All VyStar offices will be closed on November 26.
Unfortunately, mass marketing scams persist because they work—at least enough to justify the attempts made. In a 2015 Data Breach Investigation report conducted by Verizon, it was found that it takes an average of 82 seconds from the time a phishing campaign is launched for the first victim to fall for the trap.
How is it that scammers are able to trick the average person into making costly and humiliating mistakes? How is it that even the smartest people can fall for the simplest scams?
As it turns out, behind the robocalls and the cheesy emails about deposed Nigerian princes, there is some psychology at play. Scammers are very good at crafting situations that create “amygdala hijack”, which is a term used to describe what happens when the brain perceives an emergency situation. Fear, urgency or threatening behavior can trigger a reaction in your brain that sidesteps the usual neural pathways. Amygdala hijack is what compels you to act before any rational thought can kick in—and this is what many scams are designed to get you to do. In a state of amygdala hijack, you might comply with a scammer’s request before your brain gets a chance to notice any red flags. This helps to explain why smart people fall for (seemingly) obvious scams.
We often look to family, friends and even other consumers when it comes to decision-making, and scammers use this to their advantage by impersonating others in order to make a scam seem more credible to its target. A common example is fake product reviews on online shopping sites. In order to move more product, the fraudulent seller will fabricate identities and post glowing reviews to influence a purchase and to bury any accurate (and negative) reviews. In other scams, existing connections are used to make a scam seem legitimate. In one especially manipulative example, scammers will use social media posts to figure out when you’re out of town or on a vacation. Then, posing as you, they contact friends, relatives or co-workers and request financial help with an emergency. Because you are in fact on vacation, the request gets a little boost of legitimacy that makes it easier for targets to overlook the scam.
Even though scams come in all shapes and sizes and via different communication methods, there are some underlying similarities. Keeping an eye out for tactics like scarcity, authority and credibility will help you flag potential fraud. Even when presented with a stressful situation, create an opportunity for yourself to pause and think before acting. Although that the circumstance may seem time-sensitive, think about whether the context of the situation makes sense. Verify the legitimacy of the communication (do not use the contact information that the potential scammer has provided themselves—call them back through a main number listed on an official website). If someone is claiming to be your friend but the circumstance is suspicious, verify their identity through another form of communication, like a phone call or text message. Don’t worry about being polite—verifying the identity of the person or company you are talking to is a reasonable thing to do. It also helps to take preventive measures by being careful with your personal information and using privacy settings on social media accounts.
If you use a cellphone or have an email account, you’ve likely been exposed to an attempted scam. • “I’m a deposed prince. Can you help me out?” • “This is the opportunity of a lifetime...” • “Congratulations! You’ve won the grand prize!” • “I’m collecting donations on behalf of...” Types of scams Familiarizing yourself with common scams can help you spot them before they turn into costly mistakes. Unexpected money • The setup: A wealthy person asks the target for help with the transfer of a large sum of money, or an estate lawyer notifies the target of a large inheritance from a distant relative • The swindle: The target is required to pay fees, write a check or provide bank account access in order to complete the transfer of funds; the target never receives the money Unexpected winnings • The setup: The target is notified that they’ve won a lottery, a contest, a sweepstakes or some other prize giveaway • The swindle: In order to claim the (invented) prize, the target is instructed to pay a lottery tax or provide personal information Buyer-seller fraud • The setup: The target comes across a tempting online listing for a premium item at an extremely low price • The swindle: Scammers collect the payment but never deliver on the product; multiple accounts and fake reviews are used to disguise their deceptive practices Fake charities • The setup: The target is contacted by a charitable organization and asked to make a donation • The swindle: Scammers pose as existing charities or invent fake ones and then pocket the donations Dating schemes • The setup: The target is charmed by a new online sweetheart and develops an emotional bond with them • The swindle: The new sweetheart is actually a scammer; once the relationship has developed, the scammer asks for expensive gifts, travel or cash Get-rich-quick schemes • The setup: A job placement service offers to find a position for an unemployed target, or the target is approached by a businessperson with an investment opportunity • The swindle: The scammer collects placement fees for their fraudulent job placement service, or takes off with the target’s investment money Threats and extortion • The setup: The target receives urgent demands for money from a government official or from law enforcement, or the target discovers ransomware on their computer • The swindle: The scammer poses as an authority figure to scare the target into paying them; the scammer holds computer files hostage to pressure the target into paying them Identity theft • The setup: The target is asked to log into their account or confirm their password, or the target is contacted by a friend or relative and asked a series of questions • The swindle: The scammer impersonates the target’s personal and business contacts in order to gain personal details that can then be resold or used for identity fraud • • • Reporting scams • • If you believe you’ve been targeted by a scammer, contact the following: • Internet Crime Complaint Center (IC3): www.ic3.gov • Federal Trade Commission: www.FTC.gov/complaint Scams are often under-reported because of embarrassment or shame. Staying safe Buy some time: In an emergency, it’s natural to act before you have time to think. It’s no coincidence that many scams are designed to encourage an immediate reaction, before you have a chance to spot any red flags. Allow yourself to take a minute to assess a situation, even if it seems urgent. • Use the address bar: Get in the habit of visiting websites directly instead of following links contained in emails. It takes only a few extra seconds and helps you be more mindful about your online activity. • Cross-reference: It’s perfectly reasonable to verify the identity of the person or business you’re in contact with. Use a means outside of the original communication, like doing a separate web search or returning a call through a publicly listed number. Sources: FBI.gov, USA.gov, Australian Competition and Consumer Commission