Don’t Get Caught in a Non-Delivery Scam

With the holidays approaching, and online shopping reaching its annual peak, scammers are out in full force to get at your money and your purchases. There are many scams to watch for this time of year, from online “retailers” phishing for information as you shop to brazen porch thieves who swipe delivered packages from doorsteps and so many more. The non-delivery scam can be particularly difficult to spot, and recovery is nearly impossible. Here’s what you need to know about this scam and how to protect yourself.

How the scam plays out

In a non-delivery scam, a shopper makes an online purchase, often at a discounted price. They may have chanced upon this “sale” through a social media ad, an unsolicited email or a banner ad on their favorite website. Unfortunately, though, the promised package is never delivered. After weeks of waiting, the shopper may try reaching out to the seller, only to find that the seller’s gone AWOL, along with the victim’s chances of recovering their money and/or their purchase.

Protect yourself

The best way to protect yourself against non-delivery scams is to practice online safety measures and to shop smartly. Here’s how.

  • Never click on links or attachments in unsolicited emails or on social media, regardless of how amazing the offer may be. If an ad looks promising, look up the alleged associated retailer directly and on your own. 
  • Keep your device’s security at its strongest settings and mark all suspicious emails as spam. 
  • Opt out of websites that are full of typos and/or grammatical errors.
  • Check each website’s URL for authentic spelling and signs of security, like the “https” and padlock icon. Recheck each landing page as you shop. 
  • When shopping a new seller, do some research before sharing any information with the seller. Look for a phone number and street address associated with the seller or company, dig up some online reviews and ratings and Google the retailer’s name along with the word “scam” to see if anything comes up. 
  • When shopping a private seller on an online marketplace, like Jiji or Etsy, check the seller’s profile carefully. Be extra wary if the profile is new.
  • Avoid shopping at retailers who insist on payment via prepaid gift cards or wire transfer. When shopping online, it’s best to use a credit card.
  • Stay away from sellers who advertise as if they are residents of the U.S. and then respond to questions by claiming that they are actually out of the country.
  • Always ask for and save the tracking numbers of online purchases. Monitor the shipping process so you can dispute the charge if the process seems suspect.
  • Be wary of items with prices that are too good to be true; in all likelihood they are.

If you’re targeted

If you believe you’ve fallen victim to a non-delivery scam, there are steps you can take to mitigate the damage. 

First, if you’ve paid via credit card, call the issuing company to dispute the charge as soon as you recognize the scam. If you believe the account has been compromised, you may want to close it and place a credit alert and/or credit freeze on your name as well. Next, be sure to alert the FTC about the scam so they can do their part in catching the crooks. If the alleged retailer is on the BBB website, you can let them know, too. Finally, let your friends know about the scam so they know to be aware.

Online commerce makes holiday shopping so much easier–but scams are everywhere. Shop smartly this season and follow the tips outlined here to avoid getting scammed. Stay safe!

Your Turn: Have you been targeted by a non-delivery scam? Tell us about it in the comments. 

Beware of Digital Kidnapping

Most parents warn their kids against taking candy or accepting a ride from a stranger, but there’s a digital equivalent to conventional kidnapping that is unknown to many people. Digital kidnapping happens when a crook takes control of a target’s social media profiles and holds them until a ransom is paid. It can also involve “kidnapping” photos that are posted on social media pages. Here’s what you need to know about digital kidnapping and how to protect yourself from falling victim. 

How the scams play out

In a digital kidnapping scam, a hacker or ring of scammers will take control of one or more of a target’s social media profiles. The target will be effectively locked out of their own social media accounts and will be unable to access or update them. Once the scammer has control of the profile, they’ll contact the target, demanding a hefty ransom in return for access to the account. They may even threaten to post damaging or humiliating content on the social media profile unless the ransom is paid.

In another version of this scam, hackers will “kidnap” a photo of a child or baby off an unsecured social media account. They will post these photos in their own accounts, using the picture-perfect moments to create a fantasy world of their own. In a creepy twist of reality, they’ll pretend these are snapshots of their own family. They may use this fake world to help them create an imaginary escape, or to draw traffic to their own public accounts. Sometimes, they’ll utilize these photos to help build a bogus story, such as a baby being put up for adoption, or a charitable fund to benefit a child whose parents are struggling financially. Unfortunately for the actual parents, it can be months or years before they find out that their child’s picture is splashed across a public account with thousands of followers. 

If you’ve been targeted

If you believe you’ve been targeted by a digital kidnapping scam, there are steps you can take to mitigate the damage. First, alert the company that owns the social media platform to let them know your account has been compromised. They’ll likely have specific instructions for you to follow to ensure your account remains safe. They may even advise you to close the compromised account and open a new one. Next, tip off the Federal Trade Commission (FTC) and local law enforcement agencies which can help you determine whether it makes sense to pay the requested ransom. Finally, clean up your accounts and make sure there is no identifying or potentially dangerous information being posted on a public forum.

Protect yourself

The best way to protect yourself from digital kidnapping is by keeping your accounts private and secure. Always choose the strongest security settings on your devices and opt for private social media accounts across every platform. This will limit your audience to by-invitation-only viewers while helping to keep hackers and creeps away. 

It’s also a good idea to be mindful of what you post, and how often you post it. Even when using the strongest security settings, sharing a picture online essentially means sharing it with the public. You never know who may be trolling your accounts or looking for pictures to “adopt” as their own. Think three times before posting a picture of your kids. Extra caution is advised for those with super-cute kids.

Finally, be sure to follow basic online safety rules to avoid giving a scammer access to your accounts. Use strong, unique passwords for each of your online accounts and change up your passwords every six months or so. Avoid using public WiFi unless absolutely necessary. Accept every security and software update offered for your device to keep them operating at optimal security. Finally, avoid sharing sensitive information with an unverified contact and never download an attachment or click on a link within an email from an unknown sender. 

Stay alert and stay safe!

Your Turn: Do you have a digital kidnapping experience to share? Tell us about it in the comments.

What is the Dark Web?

Q: I’ve heard of the dark web, but I never understood what this term means. What is the dark web? How is it accessed? Is there any way to keep my information out of its depths?

A: The dark web is the deepest layer of the internet that isn’t visible to the average browser. Unfortunately, its name is a perfect description of its function, as the dark web is full of illegal activities and crimes. Let’s take a closer look at the dark web and how you can protect your information from being caught in its trap.

What is the dark web?

The internet has been likened to an iceberg. There is very little of it that is truly visible above the surface, but it is enormous, dark and deep underneath. 

There are three basic components of the internet: 

  • The surface web–this involves all websites and landing pages that can easily be accessed through popular search engines and by inputting a URL/address directly into a web browser address bar. 
  • The deep web–this includes private, but not invisible accounts, such as social media pages, retail accounts, membership websites, confidential corporate webpages, medical records and more. All content on the deep web is safeguarded by a paywall or sign-in credentials. Experts have estimated that up to 99% of the internet is comprised of the deep web. 
  • The dark web–the final layer of the internet can only be accessed by downloading special browsing software called Tor. Tor masks IP addresses and instantly renders all visitors anonymous. This is where scammers can buy and sell personal information including credit card numbers, checking account details, Social Security numbers, health records and more. 

Despite its name, not all of the activity that takes place on the dark web is illegal. The deepest part of the internet also provides a platform for communication and commerce among people living in countries that have heavy censorship over online activity. In addition, the dark web was originally used by the United States Department of Defense to communicate anonymously. 

Unfortunately, though, the dark web remains a hotbed of criminal activity. Loads of illegal trade takes place through the dark web, including drugs, firearms, counterfeit money, subscription credentials and personal information of thousands of targets. The inherent anonymity of the dark web allows hackers and scammers to roam free without fear of being caught.

How does the dark web work?

The dark web, and by extension the Tor browser, uses a technology known as “onion routing.” This technology uses multiple layers of encryption and redirection to assure anonymity for every browser. When a browser tries to access a site on the dark web, its information will be routed through thousands of relay points, making it impossible to identify and trace. 

How can I protect myself from the dark web?

It’s important to take preventative measures to protect your information from the dark web. Here’s how:

  • Enable two-step authentication on all online accounts. This includes accounts with access to sensitive information, as well as accounts that can be used to collect innocuous but potentially identifying information, like social media accounts. 
  • Consistently monitor your credit for fraudulent activity. Review your accounts at the end of each billing period and request an annual free credit report. Report any suspicious activity to your credit card company immediately. You can also ask the company to send you automatic alerts if there are any large purchases made or new accounts opened in your name.
  • Use strong, unique passwords for all your accounts. Vary your capitalization use, numbers, words and symbols. For optimal protection, switch up your passwords every few months. 
  • Never share your personal information with an unverified source. This includes an email from a contact you’ve never engaged with before, phone calls from an unknown caller and a downloaded link from a banner ad.
  • Run a dark web scan on your devices. This will tell you if your information is already on the dark web. If the scan is positive, reach out to your credit card issuers to discuss placing a fraud alert on your accounts and a credit freeze in your name. 

The dark web is fraught with danger and impossible to trace but there are ways to protect your information. Use the tips outlined here to stay safe.

Your Turn: Have you encountered the dark web? Share your experience in the comments. 

8 Ways to Spot a Survey Scam

Survey scams are almost as old as the internet. They’re so prevalent, you can hardly spend an hour online without running into an ad for a “super quick” survey promising a reward for just a few minutes of your time. 

What actually happens, though, is that the scammer walks away with a free survey, or worse, your information and/or your money. The alert consumer can spot a survey scam easily, but fraudsters are unfortunately becoming more sophisticated at luring innocent victims into their schemes. 

Don’t get caught! Here are eight ways to spot a survey scam:

  1. You’re asked to pay to participate in a survey

Authentic survey companies need you – you don’t need them. There’s absolutely no reason to pay to take a survey of any kind. If you’re targeted by an ad asking you to take a survey and to pay for the privilege of doing so, don’t respond. 

  1. You’re asked to share sensitive information before you can take the survey

They’d really appreciate it if you could take this quick survey for them. They just need some information from you first, like your Social Security number, date of birth and maybe even your checking account number. If a survey company asks for anything more than basic information from you, sign out as quickly as you can. 

  1. They advertise on Craigslist and similar sites asking for your email address

“Survey companies” that advertise on sites like Craigslist asking you to share your email address are usually fronts for scam rings. They use the bogus surveys as bait so you will share your email address. Once they have this information, they’ll use it to spam you with scam emails, phishing schemes, malware or worse. Alternatively, they’ll sell your email address to another scam ring to be used for similar purposes. 

  1. They offer too much money

If a survey is offering you $100 for a 20-question survey that shouldn’t take you more than five minutes to complete, you can be sure you’re looking at a scam. No legitimate survey company is that desperate. The pay for authentic survey-taking is generally on a much more modest scale. 

  1. You’re directed to download attachments 

Any time an unknown contact asks you to download attachments to your device, be super-suspicious. More often than not, these are scams and the attachments are loaded with malware. Don’t respond to the offer, and if it was made via email, be sure to report the email address as spam. 

  1. They advertise aggressively

If the same solicitation for survey participation keeps popping up across your screen, you may be looking at a scam. Scammers tend to flood their targets with ads in the hopes that one of them will actually work. Similarly, if the survey offer is full of unbelievable testimonials of past

participants, you’re likely looking at a scam. Legitimate survey companies don’t need to try so desperately hard to get people to take their surveys. 

  1. They give you an hour to pre-qualify for the survey

Often, a survey company will want you to answer a few pre-qualifying questions to see if you fit their desired demographic. Scammers exploit the prequalification by having the target answer dozens of questions and then informing them they’ve run out of time and cannot participate in the actual survey. This is false, of course, and the questions the scammer just answered actually were the survey questions, only now they won’t be getting paid for it. Check to see if a survey has a time limit on the prequalification before you start answering questions. 

  1. They require an outrageous minimum before payment

Most legitimate survey companies require the survey taker to complete a minimum number of surveys before the first payment. However, scammers require their targets to take an unrealistic number of surveys before they receive their first paycheck. Often, the victim will just quit before they qualify for a payment and the scammers now have these completed surveys without paying anything for them. 

Survey-taking can be a great way to earn some pocket money, but survey scams are rampant. Follow these tips to stay safe!

Your Turn: Have you been targeted by a survey scam? Share your experience in the comments. 

Beware Malware Scams

Oh no! Your computer’s been hacked, and it now has an awful virus. But there’s good news; a helpful caller reached out to you to offer their expert help. The caller may even be a representative of the Federal Trade Commission (FTC), or another reputable company, and they’re happy to help restore your device to safety. Just do as they say, and all will be right again. 

Unfortunately, it won’t: If you do follow the caller’s instructions, you’ll be lured into a scam. 

Malware scams are particularly malicious, as they exploit the prevalence of scams and hackers to trick innocent victims into losing their information and money. Here’s what you need to know about malware scams and how to avoid them.

How these scams play out

Malware scams, also known as tech support scams, begin as a seemingly innocent phone call. As described, a scammer reaches out to an individual and informs them that their computer or another device has been hacked. The caller will claim that the alleged hacker has gained access to the victim’s computer and can now do all kinds of damage. The caller, posing as a tech support representative, can help remove any viruses or malware that may have been installed in the device. The alleged tech support rep gives clear instructions, often involving giving the caller access to their device. Unfortunately, though, if the victim follows these directions, they’ll actually be installing malware on their computer. 

Red flags

Avoid malware scams by looking out for these warning signs: 

  • An alleged rep of a tech support company, or the FTC, has called you without you reaching out to them first. 
  • The “tech support rep” asks you to provide them with remote access to your device so they can allegedly remove any malware that has been installed.
  • The caller claims that serious damage has already been done to your computer even though everything looks untouched from your observations.
  • The caller urges you to act immediately or risk causing further damage to your device. 
  • The caller asks you to enter your credit card information or checking account details to pay them for their service. Alternatively, they’ll ask to be paid via prepaid gift card. 

If you’ve been targeted

If you believe you’ve been targeted by a malware scam, take these steps to protect your money, and your device, from harm.

First, do not engage with the caller. Hang up as soon possible and block the number. Next, if you’ve started entering information into your computer as per the caller’s instructions, close your device immediately. If you believe you have already given the scammer access to your device, you may want to consult a genuine tech support expert to remove any malware that may have been installed. In addition, consider canceling any credit cards you may have shared with the scammer or which were stored on browsers and apps on the device. Also consider placing a credit freeze on your name to prevent any loans or new lines of credit the scammer may take out in your name. Finally, report the scam to the FTC.

Signs your device has been infected by malware

A computer may be infected with malware and still operate almost normally. Here’s how to tell if your computer’s been infected:

  • It’s slowed down considerably.
  • You’re being blasted with endless pop-up ads. Most of these are also scams. 
  • Your system abruptly crashes. 
  • You’re suddenly low on disk space.
  • There’s an unexplained increase in internet activity. 

If you notice any of these signs on your computer, it’s best to bring it to a tech support expert who can scan it for malware. If malware is found, follow the steps outlined above to protect your money and your information from further harm. 

Don’t get caught in a malware scam! Stay alert and stay safe. 

Your Turn: Have you been targeted by a malware scam? Tell us about it in the comments. 

Don’t Get Caught in a Shopping Scam!

Shopping in 2022 is worlds away from what it was at the turn of the century, or even just a few years ago. According to retail research firm, Digital Commerce 360, ecommerce sales surpassed $870 billion in 2021, a 50% jump over 2019. Online shopping is quick, easy and convenient. 

Unfortunately, though, when a lot of shopping moved online, it also ushered in a wave of scams that are often successful. Some of these scams can be difficult for the untrained eye to spot, and many offer no way for the victim to reclaim their lost funds. Here’s what you need to know to recognize an online shopping scam and avoid being the next victim. 

How these scams play out

There are several variations to the online shopping scam. 

In one version, a shopper will scour the internet for a specific item in their desired price range. They’ll find the item retailing on a site at an attractive price and then proceed to make the purchase. They’ll share payment information, input their delivery address and complete the transaction. Unfortunately, though, the item never arrives on their doorstep. Alternatively, a cheap knockoff of the product will arrive instead of the item they’ve purchased. When the buyer tries to demand a refund, they are unable to reach the seller. 

In another variation, a shopper finds an item online and tries to make a purchase. They’ll be asked to input sensitive information, such as a credit card or checking account number. At this point, the shopper will be unable to complete the transaction and will continuously run into errors on the site. However, the scammers now have their information and can proceed to empty the victim’s accounts, or worse.

In a third version of the online shopping scam, a seller clicks on an ad, or on a site that came up in a Google search for one of their favorite stores. They’ll proceed to make an order, not knowing they’ve actually clicked into a bogus look-a-like site run by scammers. The rest of the scam will follow one of the scenarios described above. 

Red flags

Watch for these warning signs that you may have stumbled upon a shopping scam:

  • Prices are too good to be true. If you find an online offer for a new iPhone retailing at just $450, you’re likely looking at a scam. 
  • The offer urges you to act now. If an offer warns that the bargain prices it’s offering won’t last until sundown, it’s likely a scam. 
  • The seller demands specific means of payment. If an e-tailer insists that you pay via prepaid gift card or wire transfer, opt out. 
  • The website is full of typos and grammar errors. If the site is badly in need of editing, it may be run by scammers. 

Stay safe

Follow these tips to keep yourself safe from online shopping scams:

  • Only shop on safe, secure sites. Check the URL for the lock icon and for the “s” after the “http”.
  • Check the URL for proper spelling of reputable sites. Make sure the URL of the site you’re on matches the authentic URL for that retailer and that you haven’t landed on a spoof site. You may want to save the genuine URLs on your computer for future use. 
  • Avoid clicking on high-pressure pop-ups and banner ads. These are often scams.
  • Pay with a credit card when shopping online. A credit card offers the most protection for your purchases. 
  • Never share personal information with an unverified contact. Don’t input your credit card number or account details unless you’re absolutely sure you’re dealing with a reputable website. 

If you’re targeted

If you’ve fallen victim to an online shopping scam, there are steps you can take to mitigate the damage. 

If you’ve paid via credit card, call the company to dispute the charge. At this point, you may want to consider closing the card and placing a credit alert and/or a credit freeze on your name. Next, alert the FTC about the scam. If the alleged retailer is on the BBB website, you can let them know, too. Finally, let your friends know about the scam so they know to be aware.

Stay safe!

Your Turn: Have you been targeted by a shopping scam? Tell us about it in the comments. 

Don’t Get Caught in a QR Code Scam

Scammers never take a break from dreaming up new ways to con people out of their money. Recently, they’ve even been hijacking QR codes to pull scams on innocent victims. Here’s all you need to know about QR code scams and how to avoid them. 

What’s a QR code? 

Before we can explore the details of these scams, let’s understand what a QR code is and how one works. A QR code, which is an acronym for “Quick Response code,” is a square barcode that can be scanned using a smartphone. It leads directly to a website or app. Businesses use QR codes for any number of reasons, from posting online menus, to scanning coupons, to processing payments and more. In the no-touch era following the coronavirus lockdowns, QR codes are more ubiquitous than ever.  

Ironically, QR codes should help prevent fraud, since they take the user directly to the desired site, leaving no room for misspellings or for scammers to lure victims to a bogus website that has a URL that is similar to the legitimate website. Unfortunately, though, scammers have found a way to weaponize QR codes, too. The technology necessary to create a QR code is not accessible for anyone, making QR code scams easy to pull off and difficult to identify. 

How the scam plays out

In a QR code scam, a scammer will replace a legitimate QR code with their own code. A target will then scan the code and make a payment for a transaction. Unfortunately, the target has sent their money directly to the scammer and has not made a payment for the transaction as they believe they have.

In a recent QR code scam, fraudsters replaced dozens of QR codes on public parking meters in San Antonio, Texas with their own codes. Drivers seeking to pay the meter costs scanned these codes and sent their payments to scammers. To make matters worse, many victims also unknowingly shared access to their phones with the scammers, setting themselves up for future scams as the criminals use the information on the phone to pull off additional schemes. 

How to avoid a QR code scam

QR code scams can be challenging to recognize. For this reason, the FBI has advised against downloading an app from a QR code and/or downloading a QR code scanner app. However, there are ways to keep yourself safe from these scams. 

When scanning a QR code, it’s a good idea to treat the link like any other email or text message. Proceed with caution and practice online safety measures as you would with any other online transaction. Check the source of the QR code and the URL that the code directs you to for common signs of a secure site, including a lock icon, an “s” after the “http,” and whether the URL matches with the URL of the intended site destination. 

If the webpage or app the code sends you to seems suspicious in any way, leave it. You can access the payment portal you need by visiting the app or website on your own. 

When using a QR code, look for these red flags that can indicate a possible scam:

  • The URL is different from the home site.The QR code is posted on a public sign or notice that seems to be tampered with.The site or app the code directs you to is full of typos. 

Knowing how to recognize a QR code scam can help prevent you from falling victim to this emerging and quickly growing scheme. 

If you were scammed

If you’ve used a QR code to pay for a transaction and subsequently received an email from the company claiming you’ve never completed the payment, or that the payment failed, you may be the victim of a QR code scam. Let the company know that its QR code has been tampered with and alert the FTC as well. 

Stay alert when using a QR code and stay safe!

Your Turn: Have you been targeted by a QR code scam? Share your experience in the comments. 

All You Need to Know About the Metaverse and NFTs

If a time-traveler from the 19th century landed in your living room, you’d likely have a hard time explaining the way our world works – especially the way we deal with finances. Your visitor can watch as you hold an oblong object in your hands and proceed to order a full summer wardrobe, new bedroom furniture or maybe even airline tickets. Who would have imagined we’d be able to do all that and more or without ever touching a dollar bill, coin or even a credit card?

But the changes to the way we handle our money continue, and the world of finance evolves along with technology in the most incredible ways. Let’s take a look at two major innovations in the world of technology and finance, as well as how they may affect us in the very near future: the metaverse and NFTs. 

The Metaverse

What is the metaverse?

The term “metaverse” has generated many curious Google searches since Facebook rebranded itself as Meta in October of 2021. In short, the metaverse is a scaled, interoperable network of real-time rendered 3D virtual worlds that can be experienced simultaneously by an infinite number of users. In addition, the metaverse has continuity of data, which includes identity, objects, communications and payments. In simple English, the metaverse is an all-immersive digital universe where users can live, connect and even make financial transactions through virtual reality and augmented reality. If you played “Second Life,” you’ve already had a taste of this.

Does the metaverse exist?

While some forms of the metaverse already exist, the full experience that tech giants envision likely won’t be ready for consumer use for another five to 10 years. However small aspects of the metaverse, including ultra-fast broadband speeds, online worlds that are always “on” and virtual reality headsets to bring the user into another world are already quite common across the internet and gaming world. 

What are some examples of the metaverse?

Here’s where you can get a feel for what the metaverse is actually about: 

  • Meta. Formerly known as Facebook, the platform’s CEO speaks openly and often about the metaverse and the role Facebook will play in its rollout. 

“The next platform and medium will be even more immersive and embodied than the internet, where you’re in the experience, not just looking at it, and we call this the metaverse,” Zuckerberg said after the company’s rebranding. 

  • Microsoft. Similarly, the software giant has made no secret about where it believes the future of technology lies. Microsoft is already developing mixed and extended reality applications through its Microsoft Mesh platform, which blends the real world with augmented reality and virtual reality. Of course, Xbox Live already connects millions of gamers across the globe in a small-scale metaverse. 

 How will the metaverse affect the world of finance?

Experts envision a world where a consumer can enter a massive virtual shopping mall, purchase a unique digital item and sell that item in a different virtual world, such as on Twitter or eBay. In addition, the expected meteoric rise in popularity of the metaverse creates a unique investment opportunity for the savvy investor. 

NFTs

What are NFTs?

NFTs (non-fungible tokens) are a kind of crypto asset in which each token has a unique value. This is as opposed to “fungible” assets like Bitcoin and dollar bills, which all have exactly the same value. Because every NFT is unique, they can be used to authenticate ownership of digital assets including artworks, recordings and virtual real estate or pets.

How do NFTs work?

NFTs are part of the Ethereum blockchain. Ethereum is a cryptocurrency, like Bitcoin, but its blockchain can support NFTs as well. It’s important to note that other blockchains can easily implement their own versions of NFTs. 

NFTs can be anything digital, like music, videos or drawings, but digital art has been monopolizing NFT trading since its inception. NFT art collecting is not unlike fine art collecting in the real world: Millions of people can buy a Monet print, but only one person can own the original – and pay for it. Similarly, while anyone can own a copy of a digital piece of art, the original can sell for hundreds of thousands of dollars, or in some cases, even millions. The irony here is that while the owner of an authentic Monet has a genuine piece of art, there is no real difference between owning a copy of a digital artwork and owning the original.

As bizarre as it may sound, NFTs are gaining popularity at record speed. A 50-second video by Grimes sold for $390,000, a tweet by the founder of Twitter sold for just under $3 million, and a video by Beeple sold for $6.6 million.

What’s the purpose of NFTs?

NFTs present a world of financial possibilities for artists and collectors alike. 

Digital artists with real talent can earn a pretty penny through NFTs. Instead of posting a creative meme they designed on their Facebook page, digital artists can now try selling their work as an NFT. The good news is the artist will continue enjoying dividends of their work far beyond its sale. Every time the NFT changes hands, the artist gets paid a percentage of the profits. This way, if the work only becomes popular a while after it’s created, the artist can still pocket their share of its ultimate value. 

Collectors can use NFTs to purchase unique digital artwork as a financial asset. A work of art always carries with it the possibility of becoming wildly popular and spiking in value. Digital artwork is no exception. In addition, owning an NFT comes with some basic rights, which include being able to post the image online or use it as a profile picture.

The world of finance is constantly evolving as technology races to stay ahead of current trends and futuristic visions. The metaverse and NFTs are just two mediums that can change the way we handle our finances in the near future. Use the primer here to learn all about these technological wonders so you are better prepared to participate in and invest in the future. 

Your Turn: Do you think the metaverse and NFTs will play a major role in our finances? Why, or why not? Share in the comments. 

4 Scams to Watch Out for this Black Friday

Black Friday has traditionally been the day that kicks off the holiday shopping season, sending hordes of crowds surging through malls and big-box stores all over the nation. Unfortunately, it’s also been a day that kicks off the season of shopping scams. 

Here are four scams to watch out for this Black Friday and throughout the holiday shopping season:

  1. The Amazon Prime service fraud scam

In this ruse, a scammer posing as an Amazon representative will call a target to notify them about an alleged problem with their Prime account. The victim will be prompted to download a tool on their computer or mobile device. That “tool” will give the scammer remote access to “help them resolve the problem” that is at hand. If they comply, the victim will then be instructed to log onto their banking account, supposedly so the caller can be compensated for their time. Unfortunately, doing this will give the scammer direct access to the victim’s accounts. 

  1. Phishing emails

Phishing emails are nothing new, but they can be difficult to spot among the barrage of promotional emails flooding inboxes during this time of year. 

Here are two common variations of phishing scams: 

  • Account verification. The victim receives an email appearing to be from a retailer they frequently shop. It informs them that someone has tried to hack into their account. They’re asked to verify their account, or update their account details, through an embedded link. Doing so, however, will give a scammer access to their account. The scammer can now rack up a huge bill and leave the victim to pick up the tab. 
  • Order confirmation. The victim receives an email asking them to confirm an order made through Amazon or another large e-tailer. They’ll be asked to verify the order details through an embedded link. Unfortunately, doing so will give their personal information directly to the scammers. 
  1. Delivery issues

The coronavirus pandemic has forever changed the way Americans shop. It’s resulted in the volume of U.S. online purchases increasing steadily, according to the Census Bureau’s quarterly e-commerce reports. Scammers are well aware of this, and they’ve been quick to capitalize on the opportunities to pull off delivery scams, especially this time of year. 

Delivery scams generally take the form of a message appearing to be from UPS, FedEx or another delivery service, informing the victim of a “delivery issue” with an order. They’ll be asked to confirm or update their information with the provided link. Doing so will give the scammer access to their financial information and open the door to identity theft and more. 

In another variation of the delivery scam, a victim will be asked to pay a fee for covering a customs charge or tax. Of course, these fees are invented by the scammer, who will gladly pocket the money. 

  1. Non-delivery scam

Another scam whose prevalence has spiked with the increase in online shopping is the non-delivery scam, which involves a purchased gift that never arrives. The victim, likely lured in by an ad promising a super-low price on a desired item, rushed to complete the purchase without researching the seller. Unfortunately, the seller then disappears and the victim has no way of notifying them about the no-show or requesting a refund. 

How to avoid Black Friday scams

Follow these tips to keep your shopping free of scams:

  • Don’t open links in emails sent from unverified contacts. 
  • Never allow a stranger access to your device and/or accounts. 
  • Don’t share sensitive information on the phone or online with an unknown contact.
  • If contacted by an alleged representative of Amazon or another large company about an issue with your account, hang up and check your account to see if an issue is actually present.  
  • Always keep the privacy and spam settings on your computer and mobile devices at their strongest settings. 
  • If you have an issue with an ordered item, contact the retailer directly through their site and not through a pop-up ad appearing to represent them. Likewise, it’s a good idea to not click through to “support links” that are posted on troubleshooting forums, as they may not be to legitimate service sites. 
  • Only purchase items from reputable sellers. When shopping on a new site, look for a physical address, a customer service number and copy that’s free of spelling errors and typos. 

Stay safe!

Your Turn: Have you been targeted by a Black Friday scam? Tell us about it in the comments.

All You Need to Know About Multi-factor Authentication

In our digital world, passwords are as much a part of our lives as Netflix and Amazon. Keeping information stored in dozens of accounts across the web can make it easier to stay on top of your finances, order a new pair of jeans or even schedule a dentist appointment. Unfortunately, though, passwords can be relatively easy for scammers to hack, opening the door for identity theft, credit card fraud and more. 

Here’s where multifactor authentication (MFA) comes into play. As a means of securing your information, MFA provides an extra layer of protection for your accounts and sensitive data. 

Here’s all you need to know about MFA, how it works and why it’s an important step in protecting your information. 

How multifactor authentication works

Multifactor authentication utilizes two or more factors to allow the user to sign into an account. Generally, these will consist of something the user knows, like a password or PIN, along with one or both of the following: 

  • Something the user has. This can include a phone, key fob or smartcard. 
  • Something the user is. This can include an iris or fingerprint scan, or voice or facial recognition.

Accounts that use MFA will not allow the user to sign into their account unless both factors are verified.

Why multifactor authentication is crucial for protecting sensitive information

While passwords can provide some protection against hackers, they’ve proven to be an abysmally weak barrier against hackers. A recent study by Digital Shadows, a digital risk protection company, found evidence of approximately 15 billion passwords and logins floating around the darkweb as a result of 100,000 data breaches. These passwords are up for sale to  other cybercriminals, potentially providing them with access to the victims’ financial accounts, credit card information, Social Security data and more.

In addition to opening up the door to sensitive information, a single password can give the hacker entry into a victim’s private life. For example, by hacking into a victim’s Google password, the cybercriminal now has access to their email history, which can include important correspondence and other information; calendar, which can provide a complete picture of the victim’s upcoming events and meetings; YouTube account, which unlocks the victim’s viewing history and uploads, and any other apps that allow users to sign in with a Google account, such as Asana and Mint.

Unfortunately, passwords can be cracked by amateur hackers, even without a data breach. Many consumers make it even easier for hackers to break into their accounts by using weak, ineffective passwords that are simple to guess, and by using the same password across multiple accounts. For these reasons, using MFA when available — especially for accounts that store highly sensitive information — is crucial for ongoing security and protection. This way, in the event of a data breach or hack providing a criminal with your password or login credentials, your information will still be protected. Without access to your account’s second factor for authentication, the hacker has no way to gain entry into your account. 

Where you may encounter MFA

In general, the more sensitive the data an account stores, the stronger security measures the company hosting or providing the account will use. Consequently, you’re most likely to encounter MFA on banking apps and accounts, money management apps, investment apps and the like. Depending on your line of work, you may also need to use MFA to sign into your personal workplace account. Finally, some retailers may offer clients the option of using MFA to sign into their accounts. 

Under each of these and similar circumstances, using MFA means a login time that’s a bit longer and more complicated than just inputting a password or PIN. However, measuring this inconvenience against the time, stress and money it will take to recover from a potential data breach makes it more than worth the extra few minutes. 

Stay safe!

Your Turn: Which means of MFA is your favorite? Tell us about it in the comments.