Scam Detection Pt. 1
‘Scam Detection’ will be series’d around common scams from scammers.
(Future reference to import deepfakediscovery.info to host scam files)
Scammers are continuously growing and becoming smarter and more unique to adapt to the new generations of tech adoption. With growing multi-factor authentication the landscape for stealing PII is more and more difficult for the ‘average’ scammer to leverage exploitation.
The most common form of ‘hacking’ or ‘scamming’ or ‘insider threat’ will always be a human being’s information being exploited through maliciousness of social engineering. If somebody has a window to access to your personal data with negative intent in mind they will use it.
-
Targeted scams (As in specifically targeting you) would most likely be done by somebody with access to personal information of yours, They would also most likely not be working alone (Organization or network) That’s not to say they couldn’t be solo, A popular scam I used to see on MySpace - Was running ‘repost surveys’ posts, People can then do the survey you posted, And it would usually have questions that could be ‘reverse engineered’ in a way, To take your answers of favorite things, favorite numbers, Last 4 of cell phone numbers etc. Then run password software based on your personal answers. (This is because most people use something personal to them to create passwords)
Malicious links (The easiest to even accidently click on) Could contain any number of viruses, malware, ransomware, keyloggers, etc. Designed to monitor and steal your information the next time you input it or steal it from your phone/computer
-
It is always important to be vigilante over the data you are allowing to access your devices
This is a place-holder for actual received images in the mail high-lighting the uniqueness of this scam