiously puts your card into an electronic skimming device. Sim Card Scam/Sim Card Fraud Attacks Be wary of SIM card scams. This is to prevent fraudsters from taking control of your SIM card and getting the One-Time PIN (OTP) sent to your registered mobile phone number, which is then used to make unauthorized transactions on your credit card. Ignore calls or texts from anyone offering a SIM upgrade, SIM replacement, or asking for an OTP. Do not provide your SIM, OTP, or any personal information. Remember that banks and other financial institutions will never ask for your personal information or request you to surrender your SIM. Ponzi/Pyramiding Scheme Ponzi scheme organizers lure prospective investors with high returns. The fraudsters normally exist for a limited period of time. They appear to be religiously paying their investors during initial stage. Thereafter, they will quickly disappear, leaving the investors, particularly those downlines, empty handed. The losing investors cannot run after the program managers who are either unknown or whose names and addresses, are usually fictitious. Spurious Investments Fraudulent commercial documents being sold or traded by individuals or companies and are allegedly issued, secured or guaranteed by the BSP or international banks. Identity Theft Fraudsters get the personal information they need to assume your identity through theft. With these information, the perpetrator causes the creation of a financial transaction, e.g., a loan, intermediary account or other financial account, in the victim’s name. Phishing Emails from your bank or credit card company that looks like the “real thing” and asking for information like PIN, account number, log in IDs and passwords that can be exploited for fraudulent purposes. Phishing may be done using methods other than email. Mobile phone text messages, chat rooms, fake banner ads, message boards and mailing lists, fake job search sites and job offers, and fake browser toolbars may also be used to get information. Vishing Vishing or voice phishing is the use of social engineering techniques over the phone to trick the victim into divulging personal or confindential information such as names, birthdays, and other personal details of persons for the purpose of committing fraud. Spoofing A website that appears to be legitimate but it is actually created by a fraudster. The main purpose is to trick the user into releasing sensitive information such as PIN, account number, log in IDs, and passwords that can be exploited for fraudulent purposes. Nigerian Scams Emails, fax or letter from strangers or even friends (subject of hacked emails). These strangers will tell you that they have either large sums of money for remittance or a very good business offer and they need your account to bring the money to the country. They will ask you to either share your bank information or create an account with a particular bank/institution. With the bank information, they will draw up false instruments against your account. Friends (whose emails have been hacked), on the other hand, will relate a sad story telling they are in need of emergency financial help. They will ask you to send money to a temporary account, which could be easily closed after receiving the money. Budol-Budol Scam Victim will be shown bundles of cash to get the victim’s trust and then the scammer will ask for cellphone or other important things in exchange for the fake money. The scammer may also leave important things in exchange for cash. Hypnotism is also said to be used for this modus operandi. Dugo-Dugo Scam Victim receives a call from someone that a loved one has been kidnapped or has been hurt. The caller will tell the victim to make a money transfer to a stranger or ask for jewelries or other valuable items in exchange for the safety of the kidnapped relative or to pay for the medical expenses of the loved one. WHAT TO DO ?
Millions of people worldwide have fallen for the scam. Don't fall for get-rich-quick schemes. It takes time and effort to build wealth properly. Read my blog post on How To Spot A Scam and How To Protect Yourself.
0 Comments
Leave a Reply. |
PLACE YOUR ADS HERE YOUR PAYDAY REMINDER FEATURED PARTNER FEATURED PROMOTIONS FEATURED MENTIONS PLACE YOUR ADS HERE PLACE YOUR ADS HERE For more updates about Personal Development, Financial and Investment Education. Join and Subscribe to my Newsletter. It's FREE! ABOUT THE BLOGGERHi, I'm Ralph Gregore Masalihit! An RFP Graduate (Registered Financial Planner Institute - Philippines). A Personal Finance Advocate. An I.T. by Profession. An Investor. Business Minded. An Introvert. A Photography Enthusiast. A Travel and Personal Finance Blogger (Lakbay Diwa and Kuripot Pinoy). Currently, I'm working my way toward time and financial freedom. PLACE YOUR ADS HERE Categories
All
Archives
May 2023
PLACE YOUR ADS HERE |