Updates from December, 2025 Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on December 26, 2025 Permalink | Reply
    Tags: , , ,   

    Scammers Are Mailing Fake Inheritances 

    Scammers Are Mailing Fake Inheritances

    By Greg Collier

    As families gathered during the holiday season, scammers were taking advantage of the distractions and emotions that come with it. A new warning out of Iowa highlights how fraudsters are once again reviving a familiar scheme: the “long-lost relative” inheritance scam.

    According to a recent alert, Iowa residents have been receiving letters claiming they are entitled to a large inheritance from a relative they never knew existed. The pitch sounds formal, official, and even comforting until victims realize it’s designed to drain their personal information and money.

    What’s Going On

    The Iowa Insurance Division (IID) says these scams often begin with a letter or email stating that the recipient is the only surviving heir of a deceased relative. The message typically directs the recipient to contact a law firm, often supposedly based in another country, such as Canada, to begin the inheritance process.

    Once contact is made, scammers gradually extract sensitive personal details, including banking information and Social Security numbers. Eventually, victims are asked to send money to cover “taxes,” “legal fees,” or other costs required to release the inheritance.

    Of course, there is no actual inheritance.

    How the Scam Works

    This scheme relies on a mix of curiosity, trust in legal-sounding language, and the hope of unexpected financial relief, something scammers know is especially tempting during the holiday season.

    The process usually follows a predictable pattern:

    • An unsolicited letter or email claims a distant relative left behind a large sum of money
    • The recipient is told they must act quickly to claim it
    • Personal information is requested “to verify identity”
    • Fees or taxes are demanded before the funds can be released

    Once money or personal data is sent, it’s typically impossible to recover.

    Red Flags

    The IID has outlined several warnings that should immediately raise concern:

    • Messages from unknown senders, often based in another country
    • Claims of large inheritances from relatives you’ve never heard of
    • Requests for sensitive personal information, including bank details or Social Security numbers
    • Demands for upfront payments to cover taxes, fees, or legal costs

    It’s worth remembering that legitimate law firms do not request fees upfront or solicit sensitive personal information through unsolicited letters or emails.

    How to Protect Yourself and Your Family

    If you receive a message like this, do not respond. Do not provide any personal information, and do not send money no matter how official the letter appears.

    The IID strongly encourages people to talk with family members about inheritance scams, especially older relatives who may be more likely to receive physical letters and take them at face value.

    Final Thoughts

    Scammers thrive on timing, and the holiday season gives them plenty of opportunities. If an inheritance offer appears out of nowhere, promises large sums of money, and asks for personal details or upfront fees, it’s almost certainly a scam.

    When it comes to unexpected windfalls, skepticism is your best protection.

    Further Reading

     
  • Geebo 9:00 am on December 24, 2025 Permalink | Reply
    Tags: , , , patient brokering,   

    Why “Free” Rehab Should Raise Red Flags 

    By Greg Collier

    Even if you have never been to Philadelphia, you may have heard of Kensington, a neighborhood that has become nationally known for its visible and deeply entrenched drug crisis. Images and reports from the area have circulated widely in recent years, often used to illustrate the severity of the opioid epidemic in the United States.

    According to a recent investigation by the Philadelphia Inquirer, Kensington has also become a target for a troubling scheme tied to the addiction treatment industry. Recruiters have allegedly approached people struggling with substance abuse and offered what sounded like a lifeline: free travel, free housing, and free treatment at out-of-state rehabilitation facilities. The offers are framed as an opportunity for a fresh start, far from the environment where addiction took hold.

    However, the investigation found that these promises often did not match reality. Individuals were reportedly flown across the country, enrolled in private health insurance plans they did not fully understand, and placed into treatment settings that failed to deliver the level of medical care they expected. Critics described the practice as a form of patient brokering, in which people seeking help are treated as financial assets rather than patients in need of care.

    As disturbing as this situation is, it is not unique to Philadelphia. Similar allegations involving addiction treatment recruitment, insurance manipulation, and misleading promises have been reported in multiple states. Federal prosecutions and state investigations have shown that these practices can surface anywhere vulnerable people intersect with loosely regulated parts of the healthcare system.

    Substance abuse is among the most devastating challenges a person or family can face. It affects physical health, mental health, finances, and relationships, often all at once. Families watching a loved one struggle are frequently desperate for solutions, and people experiencing addiction themselves may be willing to accept almost any offer that sounds like help. No one in that position deserves to be exploited or misled.

    Protecting Yourself and Your Loved Ones

    While not every treatment referral is a scam, there are steps people can take to reduce the risk of being taken advantage of:

    Be cautious of “too good to be true” offers
    Promises of free luxury treatment, immediate placement, airfare, and housing with no clear explanation of funding should raise concerns.

    Ask who is paying and how
    Legitimate treatment providers should be transparent about costs, insurance coverage, and who is responsible for premiums and medical bills.

    Verify facilities independently
    Before agreeing to treatment, try to confirm a facility’s licensing status, medical staffing, and complaint history through state health departments or trusted healthcare professionals.

    Avoid pressure tactics
    Urgent deadlines, repeated calls, or discouragement from asking questions are common red flags in healthcare-related scams.

    Seek local, trusted guidance
    Local hospitals, nonprofit treatment referral services, or established recovery organizations can often provide safer, more reliable pathways to care.

    Involve a trusted third party
    When possible, have a family member, social worker, or healthcare advocate review paperwork and insurance enrollment before anything is signed.

    Final Thoughts

    The addiction crisis has created enormous demand for treatment, and where there is demand, there is potential for abuse. Investigations like this one highlight the need for stronger oversight, better enforcement, and greater public awareness. Most importantly, they serve as a reminder that people seeking recovery are patients first and not opportunities to be exploited.

     
  • Geebo 9:00 am on December 23, 2025 Permalink | Reply
    Tags: , , , , ,   

    AI-Generated “IRS” Phone Calls Are Back and Smarter Than Ever 

    By Greg Collier

    Scammers are once again exploiting fear around taxes, but this time they’re using artificial intelligence to sound more convincing than ever.

    A recent consumer report describes a new wave of AI-generated phone calls impersonating tax officials, designed to scare people into handing over sensitive personal information.

    This is not a robocall problem. It’s a credibility problem.

    What’s Going On

    One example of the scam involves a voicemail that begins:

    “Hello, this is George from the tax resolution unit…”

    The caller claims the recipient’s tax file has been flagged due to either an unpaid balance or missing returns following the 2025 extension deadline, then urges the recipient to press one to speak with a “tax officer.”

    Nothing about this call is legitimate.

    Scam Breakdown

    This scam relies on three core tactics:

    Authority by implication
    The caller strongly implies a connection to the Internal Revenue Service without ever explicitly stating it. This is deliberate. It creates fear while avoiding clear claims that could be easily disproven.

    Fear and urgency
    Phrases like “flagged file,” “missing returns,” and “deadline” are carefully chosen to provoke panic and push recipients into acting before thinking.

    AI voice generation
    The call is likely created or enhanced using AI, allowing scammers to produce natural-sounding voices at scale and deploy the same message nationwide with minimal effort.

    This identical message has been reported by consumers across the country to the Better Business Bureau Scam Tracker.

    Red Flags

    Several warning signs stand out immediately:

    • The caller never addresses the recipient by name
    • A nonexistent “tax resolution unit” is referenced
    • The caller never explicitly claims to be from the IRS
    • Immediate action is demanded through keypad prompts
    • Consequences or refunds are implied without documentation

    Most importantly:

    The IRS does not contact individuals by phone about missing returns, balances, or refunds. Initial contact is always made by official mail.

    Why This Scam Works

    AI has lowered the barrier for impersonation.

    Scammers no longer need obvious robocalls or poorly written scripts. AI-generated voices can sound calm, professional, and authoritative—exactly what people expect from a government agency.

    Once someone responds, the goal is simple: obtain Social Security numbers, banking details, or direct payments under the threat of legal action or the promise of a refund that does not exist.

    What to Do If You Receive This Call

    • Do not press any buttons
    • Hang up immediately
    • Do not return the call
    • Report the incident to consumer protection agencies and the IRS impersonation reporting page

    If you are genuinely concerned about your tax status, check your account directly through official IRS channels or consult a licensed tax professional. Never rely on a phone number left in a voicemail.

    Final Thoughts

    AI has not just made scams more efficient; it has made them more believable.

    If a tax-related call:

    • Comes out of the blue
    • Creates urgency
    • Demands immediate action

    It is almost certainly a scam.

    The IRS does not operate this way. Scammers do.

    Further Reading

     
  • Geebo 9:00 am on December 22, 2025 Permalink | Reply
    Tags: , , , ,   

    This Holiday “Good Cause” Might Be a Credit Card Test Scam 

    By Greg Collier

    With so many purchases flying by during the holiday season, it’s easy to overlook a small charge here or there on your credit card statement, especially if it looks like a donation.

    That’s exactly what scammers are counting on.

    If you spot a charity charge you don’t remember authorizing, it may not be holiday generosity you forgot about. It may be a credit card testing scam, and the small charge is just the beginning.

    What’s Going On

    During December, nearly 30% of all charitable giving takes place. Between gifts, travel, and end-of-year expenses, most people aren’t scrutinizing every $2–$20 charge.

    Scammers know this.

    Instead of immediately draining an account, they often start small, quietly checking whether stolen credit card numbers still work before going bigger.

    How the Scam Works

    Here’s the typical pattern:

    1. Your credit card information is stolen
      • Through a data breach
      • A sketchy online purchase
      • A phishing scam
      • Or malware on a device
    2. Scammers “test” the card
      • They make small donations—often just a few dollars
      • Charity sites are ideal because tiny donations are common and rarely questioned
    3. The charge goes through
      • This confirms the card is active
      • The scammer now knows the number is usable
    4. Larger fraud follows
      • Big purchases
      • Cash advances
      • Or repeated unauthorized charges

    By the time you notice, hundreds—or thousands—of dollars may already be gone.

    Real-World Examples

    One report described a person approached by two men claiming to raise money for a child needing medical care. The donor was told they’d be charged $20.

    The actual charge? $2,400.

    Another victim reported that after shopping on a questionable discount site, their debit card was hit with a string of fraudulent charges:

    • $2
    • $12
    • $29
    • $67—listed as a “charity” charge

    Those early charges were the warning signs. The final one confirmed the card was still valid.

    Why This Scam Is Easy to Miss

    • Charges are small
    • The description looks legitimate
    • It happens during the busiest spending month of the year
    • People assume it’s a donation they forgot making

    By the time the fraud is obvious, the damage is already done.

    Red Flags

    • Charity charges you don’t recognize
    • Multiple small charges in a short period
    • Donations made after shopping on unfamiliar websites
    • Requests for payment via:
      • Gift cards
      • Wire transfers
      • Peer-to-peer apps
    • Pressure to “donate now” without verification

    If something feels off, it probably is.

    How to Protect Yourself

    Check your statements regularly
    Don’t wait until the end of the month. Scan your charges frequently, especially in December.

    Report suspicious charges immediately
    Contact your card issuer’s fraud department right away. Waiting only helps the scammer.

    Replace compromised cards
    Once fraud is suspected:

    • Cancel the card
    • Get a new number
    • Change your PIN

    Be cautious online

    • Avoid suspicious discount sites
    • Don’t click donation links from unsolicited messages
    • Keep devices updated with anti-malware software
    • Look for secure sites (https and lock icon—but remember, those alone aren’t guarantees)

    Use credit cards, not debit cards
    Credit cards generally offer stronger fraud protections and faster recovery for unauthorized charges.

    Final Thoughts

    That “tiny donation” you don’t remember making may not be kindness—it may be a test run.

    Scammers rely on distraction, goodwill, and holiday chaos to slip under the radar. A few dollars today can turn into a financial headache tomorrow.

    This season, generosity is good—but vigilance is better.

    Further Reading

     
  • Geebo 9:00 am on December 19, 2025 Permalink | Reply
    Tags: , , , , ,   

    How Scammers Are Using AI “Proof of Life” to Extort Families 

    AI Voice Fuels Virtual Kidnap Plot

    By Greg Collier

    This is not the old “your loved one has been kidnapped” scam.

    Federal authorities are warning about a new evolution of virtual kidnapping, one that uses altered photos, manipulated videos, and AI-assisted media pulled straight from social media to create convincing “proof of life” and trigger immediate panic.

    According to the FBI, criminals are now fabricating images and videos that make it appear as though a family member or friend has been abducted, injured, or being held hostage—complete with urgent ransom demands and threats of violence.

    And unlike earlier versions of the scam, this one doesn’t rely on imagination alone. It relies on visual evidence.

    What’s New About This Scam

    Traditional virtual kidnapping scams depended on fear, confusion, and vague threats. The victim was pressured to act quickly before thinking things through.

    This new version adds something far more dangerous: manufactured realism.

    Scammers now:

    • Pull photos and videos from social media profiles
    • Alter them using AI tools or digital manipulation
    • Send them as “proof of life” during ransom demands
    • Use timed or disappearing messages to limit scrutiny

    The result is a moment where logic collapses under shock. Victims aren’t just told their loved one is in danger; they’re shown what looks like evidence.

    How the Scam Typically Unfolds

    The FBI says the pattern is disturbingly consistent:

    A text message arrives claiming a loved one has been kidnapped. The message demands immediate payment for their release. Violence is threatened if the victim delays or contacts authorities.

    Then comes the hook.

    The scammer sends a photo or video that appears to show the kidnapped person. In many cases, it looks real enough to override rational doubt, at least at first glance.

    Only later, if the victim has time to examine it closely, do the cracks appear.

    The Red Flags Inside the “Proof”

    According to federal investigators, the fabricated media often contains subtle but important errors, including:

    • Missing or incorrect tattoos
    • Absent scars or identifying marks
    • Incorrect body proportions
    • Inconsistencies with known photos
    • Visual details that don’t quite line up

    Scammers frequently counter this by using timed messages, giving victims only seconds to view the image before it disappears—just long enough to scare, not long enough to analyze.

    Why This Scam Works So Well

    This scam is effective because it exploits three things at once:

    1. Public social media footprints: Criminals no longer need insider access. Public photos are enough.
    2. AI-assisted manipulation: Creating fake but believable images is faster and cheaper than ever.
    3. Urgency engineering: Fear plus time pressure shuts down critical thinking.

    Once panic sets in, scammers push victims toward immediate payment—often before they attempt the most important step of all.

    Verification.

    How to Protect Yourself and Your Family

    The FBI recommends several concrete steps to reduce risk:

    • Be cautious about what you post publicly, especially travel details and personal identifiers
    • Avoid sharing personal information with strangers while traveling
    • Establish a family code word that only trusted loved ones would know
    • Be wary of urgent threats designed to rush your decision-making
    • Screenshot or record any images or videos sent as “proof”
    • Always attempt to directly contact the loved one before paying any ransom

    That last step is critical. Many victims discover the truth within minutes—if they pause long enough to check.

    If You’re Targeted

    If you believe you’ve encountered a virtual kidnapping scam, the FBI urges victims to report it to the Internet Crime Complaint Center (IC3). Preserve all messages, images, phone numbers, and payment requests.

    Even if no money was sent, reporting helps investigators track patterns and warn others.

    Final Thoughts

    This isn’t just another scam; it’s a technological escalation.

    Virtual kidnapping is no longer purely psychological. It’s visual. It’s manipulated. And it’s designed to exploit the trust we place in images and video.

    The safest response is not panic, but pause.

    Because in this new version of the scam, what looks real may be anything but.

    Further Reading

     
  • Geebo 9:00 am on December 18, 2025 Permalink | Reply
    Tags: , free wifi, , ,   

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained 

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained

    By Greg Collier

    As millions of people travel for the holidays, airports, hotels, coffee shops, and convention centers are packed with travelers looking for one thing the moment they sit down: free Wi-Fi.

    That demand creates the perfect opening for a lesser-known but highly effective cyber scam known as the “evil twin” Wi-Fi attack—and travelers are among the most common victims.

    This scam doesn’t rely on fake prizes, urgent phone calls, or phishing emails. Instead, it quietly exploits trust, convenience, and public networks.

    What Is an “Evil Twin” Wi-Fi Network?

    An evil twin is a fake Wi-Fi network that looks legitimate but is actually controlled by a scammer.

    It’s called an “evil twin” because it is designed to closely mimic a real network you already trust.

    Examples include:

    • Airport_Free_WiFi
    • Hotel Guest Network
    • Starbucks_WiFi
    • ConventionCenter_Public

    To a traveler in a hurry, these names look normal, and that’s exactly the point.

    Once connected, the attacker can:

    • Monitor your internet traffic
    • Capture login credentials
    • Intercept emails or messages
    • Redirect you to fake login pages
    • Install malware in some cases

    You don’t need to click a suspicious link. Simply connecting can be enough.

    Why Travelers Are Prime Targets

    Holiday travelers are uniquely vulnerable to this scam for several reasons:

    • Constant movement between unfamiliar locations
    • High reliance on public Wi-Fi to avoid roaming charges
    • Urgency to check flights, reservations, rideshares, or work email
    • Distraction and fatigue, especially during delays

    Airports and hotels are particularly attractive to scammers because:

    • They host large volumes of short-term users
    • People expect multiple similarly named networks
    • Security announcements about Wi-Fi are rare or unclear

    How the Scam Typically Works

    1. A scammer sets up a portable Wi-Fi hotspot using a laptop or small device.
    2. They name it to closely resemble a legitimate network nearby.
    3. The fake network often has a stronger signal, making it appear first on your device.
    4. When you connect, one of two things happens:
      • You are silently monitored while browsing
      • You’re redirected to a fake “sign-in” page asking for email, social media, or even payment details

    In many cases, victims never realize anything went wrong until accounts are compromised later.

    What Information Can Be Stolen?

    Depending on the setup, an evil twin network can expose:

    • Email usernames and passwords
    • Social media logins
    • Online banking credentials
    • Corporate VPN access
    • Travel rewards accounts
    • Session cookies that allow account takeover without a password

    Even encrypted websites (HTTPS) don’t fully protect against every version of this attack, especially if users ignore browser warnings or log into insecure pages.

    Red Flags

    While evil twin networks are designed to look legitimate, warning signs may include:

    • Multiple Wi-Fi networks with nearly identical names
    • A login page that looks generic or unbranded
    • Requests for unnecessary personal information
    • A network that suddenly disconnects and reconnects repeatedly
    • Browser warnings about security certificates

    If anything feels off, disconnect immediately.

    How Travelers Can Protect Themselves

    A few simple precautions can dramatically reduce risk:

    • Avoid public Wi-Fi for sensitive activities like banking or work logins
    • Confirm the exact network name with airport signage or hotel staff
    • Turn off auto-connect for open Wi-Fi networks
    • Use a trusted VPN when connecting on the road
    • Enable two-factor authentication on important accounts
    • Forget networks after use so your device doesn’t reconnect automatically

    When in doubt, using your phone’s cellular hotspot is often safer than unknown public Wi-Fi.

    Final Thoughts

    The evil twin Wi-Fi scam highlights an uncomfortable reality. Not all scams announce themselves.

    Some of the most effective modern fraud relies on blending into everyday infrastructure, airports, hotels, cafés, and other public spaces we assume are safe.

    As travel increases during the holiday season, awareness becomes the most effective defense.

    If you wouldn’t hand your phone unlocked to a stranger in an airport, don’t hand over your internet traffic either.

    Free Wi-Fi is convenient, but when it comes to unknown networks, convenience can be costly.

    Staying connected shouldn’t mean staying exposed.

    Further Reading

     
  • Geebo 9:00 am on December 17, 2025 Permalink | Reply
    Tags: , , , ,   

    Scam Alert: Fake “Mega Millions Special Drawing” Impersonation 

    By Greg Collier

    Mega Millions officials are warning players about a new lottery scam in which criminals are impersonating the brand online and promoting a fake “special drawing.” Using the game’s familiar logo, colors, and language, these scams are designed to look legitimate while steering victims toward fraudulent websites, phone numbers, or direct messages.

    The warning underscores a broader pattern of lottery-related fraud in which well-known brands are used to create a false sense of authenticity and urgency.

    What’s Happening

    According to Mega Millions, scammers are circulating online content that claims to offer:

    • Entry into a special or exclusive Mega Millions drawing
    • Notification of a prize win despite the recipient never purchasing a ticket
    • Instructions to “verify” or “claim” winnings through links or phone calls

    The lead director of Mega Millions said these schemes rely on visual familiarity and persuasive language to appear credible. Despite their variations, they all share a common goal: obtaining money or personal information from unsuspecting consumers.

    How the Scam Typically Works

    These impersonation scams often follow a predictable structure:

    1. Use of official branding: Logos and graphics resembling Mega Millions materials are copied to appear authentic.
    2. Unsolicited prize claims or promotions: Targets are told they have won or been selected for a special drawing they did not enter.
    3. Requests for action: Victims are directed to click links, respond to messages, or call phone numbers to confirm details.
    4. Financial or data demands: The scam escalates with requests for fees, taxes, or sensitive personal and banking information.

    Once money or personal data is provided, it is typically unrecoverable.

    Red Flags

    Mega Millions advises consumers to be alert for the following red flags:

    • Claims that you won a lottery you never played
    • Social media posts advertising “special drawings” or surprise promotions
    • Requests to click unfamiliar links or call unknown numbers
    • Instructions to send money in order to collect winnings
    • Messages with poor grammar or spelling
    • Phone calls or texts from unfamiliar or unexpected area codes

    Quick Tip: Legitimate lotteries never require winners to pay to receive a prize.

    How to Protect Yourself

    To reduce the risk of falling victim to lottery scams, Mega Millions recommends:

    • Verifying promotions only through official lottery websites
    • Avoiding links, phone numbers, or messages from unsolicited contacts
    • Never sharing sensitive personal or financial information
    • Hanging up on and blocking suspected scammers

    Consumers who believe they have encountered a scam may contact the Federal Trade Commission at (877) 382-4357 or report the incident to local law enforcement.

    Final Thoughts

    If you did not purchase a ticket or enter a drawing, there is no legitimate prize to claim. Authentic lotteries do not operate through unsolicited messages, social media direct outreach, or upfront payment requests.

    Scams that misuse trusted brands rely on familiarity to lower skepticism. Staying cautious, verifying information through official sources, and refusing unsolicited requests are the most effective ways to protect yourself and others from lottery fraud.

    Further Reading

     
  • Geebo 9:00 am on December 16, 2025 Permalink | Reply
    Tags: , contactless payment, , ghost tapping,   

    “Ghost Tapping” Scams: How Tap-to-Pay Can Turn Into Tap-to-Steal 

    By Greg Collier

    Tap-to-pay cards and mobile wallets are everywhere now. They’re fast, convenient, and generally secure.

    But scammers are finding ways to abuse that convenience, and the Better Business Bureau is now warning about a growing scam they call “ghost tapping.”

    This isn’t a hack. It’s a confidence trick that relies on distraction, social pressure, and people assuming tap-to-pay is always safe.

    What’s Going On

    According to the BBB, scammers are targeting people who use tap-to-pay cards or mobile wallets in crowded or distracting environments.

    The idea is simple. Scammers get you to tap quickly without clearly seeing the amount and walk away with far more money than you expected to pay.

    Several victims have already reported losing hundreds or even thousands of dollars.

    How the “Ghost Tapping” Scam Works

    Scammers typically rely on social engineering, not technology.

    Common tactics include:

    • Getting physically close in public places
    • Pretending to be a legitimate vendor
    • Running fake charity or fundraising pitches
    • Rushing the transaction so you don’t stop to think

    One reported case involved a man going door-to-door selling chocolate, claiming the money supported special-needs students. He told residents he could only accept tap-to-pay.

    Once the victim tapped their card or phone, the scammer allegedly charged large amounts without clearly showing the total.

    Reported losses included:

    • One woman’s mother losing $537.
    • Another victim lost $1,100.

    By the time the charge was noticed, the scammer was long gone.

    Why This Works

    Tap-to-pay trains people to move fast.

    Scammers exploit that by:

    • Creating urgency
    • Avoiding receipts
    • Keeping screens angled away
    • Using emotional hooks like charity appeals
    • Operating where people are distracted (festivals, markets, busy sidewalks)

    The technology isn’t broken, but human attention is.

    Red Flags

    The BBB says you should be suspicious if:

    • You’re asked to tap without seeing the total
    • No receipt is offered
    • The seller insists on tap-to-pay only
    • You receive small “test” charges on your account
    • You notice strange charges after being in crowded areas

    If someone won’t slow down or show you the amount clearly, that’s your cue to stop.

    How to Protect Yourself

    The BBB recommends several practical steps:

    • Use an RFID-blocking wallet or sleeve
    • Always confirm the payment amount before tapping
    • Set up transaction alerts with your bank
    • Regularly review your statements
    • Limit tap-to-pay use in high-risk or crowded areas

    Convenience should never override verification.

    What to Do If You’re a Victim

    If you think you’ve been hit by a ghost-tapping scam:

    1. Contact your bank or card issuer immediately
    2. Freeze or cancel the affected card
    3. Dispute the charges
    4. Report the scam to the BBB’s Scam Tracker

    The faster you act, the better your chances of limiting the damage.

    Final Thoughts

    Tap-to-pay is generally safe, but it’s not magic.

    Scammers don’t need to break encryption if they can rush you, distract you, or manipulate your trust.

    If you didn’t clearly see the amount, didn’t get a receipt, or felt pressured to tap quickly, assume the worst and check your account immediately.

    When it comes to tap-to-pay, slow beats stolen.

    Further Reading

     
  • Geebo 9:00 am on December 15, 2025 Permalink | Reply
    Tags: , , , ,   

    When “Hollywood” Texts You Out of Nowhere 

    By Greg Collier

    You’re minding your business, and your phone buzzes.

    “Hey! I’m a talent scout. Are you available tomorrow for a virtual open call for Ted Lasso?”

    And for half a second, your brain does the whole wait… is this my moment?

    That’s the hook.

    According to an FTC consumer alert, this “virtual casting call” text is showing up as a new-ish phishing/sales-scam hybrid: unsolicited message → fake audition → pressure tactics → you paying money or handing over bank info.

    What’s going on

    The script is pretty consistent:

    1. You get an unexpected text from a supposed “talent scout” or casting person, often name-dropping big, recognizable titles (the FTC uses examples like “The Devil Wears Prada 2” and “Ted Lasso”).
    2. They ask if you’re available immediately (“tomorrow” is a favorite) for a “virtual open call” you never signed up for.
    3. If you respond, you wind up in a video “audition” that’s actually a sales pitch for junk: overpriced/bogus headshots, fake acting classes, “portfolio packages,” etc.
    4. The “plot twist” is always the same: you must pay something first or provide bank/payment information “to secure your spot.”

    Red flags

    If you see any of these, treat it like you just spotted the boom mic in frame:

    • Unsolicited contact (especially a text) offering a “casting call” you didn’t pursue.
    • Artificial urgency: “tomorrow,” “last chance,” “limited slots,” “secure your spot.”
    • Money before anything else: fees for headshots, “test shoots,” registration, background checks, “membership,” or “booking deposits.”
    • Bank info talk early: anything nudging you toward routing/account numbers, debit card details, or payment links before there’s a legitimate agreement.
    • A “virtual audition” that turns into sales pressure, not casting.

    How to protect yourself

    • Don’t respond. Not “stop,” not “who is this,” not anything. Engagement tells them your number is live.
    • Research the names. Search the “casting call” or the “casting director” name plus words like scam / review / complaint.
    • Never pay to get paid. Legitimate agencies get paid from the work—after the client pays—rather than charging you to “unlock” a job.
    • Report the text. Forward suspicious texts to 7726 (SPAM) or use your phone’s “report junk” feature, then delete it.
    • Report it to the FTC at ReportFraud.ftc.gov

    Quick Tip: If a legitimate opportunity shows up, it can survive verification. A real casting process won’t collapse because you asked for a real company email, a verifiable listing, or time to confirm details. A scam can’t survive daylight. That’s why it lives in surprise texts, urgency, and payment demands.

    Final Thoughts

    If “Hollywood” finds you via a random text and wants money or bank info before you can even “audition,” you’re not being discovered.

    You’re being harvested.

    Further Reading

     
  • Geebo 9:00 am on December 12, 2025 Permalink | Reply
    Tags: , , , ,   

    The Gift Card Drain Scam: How Thieves Empty Holiday Balances Before You Even Use Them 

    The Gift Card Drain Scam: How Thieves Empty Holiday Balances Before You Even Use Them

    By Greg Collier

    It’s December, which means two things are guaranteed:
    (1) America is collectively stress-shopping.
    (2) Scammers are licking their chops because nothing moves faster than a holiday gift card.

    This year’s big scam making the rounds? Gift card draining, a fraud so simple and so widespread that major retailers are quietly scrambling behind the scenes. And yes, your unopened card is at risk before you even wrap it.

    Below we’ll discuss how the scam works, what the red flags look like, and how to avoid being the unlucky person giving someone a $0 stocking stuffer.

    What’s Going On

    Criminals are draining the balances of gift cards before the legitimate buyer even activates them.

    They do it by physically tampering with cards on the rack, copying the numbers, resealing the packaging, and then waiting for you to pick up the sabotaged card and load money onto it. The moment it’s activated at the register, thieves pounce with automated scripts that vacuum the balance.

    Some variants don’t even require touching the card. Scammers buy bot-scraped card numbers on platforms like Telegram and continuously test combinations against retailer websites or compromise the retailer’s own app. No matter the method, the result is the same. You think you bought a gift. The scammer thinks you made a donation.

    How the Scam Works

    1. The Physical Swap

    • Scammers hit major retailers that stock racks of gift cards (Target, Walmart, Best Buy, grocery chains).
    • They peel open or slice the packaging, record the card number and security code, then reseal it with glue or shrink wrap.
    • You buy it, activate it, and within seconds the balance is transferred or spent online.

    2. The Barcode Replacement Trick

    • Thieves print fake barcodes and stick them over the real ones.
    • When you buy it, you think you’re loading money onto the card you picked, but the cash goes straight to the scammer’s card instead.

    3. Automated Draining Bots

    • After numbers are stolen, they’re fed into scripts that check activation status every few seconds.
    • As soon as your card goes live, the bot fires off a purchase at the linked retailer (usually digital goods so they can flip them instantly).

    4. Account Compromise Variant

    • If you store gift cards in a retailer account (looking at you, app-based Starbucks, Target, and Amazon users), scammers use credential-stuffing attacks to hijack your login.
    • Once inside, draining balances takes seconds, often before you even get a push notification.

    Why It Spikes During the Holidays

    • Volume: Retailers move tens of millions of gift cards in December. More cards = more camouflage.
    • Rushed shoppers: People grab cards quickly without inspecting the packaging.
    • Delayed discovery: The recipient typically doesn’t check the balance until Christmas, weeks after the theft, killing any chance of reimbursement.
    • Bots scale effortlessly: Fraud rings can test, drain, and flip thousands of cards in minutes.

    Scammers love anonymity, and nothing is more anonymous than a prepaid product with no buyer identity and no protection.

    Red Flags

    • Packaging looks resealed, wrinkled, or has extra glue.
    • Scratch-off panel already scratched or replaced.
    • Barcode sticker layered on top of another barcode.
    • Numbers visible through tampered cardboard.
    • The cashier has trouble scanning it.
    • The balance reads $0 the first time the recipient checks it.

    If your “gift” is suddenly worthless, that’s the scam hitting its final stage.

    Quick Tip: If you see a gift card on an open rack that already has its silver scratch-off panel revealed, put it down like it’s radioactive. That card isn’t a gift; it’s a trap set for the next unwitting shopper.

    How to Protect Yourself

    When Buying:

    • Choose cards stored behind the register, not from open racks.
    • Inspect packaging—anything loose, torn, or resealed is a no-go.
    • Pick cards with different designs behind them; scammers often tamper with batches at once.
    • Avoid cards with visible PINs or scratched panels.

    When Gifting:

    • Keep the receipt—it proves activation and helps if you need reimbursement.
    • Have the recipient check the balance immediately, not weeks later.
    • Register the card online if possible; some retailers let you lock or freeze the balance.

    When Storing Gift Cards in Retail Apps:

    • Use unique passwords and multi-factor authentication.
    • Watch for notifications about transfers or purchases you didn’t make.
    • Delete old saved cards or disable auto-reload if you don’t need it.

    Final Thoughts

    Gift card draining works because it weaponizes three things retailers can’t fix with a patch:

    1. Human holiday rush
    2. Physical access to merchandise
    3. Consumers who don’t check balances until it’s too late

    Scammers know this and exploit it at scale.

    So if you’re buying gift cards this season, slow down, inspect your cards, keep your receipts, and assume that anything in an open rack might already have been touched by someone with a glue bottle and a Telegram bot.

    Happy holidays, and may your gift cards remain yours.

    Further Reading

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel