Recent Updates Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on May 16, 2025 Permalink | Reply
    Tags: , , ,   

    Fake Process Servers Exploit Legal Fears 

    Fake Process Servers Exploit Legal Fears

    By Greg Collier

    A process server has a simple but important job. Their role is to deliver legal documents, such as court summonses or subpoenas, to individuals involved in a legal proceeding. This delivery must follow legal procedures to ensure the recipient is properly notified. Real process servers do not make threats, demand personal information, or call ahead with demands.

    The Better Business Bureau has issued a warning about a growing scam involving fake process servers. Scammers are contacting people by phone and falsely claiming to be process servers attempting to deliver legal papers. In many cases, the callers allege there is a lien against the victim’s home or that legal action is being taken for unpaid medical bills. The intent is to create panic, pushing the person to give up sensitive information.

    In some instances, these callers go beyond the initial target. They may contact relatives or friends, claiming those individuals could face consequences if they do not help reach the original target. These tactics are designed to amplify fear and force quick action. However, no actual legal documents are involved. The goal is identity theft or financial fraud.

    There are ways to identify a real process server from a scammer. A legitimate process server does not ask for Social Security numbers or banking information. They typically do not call ahead with warnings, nor do they try to verify private details over the phone. Most importantly, they serve papers in person and do not threaten arrest for noncompliance. Anyone concerned about potential lawsuits or liens can search court records directly through official court websites.

    Recognizing these signs can help prevent falling victim to this scam. As with many forms of fraud, the key is to stay calm, verify independently, and never give away personal information under pressure.

     
  • Geebo 8:00 am on May 15, 2025 Permalink | Reply
    Tags: , , , ,   

    Deed Scam Hits 58,000 Homeowners 

    By Greg Collier

    A growing real estate scam has cost Americans more than $1.3 billion between 2019 and 2023, affecting an estimated 58,000 victims across the country. The scheme targets vacant or unmonitored properties, often by forging ownership documents and illegally selling these homes to unsuspecting buyers. Federal investigators, along with local agencies, are raising awareness about this trend as new cases continue to emerge.

    In Lee County, Florida, authorities have identified multiple instances of this type of fraud. One individual was convicted of grand theft and trespassing after fraudulently claiming ownership of a property. In another recent incident, a suspect was caught attempting to file a falsified deed with the local records office. Thanks to the county’s property fraud prevention program, investigators were able to trace the fraudulent activity and apprehend the suspect.

    The county’s fraud prevention alert system plays a central role in combating these crimes. The system notifies registered homeowners via email within 24 hours if a document is filed under their name. Before this tool existed, most victims would not learn of unauthorized activity until months later, often when their tax bills failed to arrive. More than 60,000 property owners in Lee County have signed up for the service, though this represents only a small fraction of the 500,000 parcels in the region.

    Experts recommend that homeowners remain proactive when it comes to protecting their property. This includes regularly reviewing property records, signing up for fraud alerts, and being wary of unsolicited offers or suspicious communications regarding real estate. Consulting with legal professionals before making changes to property ownership can also help avoid falling victim to fraudulent transactions.

    Those who believe they may be at risk or suspect unauthorized activity involving a property deed are urged to report it to federal authorities. With real estate often representing a family’s most valuable asset, taking steps to secure it against fraud is essential in today’s digital environment.

     
  • Geebo 8:00 am on May 14, 2025 Permalink | Reply
    Tags: , , , ,   

    Fake Refunds, Real Scams 

    Fake Refunds, Real Scams

    By Greg Collier

    There’s already enough anxiety around scams that threaten dire consequences, whether it’s arrest, fines, or lost accounts. But some scams take a different angle, promising something good instead. One such scheme making the rounds in Michigan and other parts of the country is the so-called refund scam, where fraudsters claim that you’re owed money. The offer sounds appealing, especially during times of economic strain, but it’s just another way to steal your personal or financial information.

    Unlike most scams where the fear of loss or punishment is used to manipulate victims, this one dangles the illusion of a reward. The person contacting you may claim to represent your bank, credit union, government office, or a well-known company. They reach out by email, text, phone call, or even social media, claiming you are due a refund or reimbursement. To receive the money, you are often asked to confirm or provide sensitive information like your bank details or Social Security number. In some cases, the scammer might say a small fee is required up front to process the refund.

    These communications often look convincing. The names and logos may resemble real institutions, and the messages might include enough detail to feel personal or urgent. But these tactics are designed to lower your guard. Once the scammer has what they need, the promised money never arrives. Instead, accounts may be drained or identities stolen. In some cases, victims are sent fraudulent checks that later bounce, leaving them responsible for the full amount.

    This type of fraud relies heavily on trust and distraction. The promise of a refund is meant to create a false sense of gain that distracts from the red flags. The safest response is skepticism. If you didn’t ask for a refund or file a claim, be wary of anyone who says you’re getting one. Contact the company directly using verified contact information if you suspect a message could be legitimate. Avoid calling numbers or clicking links provided in unsolicited communications.

    The Michigan Department of Insurance and Financial Services continues to receive reports of these scams. They remind residents that any unexpected communication offering money should be treated with caution. Financial institutions and legitimate businesses do not ask for sensitive information or advance fees to deliver refunds.

    Being cautious about these offers doesn’t mean you’re being paranoid. It means you’re protecting yourself from schemes that promise gain but deliver loss.

     
  • Geebo 8:00 am on May 13, 2025 Permalink | Reply
    Tags: , , ,   

    Scammers Target Student Loan Restart 

    Scammers Target Student Loan Restart

    By Greg Collier

    There’s already enough confusion about student loan relief, or the lack thereof, without scammers adding to the chaos. As of May 5th, the federal government has resumed the collection of defaulted federal student loans for the first time since March 2020, when payments were paused due to the COVID-19 pandemic. In response to this change, the Better Business Bureau is warning Missouri residents to be on alert for scams targeting borrowers.

    According to the Better Business Bureau (BBB), scammers are exploiting the current uncertainty by contacting borrowers with misleading offers that claim to provide quick or guaranteed student loan forgiveness. These schemes may appear convincing and often pressure borrowers into handing over personal information or paying unnecessary fees. The BBB urges borrowers to remain cautious and avoid trusting unsolicited calls, emails, or texts about loan repayment options.

    One way to reduce the risk of falling victim to these scams is by securing an FSA ID through the official Federal Student Aid website. This helps ensure direct and secure communication between borrowers and the government, rather than third parties posing as legitimate servicers. The BBB also emphasizes the importance of using official websites and verified sources when exploring loan repayment or refinancing options.

    Borrowers are advised not to pay for debt relief services and to be skeptical of any company making bold promises about eliminating student loan debt. Scammers often count on confusion and urgency to convince people to act quickly, especially as collection efforts resume after a long hiatus.

    The BBB’s warning serves as a timely reminder that diligence is essential. Staying informed and cautious is the best defense against fraud as the student loan landscape continues to evolve.

     
  • Geebo 8:00 am on May 12, 2025 Permalink | Reply
    Tags: , , , ,   

    Your Phone Number May Not Be Just Yours 

    By Greg Collier

    A recent case in Franklin County, Kentucky, highlights a troubling trend in mobile phone fraud known as SIM-swapping. Despite the name, this scam does not always involve the physical SIM card in a victim’s device. Even phones with eSIMs or those marketed as not using traditional SIM cards are still vulnerable. What matters to the scammer is control over the phone number, not the card itself.

    SIM-swapping, also called “porting out,” is when a fraudster convinces a mobile carrier to transfer someone’s phone number to a new account under the scammer’s control. Once the transfer is complete, the victim’s device is disconnected from service, while the scammer now receives all calls and text messages meant for the victim. This includes two-factor authentication codes and verification messages that many financial and online services rely on for security.

    In this instance, the couple discovered this scam when their phones lost service almost simultaneously. A message from their mobile provider followed, indicating that a request to change service providers had been received and was being processed. Within minutes, their numbers had been hijacked by individuals using different carriers. From that moment, their identities were essentially in someone else’s hands.

    The consequences were swift and invasive. The scammers attempted to open credit accounts in their names. As the couple scrambled to regain control, they encountered the frustrating reality of automated systems and long waits for human support. In today’s digital environment, losing access to a phone number is more than just an inconvenience. It can mean losing access to email, banking, and personal communications.

    Preventing SIM-swapping begins with strengthening account security. Users are advised to set up unique PINs or passcodes with their mobile carriers that must be provided before any changes are made to their accounts. Some carriers offer port protection or number lock features that make unauthorized transfers more difficult. It’s also critical to limit how much personal information is shared online, especially birthdates, phone numbers, and email addresses which can be used to impersonate a customer in support calls.

    Despite the technical-sounding name, SIM-swapping is a social engineering attack at its core. It preys not on vulnerabilities in the phone itself, but on human error and the weak points in customer service systems. As more services rely on mobile phones as a gateway to personal data, awareness and proactive security measures become all the more essential.

     
  • Geebo 8:00 am on May 8, 2025 Permalink | Reply
    Tags: , , , , ,   

    Google Spoof Scam Exposes Flaws 

    By Greg Collier

    Phishing has evolved far beyond clumsy scams riddled with typos and generic threats. It now wears the mask of legitimacy, often cloaked in branding and technical language convincing enough to fool even savvy users. A recent example of this growing trend involves an especially deceptive attack using Google’s own infrastructure as a weapon.

    Cybercriminals have been exploiting Google Sites and other services to distribute phishing emails that appear to originate from Google’s own domain. In this case, a message disguised as a legal request from law enforcement was sent to users, complete with references to subpoenas and the need to review case materials. The message urged the recipient to click on a link to a Google support page, which in reality led to a page designed to harvest login credentials.

    The trap is insidious. The phishing page is hosted on a subdomain of Google.com, lending a false sense of trust to unsuspecting users. Because the site is built with Google Sites, it carries the appearance of a legitimate Google interface. The attackers further muddy the waters by ensuring the phishing email lands in the same thread as previous legitimate security alerts, increasing the likelihood that users will trust it.

    The deeper issue lies in how Google has allowed this vulnerability to persist. The legacy version of Google Sites, still accessible today, permits anyone to publish content on a Google.com subdomain. This opens the door to abuses like malicious scripts and fake credential portals. Google has been warned about this gap in security, yet the core issues remain unresolved. While some reactive measures have been taken, the architecture still leaves room for repeat abuse.

    This raises a broader concern about corporate responsibility in digital security. Google has positioned itself as a cornerstone of online identity and infrastructure, and with that status comes the obligation to protect its users proactively. Allowing these phishing schemes to exploit the trust associated with the Google name creates not just a security risk, but an erosion of that trust.

    Google’s statement suggests users enable two-factor authentication and passkeys as a defense. While this is sound advice, it shifts the burden onto individuals to compensate for shortcomings in the platform’s safeguards. The more sustainable solution would be for Google to close the loopholes that allow bad actors to operate under its umbrella in the first place.

    As phishing continues to mimic trusted entities more convincingly, users must remain cautious. But the companies whose tools are being weaponized also bear responsibility. Until tech giants like Google take these exploits seriously and move swiftly to harden their platforms, the digital wolves will keep getting in, dressed in ever more convincing sheep’s clothing.

     
  • Geebo 8:00 am on May 7, 2025 Permalink | Reply
    Tags: , , , ,   

    Jury Duty Scam Tactics Exposed 

    By Greg Collier

    Two recent incidents in Massachusetts and Texas have highlighted how convincing and costly phone scams involving fake jury duty summonses continue to affect unsuspecting individuals. In both cases, callers impersonated law enforcement officers, presenting official-sounding threats and legal terminology to pressure victims into handing over thousands of dollars.

    In Massachusetts, a resident of Bourne reported losing over $68,000 after being told he had failed to appear for jury duty. The callers warned of immediate arrest if a payment was not made. They provided documents that appeared official at first glance, but closer inspection revealed inconsistencies, such as incorrect addresses and typographical errors. The victim ultimately transferred the funds at a local business before contacting the authorities.

    In San Antonio, a viewer reported being on the phone for nearly an hour with someone claiming to represent the sheriff’s office. The caller cited a missed jury summons and used legal language to establish authority. A second person joined the call to intensify the pressure and demanded thousands of dollars. The attempt was thwarted when a family member intervened and the potential victim conducted a quick online search, discovering similar past scams.

    These incidents reflect a broader trend. The continued prevalence of such schemes stems in part from their effectiveness. Scams like this persist because people continue to fall for them. The tone of authority, the use of court-related language, and the exploitation of fear make these scams particularly difficult to detect in the moment. However, while these scams are common, blaming the victims is not appropriate. No one is immune. Scammers rely on stress, confusion, and isolation to succeed, and even cautious, educated individuals can be caught off guard.

    Law enforcement agencies consistently remind the public that they do not conduct business this way. Phone calls demanding payment or threatening arrest are not standard practice. Those who receive such calls should hang up and verify the information with a trusted source, such as a local police department or court clerk.

    Public awareness is one of the strongest tools in fighting these scams. Sharing experiences helps prevent others from falling into the same traps. The more these tactics are understood, the less power they hold.

     
  • Geebo 8:00 am on May 6, 2025 Permalink | Reply
    Tags: , , , ,   

    Romance Scam Money Mule Sentenced 

    By Greg Collier

    A recent federal sentencing in Phoenix underscores the growing threat of online financial fraud and the serious legal consequences that can come, even to those who claim they were unaware of their role in a scam. A man who laundered nearly $4 million linked to online romance scams was sentenced to 17 months in prison following his guilty plea to conspiring to structure financial transactions in a way that evaded federal detection.

    The case revealed that the individual played a central role in a wider romance scam operation. By opening and managing dozens of bank accounts under various names, he helped conceal and distribute funds obtained from vulnerable victims, many of whom were misled into believing they were helping loved ones in distress. Surveillance footage and financial records placed him at the heart of the scheme, executing transactions designed to fly under the radar of mandatory financial reporting laws.

    Authorities emphasized that even though the man claimed he believed the money was intended for legitimate business ventures, the methods used to move the funds were deceptive and pointed to a clear effort to obscure their origin. The use of fraudulent identities and structured withdrawals ultimately served the goals of a sophisticated criminal enterprise. In at least one documented instance, a victim lost close to $200,000 by sending funds to an address linked to one of the fraudulent identities used in the scheme.

    This prosecution highlights the increasing prevalence of romance scams and related frauds. Federal investigators have seen a rise in schemes like “pig butchering,” where fraudsters spend time gaining victims’ trust before persuading them to invest in fake cryptocurrency platforms.

    Law enforcement continues to stress the importance of reporting suspected scams, no matter how embarrassing or personal the situation may feel. Older adults in particular are often targeted, and the financial damage is frequently compounded by emotional distress and long-term financial insecurity.

    It is critical for the public to understand that even if someone is unknowingly participating in a scam, actions taken to bypass federal regulations, such as using false identities or structuring financial transactions to avoid detection, can still lead to serious criminal charges. Being unaware of the full scope of a scam does not eliminate liability if the conduct involves deceitful or unlawful behavior.

    Staying vigilant, verifying identities, and avoiding pressure to move money under unusual circumstances can help reduce exposure to such crimes. Anyone who suspects they have been targeted should contact authorities immediately to minimize further harm and aid investigations into these increasingly complex fraud operations.

     
  • Geebo 8:00 am on May 5, 2025 Permalink | Reply
    Tags: , , , ,   

    Travel Abroad? Beware Fake Wi-Fi 

    Travel Abroad? Beware Fake Wi-Fi

    By Greg Collier

    As economic concerns continue to affect consumer behavior, many travelers are reconsidering their summer plans. Domestic air travel is seeing a slight contraction, with several airlines recently announcing the cancellation of select routes within the United States. While this has caused frustration for those seeking to travel closer to home, international destinations, especially those in Europe, appear to be gaining momentum as U.S. carriers expand their global offerings.

    This uptick in overseas travel brings with it a host of new considerations, particularly when it comes to staying connected. International roaming fees from major U.S. carriers typically range from $6 to $15 per day, depending on the specifics of one’s plan and destination. To avoid these charges, many travelers opt to leave their phones in airplane mode and instead rely on Wi-Fi hotspots found in hotels, airports, and cafés.

    However, using public Wi-Fi networks comes with significant security risks. One of the more concerning threats is a tactic known in cybersecurity circles as the ‘evil twin’ attack. In such an attack, a malicious actor creates a fake Wi-Fi network that closely mimics a legitimate one, often using names that resemble trusted locations such as “Airport” or “Cafe_Guest.” Once a traveler connects to the fraudulent network, the attacker is able to intercept and monitor the data being transmitted. This type of intrusion allows them to collect sensitive information such as passwords, emails, and even financial data.

    This threat is particularly troubling because it is both simple and inexpensive for attackers to execute. Setting up a fake hotspot often requires little more than a laptop and freely available software. As international travel becomes more common during peak seasons, so too does the likelihood of encountering one of these fraudulent networks.

    To protect personal information while abroad, travelers are encouraged to avoid connecting to public Wi-Fi networks unless they are secured with a password and known to be legitimate. Device settings should be adjusted to prevent automatic connections to nearby networks, and file sharing should be disabled. It is also wise to refrain from accessing sensitive accounts while using any public connection.

    An added layer of protection can be achieved by using a Virtual Private Network (VPN), which encrypts internet traffic and helps shield it from interception. For those seeking more control over their internet access, a portable hotspot that uses a secured mobile data connection may also be a worthwhile investment.

    As more people prepare to travel internationally this year, awareness and caution are essential. A proactive approach to digital security can prevent costly and intrusive experiences and ensure that the memories made abroad are good ones.

     
  • Geebo 8:00 am on May 2, 2025 Permalink | Reply
    Tags: , , , ,   

    Scammers Peddling Fake Health Plans 

    Scammers Peddling Fake Health Plans

    By Greg Collier

    The FBI is warning the public about a widespread scam involving fraudulent discount medical insurance plans. These deceptive schemes are targeting people who are searching for affordable healthcare coverage. Many victims have lost money and received no actual insurance benefits in return.

    These scams typically begin with an unsolicited phone call, email, or text message. The person on the other end poses as a representative from a legitimate insurance provider and offers what sounds like an unbeatable deal. They may promise full medical or dental coverage, the ability to see your current doctor, or even additional perks like help with groceries and gas. The catch is that you have to act quickly. The supposed discount is only available for a short time, creating pressure to make an immediate decision.

    Once people agree and submit their payment, the promised insurance never materializes. Some only discover the truth after trying to use the policy for a medical visit, only to be told they are not insured and must pay out of pocket. Others are misled about refunds or cancellation terms and find themselves unable to stop recurring charges.

    The FBI reports that these scams are not isolated incidents. A recent case in Washington state resulted in a cease-and-desist order against a company operating under several names. The business received more than 100 complaints for misrepresenting coverage, charging unauthorized fees, and denying refunds.

    These operations often use language that resembles official communications, which makes the pitch seem legitimate. Victims are rushed through the process and discouraged from reading the fine print. By the time the deception is uncovered, the damage is already done.

    Consumers are strongly urged to avoid any health insurance or benefit offer that arrives through an unsolicited phone call or message. If it sounds too good to be true, it probably is. Take the time to verify companies through official channels and never give out payment or personal information under pressure.

    These scams are evolving quickly and spreading across the country. The cost of falling for them can be both financial and personal. With millions already lost, awareness remains the best defense.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel