Cyber Security Awareness Poster

Top 4 Scam Techniques and How They Target Your Devices
Scammers are constantly evolving their tactics, using clever techniques to manipulate unsuspecting victims. Whether you’re using a computer, cell phone, smart home device, gaming console, or IoT (Internet of Things) device, it’s important to recognize the ways scammers try to get you. Here are the top four scam techniques and how they might impact your technology:
1. Scammers Pretend to Be Someone You Trust
Scammers often disguise themselves as reputable sources, such as friends, family members, or trusted organizations like banks, delivery services, or tech companies. With the rise of phishing and spoofing scams, it’s easy for fraudsters to mask their identity via email, phone calls, or text messages.
- How it happens: You may receive an email from what appears to be your bank asking you to verify account details or a text from a “friend” asking for help.
- Devices affected: This technique can target computers, cell phones, smart home devices, and gaming consoles. For example, a hacker might impersonate a smart home device manufacturer to gain access to your network, or pose as a gaming service asking for login details.
2. Scammers Create a Sense of Urgency
Urgency is a powerful motivator, and scammers know it. They often claim that something critical will happen if you don’t act immediately—like your bank account being locked, your smart home system being compromised, or missing out on an amazing deal.
- How it happens: You may get a pop-up warning that your computer is infected with a virus, or an automated message on your cell phone urging immediate action to avoid financial loss.
- Devices affected: Fake virus alerts, phishing emails, and text scams are most commonly seen on computers and cell phones, but they can also target gaming devices and smart home systems by claiming your account or device is in danger of deactivation or hacking.
3. Scammers Use Intimidation and Fear
Scammers often employ fear to push victims into a state of panic, making them more susceptible to giving up personal information or making rash decisions. They might claim that your data has been hacked, or that your device is under surveillance by authorities.
- How it happens: A scammer might call, posing as tech support, and warn you of a data breach on your IoT device or computer, suggesting that you install “urgent updates” (malware) to resolve the issue.
- Devices affected: This intimidation can happen across a range of devices—computers, cell phones, and even IoT devices like smart security cameras, where scammers threaten to release recorded footage unless you comply.
4. Scammers Use Untraceable Payment Methods
A hallmark of most scams is the request for payment via untraceable methods, such as gift cards, cryptocurrency, or wire transfers. These methods are nearly impossible to trace, making it difficult to recover your money once it’s sent.
- How it happens: After convincing you of a problem or offering a fraudulent service, scammers will request payment using a gift card or cryptocurrency wallet.
- Devices affected: Payment scams can come through cell phones, computers, and even smart home devices, such as voice assistants that might prompt you to pay a fraudulent “subscription fee” via an untraceable method.
Please note that this is not an all-inclusive list of ways scammers may try to gain your trust enough for you to act. These are simply examples to get you thinking about the different ways these fraudsters take advantage of us users of technology. Their tactics are ever evolving. It’s important that we stay alert and keep learning.
Staying vigilant is key to protecting yourself and your devices from scams. Be cautious of unsolicited communications, especially those that create urgency or request sensitive information. Always double-check the source, and never send payments through untraceable methods.
CourseVector grants permission to use this artwork for any non-commercial purpose as long as the CourseVector contact information remains, as is, on any reproduction or use.