Updates from December, 2025 Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on December 29, 2025 Permalink | Reply
    Tags: , , , ,   

    Job Offer Text Scams Are Back, and They’re Preying on Hope 

    By Greg Collier

    Scammers love one thing more than anything else: hope.

    And right now, there’s plenty of it to exploit.

    Millions of people are searching for better pay, flexible work, or a way out of a bad situation. That makes job seekers a perennial target, and once again, scammers are sliding straight into people’s phones with fake job offer text messages.

    If you’ve recently received a random text claiming to offer a cushy job from a major company you never applied to, you’re not lucky.

    You’re being sized up.

    The Hook: A Text Message Out of Nowhere

    According to warnings from the Federal Trade Commission, text-based job scams are surging. The latest version is deceptively simple:

    You get a text.
    Out of the blue.
    No application.
    No interview.
    No context.

    The message claims to be from:

    • A recruiter connected to a major job platform
    • Or a well-known brand with “dream job” energy

    Names like Netflix, Apple, or Spotify are common bait.

    The pitch sounds outstanding.

    • Remote work
    • Minimal effort
    • Extremely high pay
    • Flexible hours

    And somehow… they “found your number.”

    How the Scam Works

    Here’s the typical playbook, step by step:

    1. Unsolicited text arrives
      No prior contact. No résumé submission. No memory of applying.
    2. The job sounds absurdly easy
      Reviewing products for an hour a day.
      Listening to music for money.
      Testing apps from your couch. One documented scam was offering up to $400 a day for “remote product testing.”
      Another scam promised pay just for listening to Spotify tracks. None of it is real.
    3. You’re instantly “hired”
      Everyone gets the job. No interview required.
    4. They ask for sensitive information
      Bank details.
      Social Security number.
      Copies of IDs. Occasionally they even promise an advance paycheck, which conveniently requires your banking info first.
    5. The real theft begins
      Identity theft.
      Account takeovers.
      Drained bank balances. Or malware quietly installed on your device.

    What They’re Really After

    These scams aren’t about employment.

    They’re phishing operations.

    Once you engage, scammers push you into:

    • A fake application portal
    • A professional-looking email
    • Or an external messaging app like WhatsApp or iMessage

    That’s where they harvest the data they need to impersonate you, access your finances, or sell your information onward.

    Red Flags

    Some warning signs are old-school but still effective:

    • Typos or awkward wording
    • “Act now!” pressure
    • Links that almost match real companies (think Inedeed instead of Indeed)

    But job-text scams have some specific tells you should watch for:

    • You never applied for the job
    • The pay is wildly high for minimal work
    • The description is vague or suspiciously simple
    • You’re added to a group text where others hype the job
    • You’re told to continue the conversation on WhatsApp
    • The number has a foreign country code (+91, +63, etc.)
    • The recruiter uses a Gmail or Yahoo address
    • Googling the recruiter turns up nothing or scam warnings
    • You’re asked for personal info before any interview
    • You’re hired immediately with zero screening

    Legitimate employers don’t operate like this.

    Scammers do.

    “But Don’t Employers Text Now?”

    This is where confusion works in scammers’ favor.

    Yes, employers can text you.

    But there’s a huge difference between:

    • An employer you applied to
    • And a random recruiter texting you out of thin air

    Real companies:

    • Don’t hire via cold text
    • Don’t skip interviews
    • Don’t ask for banking info upfront

    If you didn’t initiate contact, skepticism is your best defense.

    If You’ve Been Targeted

    Simple rules:

    • Do not reply
    • Do not click links
    • Do not provide information

    Instead:

    • Block the number
    • Mark it as spam
    • Forward the message to 7726 (SPAM)
    • Report it at ReportFraud.ftc.gov

    Every report helps improve spam detection for the next potential victim.

    Final Thoughts

    Job scams don’t disappear when the economy improves.

    They adapt.

    As long as people are looking for work, or even just better work, scammers will keep dangling fake opportunities designed to exploit optimism, stress, and urgency.

    If a job offer arrives by text, without an application, interview, or context, it isn’t a blessing.

    It’s bait.

    And the safest response is no response at all.

    Further Reading

     
  • Geebo 9:00 am on December 26, 2025 Permalink | Reply
    Tags: , , ,   

    Scammers Are Mailing Fake Inheritances 

    Scammers Are Mailing Fake Inheritances

    By Greg Collier

    As families gathered during the holiday season, scammers were taking advantage of the distractions and emotions that come with it. A new warning out of Iowa highlights how fraudsters are once again reviving a familiar scheme: the “long-lost relative” inheritance scam.

    According to a recent alert, Iowa residents have been receiving letters claiming they are entitled to a large inheritance from a relative they never knew existed. The pitch sounds formal, official, and even comforting until victims realize it’s designed to drain their personal information and money.

    What’s Going On

    The Iowa Insurance Division (IID) says these scams often begin with a letter or email stating that the recipient is the only surviving heir of a deceased relative. The message typically directs the recipient to contact a law firm, often supposedly based in another country, such as Canada, to begin the inheritance process.

    Once contact is made, scammers gradually extract sensitive personal details, including banking information and Social Security numbers. Eventually, victims are asked to send money to cover “taxes,” “legal fees,” or other costs required to release the inheritance.

    Of course, there is no actual inheritance.

    How the Scam Works

    This scheme relies on a mix of curiosity, trust in legal-sounding language, and the hope of unexpected financial relief, something scammers know is especially tempting during the holiday season.

    The process usually follows a predictable pattern:

    • An unsolicited letter or email claims a distant relative left behind a large sum of money
    • The recipient is told they must act quickly to claim it
    • Personal information is requested “to verify identity”
    • Fees or taxes are demanded before the funds can be released

    Once money or personal data is sent, it’s typically impossible to recover.

    Red Flags

    The IID has outlined several warnings that should immediately raise concern:

    • Messages from unknown senders, often based in another country
    • Claims of large inheritances from relatives you’ve never heard of
    • Requests for sensitive personal information, including bank details or Social Security numbers
    • Demands for upfront payments to cover taxes, fees, or legal costs

    It’s worth remembering that legitimate law firms do not request fees upfront or solicit sensitive personal information through unsolicited letters or emails.

    How to Protect Yourself and Your Family

    If you receive a message like this, do not respond. Do not provide any personal information, and do not send money no matter how official the letter appears.

    The IID strongly encourages people to talk with family members about inheritance scams, especially older relatives who may be more likely to receive physical letters and take them at face value.

    Final Thoughts

    Scammers thrive on timing, and the holiday season gives them plenty of opportunities. If an inheritance offer appears out of nowhere, promises large sums of money, and asks for personal details or upfront fees, it’s almost certainly a scam.

    When it comes to unexpected windfalls, skepticism is your best protection.

    Further Reading

     
  • Geebo 9:00 am on December 24, 2025 Permalink | Reply
    Tags: , , , patient brokering,   

    Why “Free” Rehab Should Raise Red Flags 

    By Greg Collier

    Even if you have never been to Philadelphia, you may have heard of Kensington, a neighborhood that has become nationally known for its visible and deeply entrenched drug crisis. Images and reports from the area have circulated widely in recent years, often used to illustrate the severity of the opioid epidemic in the United States.

    According to a recent investigation by the Philadelphia Inquirer, Kensington has also become a target for a troubling scheme tied to the addiction treatment industry. Recruiters have allegedly approached people struggling with substance abuse and offered what sounded like a lifeline: free travel, free housing, and free treatment at out-of-state rehabilitation facilities. The offers are framed as an opportunity for a fresh start, far from the environment where addiction took hold.

    However, the investigation found that these promises often did not match reality. Individuals were reportedly flown across the country, enrolled in private health insurance plans they did not fully understand, and placed into treatment settings that failed to deliver the level of medical care they expected. Critics described the practice as a form of patient brokering, in which people seeking help are treated as financial assets rather than patients in need of care.

    As disturbing as this situation is, it is not unique to Philadelphia. Similar allegations involving addiction treatment recruitment, insurance manipulation, and misleading promises have been reported in multiple states. Federal prosecutions and state investigations have shown that these practices can surface anywhere vulnerable people intersect with loosely regulated parts of the healthcare system.

    Substance abuse is among the most devastating challenges a person or family can face. It affects physical health, mental health, finances, and relationships, often all at once. Families watching a loved one struggle are frequently desperate for solutions, and people experiencing addiction themselves may be willing to accept almost any offer that sounds like help. No one in that position deserves to be exploited or misled.

    Protecting Yourself and Your Loved Ones

    While not every treatment referral is a scam, there are steps people can take to reduce the risk of being taken advantage of:

    Be cautious of “too good to be true” offers
    Promises of free luxury treatment, immediate placement, airfare, and housing with no clear explanation of funding should raise concerns.

    Ask who is paying and how
    Legitimate treatment providers should be transparent about costs, insurance coverage, and who is responsible for premiums and medical bills.

    Verify facilities independently
    Before agreeing to treatment, try to confirm a facility’s licensing status, medical staffing, and complaint history through state health departments or trusted healthcare professionals.

    Avoid pressure tactics
    Urgent deadlines, repeated calls, or discouragement from asking questions are common red flags in healthcare-related scams.

    Seek local, trusted guidance
    Local hospitals, nonprofit treatment referral services, or established recovery organizations can often provide safer, more reliable pathways to care.

    Involve a trusted third party
    When possible, have a family member, social worker, or healthcare advocate review paperwork and insurance enrollment before anything is signed.

    Final Thoughts

    The addiction crisis has created enormous demand for treatment, and where there is demand, there is potential for abuse. Investigations like this one highlight the need for stronger oversight, better enforcement, and greater public awareness. Most importantly, they serve as a reminder that people seeking recovery are patients first and not opportunities to be exploited.

     
  • Geebo 9:00 am on December 23, 2025 Permalink | Reply
    Tags: , , , , ,   

    AI-Generated “IRS” Phone Calls Are Back and Smarter Than Ever 

    By Greg Collier

    Scammers are once again exploiting fear around taxes, but this time they’re using artificial intelligence to sound more convincing than ever.

    A recent consumer report describes a new wave of AI-generated phone calls impersonating tax officials, designed to scare people into handing over sensitive personal information.

    This is not a robocall problem. It’s a credibility problem.

    What’s Going On

    One example of the scam involves a voicemail that begins:

    “Hello, this is George from the tax resolution unit…”

    The caller claims the recipient’s tax file has been flagged due to either an unpaid balance or missing returns following the 2025 extension deadline, then urges the recipient to press one to speak with a “tax officer.”

    Nothing about this call is legitimate.

    Scam Breakdown

    This scam relies on three core tactics:

    Authority by implication
    The caller strongly implies a connection to the Internal Revenue Service without ever explicitly stating it. This is deliberate. It creates fear while avoiding clear claims that could be easily disproven.

    Fear and urgency
    Phrases like “flagged file,” “missing returns,” and “deadline” are carefully chosen to provoke panic and push recipients into acting before thinking.

    AI voice generation
    The call is likely created or enhanced using AI, allowing scammers to produce natural-sounding voices at scale and deploy the same message nationwide with minimal effort.

    This identical message has been reported by consumers across the country to the Better Business Bureau Scam Tracker.

    Red Flags

    Several warning signs stand out immediately:

    • The caller never addresses the recipient by name
    • A nonexistent “tax resolution unit” is referenced
    • The caller never explicitly claims to be from the IRS
    • Immediate action is demanded through keypad prompts
    • Consequences or refunds are implied without documentation

    Most importantly:

    The IRS does not contact individuals by phone about missing returns, balances, or refunds. Initial contact is always made by official mail.

    Why This Scam Works

    AI has lowered the barrier for impersonation.

    Scammers no longer need obvious robocalls or poorly written scripts. AI-generated voices can sound calm, professional, and authoritative—exactly what people expect from a government agency.

    Once someone responds, the goal is simple: obtain Social Security numbers, banking details, or direct payments under the threat of legal action or the promise of a refund that does not exist.

    What to Do If You Receive This Call

    • Do not press any buttons
    • Hang up immediately
    • Do not return the call
    • Report the incident to consumer protection agencies and the IRS impersonation reporting page

    If you are genuinely concerned about your tax status, check your account directly through official IRS channels or consult a licensed tax professional. Never rely on a phone number left in a voicemail.

    Final Thoughts

    AI has not just made scams more efficient; it has made them more believable.

    If a tax-related call:

    • Comes out of the blue
    • Creates urgency
    • Demands immediate action

    It is almost certainly a scam.

    The IRS does not operate this way. Scammers do.

    Further Reading

     
  • Geebo 9:00 am on December 22, 2025 Permalink | Reply
    Tags: , , , ,   

    This Holiday “Good Cause” Might Be a Credit Card Test Scam 

    By Greg Collier

    With so many purchases flying by during the holiday season, it’s easy to overlook a small charge here or there on your credit card statement, especially if it looks like a donation.

    That’s exactly what scammers are counting on.

    If you spot a charity charge you don’t remember authorizing, it may not be holiday generosity you forgot about. It may be a credit card testing scam, and the small charge is just the beginning.

    What’s Going On

    During December, nearly 30% of all charitable giving takes place. Between gifts, travel, and end-of-year expenses, most people aren’t scrutinizing every $2–$20 charge.

    Scammers know this.

    Instead of immediately draining an account, they often start small, quietly checking whether stolen credit card numbers still work before going bigger.

    How the Scam Works

    Here’s the typical pattern:

    1. Your credit card information is stolen
      • Through a data breach
      • A sketchy online purchase
      • A phishing scam
      • Or malware on a device
    2. Scammers “test” the card
      • They make small donations—often just a few dollars
      • Charity sites are ideal because tiny donations are common and rarely questioned
    3. The charge goes through
      • This confirms the card is active
      • The scammer now knows the number is usable
    4. Larger fraud follows
      • Big purchases
      • Cash advances
      • Or repeated unauthorized charges

    By the time you notice, hundreds—or thousands—of dollars may already be gone.

    Real-World Examples

    One report described a person approached by two men claiming to raise money for a child needing medical care. The donor was told they’d be charged $20.

    The actual charge? $2,400.

    Another victim reported that after shopping on a questionable discount site, their debit card was hit with a string of fraudulent charges:

    • $2
    • $12
    • $29
    • $67—listed as a “charity” charge

    Those early charges were the warning signs. The final one confirmed the card was still valid.

    Why This Scam Is Easy to Miss

    • Charges are small
    • The description looks legitimate
    • It happens during the busiest spending month of the year
    • People assume it’s a donation they forgot making

    By the time the fraud is obvious, the damage is already done.

    Red Flags

    • Charity charges you don’t recognize
    • Multiple small charges in a short period
    • Donations made after shopping on unfamiliar websites
    • Requests for payment via:
      • Gift cards
      • Wire transfers
      • Peer-to-peer apps
    • Pressure to “donate now” without verification

    If something feels off, it probably is.

    How to Protect Yourself

    Check your statements regularly
    Don’t wait until the end of the month. Scan your charges frequently, especially in December.

    Report suspicious charges immediately
    Contact your card issuer’s fraud department right away. Waiting only helps the scammer.

    Replace compromised cards
    Once fraud is suspected:

    • Cancel the card
    • Get a new number
    • Change your PIN

    Be cautious online

    • Avoid suspicious discount sites
    • Don’t click donation links from unsolicited messages
    • Keep devices updated with anti-malware software
    • Look for secure sites (https and lock icon—but remember, those alone aren’t guarantees)

    Use credit cards, not debit cards
    Credit cards generally offer stronger fraud protections and faster recovery for unauthorized charges.

    Final Thoughts

    That “tiny donation” you don’t remember making may not be kindness—it may be a test run.

    Scammers rely on distraction, goodwill, and holiday chaos to slip under the radar. A few dollars today can turn into a financial headache tomorrow.

    This season, generosity is good—but vigilance is better.

    Further Reading

     
  • Geebo 9:00 am on December 19, 2025 Permalink | Reply
    Tags: , , , , ,   

    How Scammers Are Using AI “Proof of Life” to Extort Families 

    AI Voice Fuels Virtual Kidnap Plot

    By Greg Collier

    This is not the old “your loved one has been kidnapped” scam.

    Federal authorities are warning about a new evolution of virtual kidnapping, one that uses altered photos, manipulated videos, and AI-assisted media pulled straight from social media to create convincing “proof of life” and trigger immediate panic.

    According to the FBI, criminals are now fabricating images and videos that make it appear as though a family member or friend has been abducted, injured, or being held hostage—complete with urgent ransom demands and threats of violence.

    And unlike earlier versions of the scam, this one doesn’t rely on imagination alone. It relies on visual evidence.

    What’s New About This Scam

    Traditional virtual kidnapping scams depended on fear, confusion, and vague threats. The victim was pressured to act quickly before thinking things through.

    This new version adds something far more dangerous: manufactured realism.

    Scammers now:

    • Pull photos and videos from social media profiles
    • Alter them using AI tools or digital manipulation
    • Send them as “proof of life” during ransom demands
    • Use timed or disappearing messages to limit scrutiny

    The result is a moment where logic collapses under shock. Victims aren’t just told their loved one is in danger; they’re shown what looks like evidence.

    How the Scam Typically Unfolds

    The FBI says the pattern is disturbingly consistent:

    A text message arrives claiming a loved one has been kidnapped. The message demands immediate payment for their release. Violence is threatened if the victim delays or contacts authorities.

    Then comes the hook.

    The scammer sends a photo or video that appears to show the kidnapped person. In many cases, it looks real enough to override rational doubt, at least at first glance.

    Only later, if the victim has time to examine it closely, do the cracks appear.

    The Red Flags Inside the “Proof”

    According to federal investigators, the fabricated media often contains subtle but important errors, including:

    • Missing or incorrect tattoos
    • Absent scars or identifying marks
    • Incorrect body proportions
    • Inconsistencies with known photos
    • Visual details that don’t quite line up

    Scammers frequently counter this by using timed messages, giving victims only seconds to view the image before it disappears—just long enough to scare, not long enough to analyze.

    Why This Scam Works So Well

    This scam is effective because it exploits three things at once:

    1. Public social media footprints: Criminals no longer need insider access. Public photos are enough.
    2. AI-assisted manipulation: Creating fake but believable images is faster and cheaper than ever.
    3. Urgency engineering: Fear plus time pressure shuts down critical thinking.

    Once panic sets in, scammers push victims toward immediate payment—often before they attempt the most important step of all.

    Verification.

    How to Protect Yourself and Your Family

    The FBI recommends several concrete steps to reduce risk:

    • Be cautious about what you post publicly, especially travel details and personal identifiers
    • Avoid sharing personal information with strangers while traveling
    • Establish a family code word that only trusted loved ones would know
    • Be wary of urgent threats designed to rush your decision-making
    • Screenshot or record any images or videos sent as “proof”
    • Always attempt to directly contact the loved one before paying any ransom

    That last step is critical. Many victims discover the truth within minutes—if they pause long enough to check.

    If You’re Targeted

    If you believe you’ve encountered a virtual kidnapping scam, the FBI urges victims to report it to the Internet Crime Complaint Center (IC3). Preserve all messages, images, phone numbers, and payment requests.

    Even if no money was sent, reporting helps investigators track patterns and warn others.

    Final Thoughts

    This isn’t just another scam; it’s a technological escalation.

    Virtual kidnapping is no longer purely psychological. It’s visual. It’s manipulated. And it’s designed to exploit the trust we place in images and video.

    The safest response is not panic, but pause.

    Because in this new version of the scam, what looks real may be anything but.

    Further Reading

     
  • Geebo 9:00 am on December 18, 2025 Permalink | Reply
    Tags: , free wifi, , ,   

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained 

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained

    By Greg Collier

    As millions of people travel for the holidays, airports, hotels, coffee shops, and convention centers are packed with travelers looking for one thing the moment they sit down: free Wi-Fi.

    That demand creates the perfect opening for a lesser-known but highly effective cyber scam known as the “evil twin” Wi-Fi attack—and travelers are among the most common victims.

    This scam doesn’t rely on fake prizes, urgent phone calls, or phishing emails. Instead, it quietly exploits trust, convenience, and public networks.

    What Is an “Evil Twin” Wi-Fi Network?

    An evil twin is a fake Wi-Fi network that looks legitimate but is actually controlled by a scammer.

    It’s called an “evil twin” because it is designed to closely mimic a real network you already trust.

    Examples include:

    • Airport_Free_WiFi
    • Hotel Guest Network
    • Starbucks_WiFi
    • ConventionCenter_Public

    To a traveler in a hurry, these names look normal, and that’s exactly the point.

    Once connected, the attacker can:

    • Monitor your internet traffic
    • Capture login credentials
    • Intercept emails or messages
    • Redirect you to fake login pages
    • Install malware in some cases

    You don’t need to click a suspicious link. Simply connecting can be enough.

    Why Travelers Are Prime Targets

    Holiday travelers are uniquely vulnerable to this scam for several reasons:

    • Constant movement between unfamiliar locations
    • High reliance on public Wi-Fi to avoid roaming charges
    • Urgency to check flights, reservations, rideshares, or work email
    • Distraction and fatigue, especially during delays

    Airports and hotels are particularly attractive to scammers because:

    • They host large volumes of short-term users
    • People expect multiple similarly named networks
    • Security announcements about Wi-Fi are rare or unclear

    How the Scam Typically Works

    1. A scammer sets up a portable Wi-Fi hotspot using a laptop or small device.
    2. They name it to closely resemble a legitimate network nearby.
    3. The fake network often has a stronger signal, making it appear first on your device.
    4. When you connect, one of two things happens:
      • You are silently monitored while browsing
      • You’re redirected to a fake “sign-in” page asking for email, social media, or even payment details

    In many cases, victims never realize anything went wrong until accounts are compromised later.

    What Information Can Be Stolen?

    Depending on the setup, an evil twin network can expose:

    • Email usernames and passwords
    • Social media logins
    • Online banking credentials
    • Corporate VPN access
    • Travel rewards accounts
    • Session cookies that allow account takeover without a password

    Even encrypted websites (HTTPS) don’t fully protect against every version of this attack, especially if users ignore browser warnings or log into insecure pages.

    Red Flags

    While evil twin networks are designed to look legitimate, warning signs may include:

    • Multiple Wi-Fi networks with nearly identical names
    • A login page that looks generic or unbranded
    • Requests for unnecessary personal information
    • A network that suddenly disconnects and reconnects repeatedly
    • Browser warnings about security certificates

    If anything feels off, disconnect immediately.

    How Travelers Can Protect Themselves

    A few simple precautions can dramatically reduce risk:

    • Avoid public Wi-Fi for sensitive activities like banking or work logins
    • Confirm the exact network name with airport signage or hotel staff
    • Turn off auto-connect for open Wi-Fi networks
    • Use a trusted VPN when connecting on the road
    • Enable two-factor authentication on important accounts
    • Forget networks after use so your device doesn’t reconnect automatically

    When in doubt, using your phone’s cellular hotspot is often safer than unknown public Wi-Fi.

    Final Thoughts

    The evil twin Wi-Fi scam highlights an uncomfortable reality. Not all scams announce themselves.

    Some of the most effective modern fraud relies on blending into everyday infrastructure, airports, hotels, cafés, and other public spaces we assume are safe.

    As travel increases during the holiday season, awareness becomes the most effective defense.

    If you wouldn’t hand your phone unlocked to a stranger in an airport, don’t hand over your internet traffic either.

    Free Wi-Fi is convenient, but when it comes to unknown networks, convenience can be costly.

    Staying connected shouldn’t mean staying exposed.

    Further Reading

     
  • Geebo 9:00 am on December 17, 2025 Permalink | Reply
    Tags: , , , ,   

    Scam Alert: Fake “Mega Millions Special Drawing” Impersonation 

    By Greg Collier

    Mega Millions officials are warning players about a new lottery scam in which criminals are impersonating the brand online and promoting a fake “special drawing.” Using the game’s familiar logo, colors, and language, these scams are designed to look legitimate while steering victims toward fraudulent websites, phone numbers, or direct messages.

    The warning underscores a broader pattern of lottery-related fraud in which well-known brands are used to create a false sense of authenticity and urgency.

    What’s Happening

    According to Mega Millions, scammers are circulating online content that claims to offer:

    • Entry into a special or exclusive Mega Millions drawing
    • Notification of a prize win despite the recipient never purchasing a ticket
    • Instructions to “verify” or “claim” winnings through links or phone calls

    The lead director of Mega Millions said these schemes rely on visual familiarity and persuasive language to appear credible. Despite their variations, they all share a common goal: obtaining money or personal information from unsuspecting consumers.

    How the Scam Typically Works

    These impersonation scams often follow a predictable structure:

    1. Use of official branding: Logos and graphics resembling Mega Millions materials are copied to appear authentic.
    2. Unsolicited prize claims or promotions: Targets are told they have won or been selected for a special drawing they did not enter.
    3. Requests for action: Victims are directed to click links, respond to messages, or call phone numbers to confirm details.
    4. Financial or data demands: The scam escalates with requests for fees, taxes, or sensitive personal and banking information.

    Once money or personal data is provided, it is typically unrecoverable.

    Red Flags

    Mega Millions advises consumers to be alert for the following red flags:

    • Claims that you won a lottery you never played
    • Social media posts advertising “special drawings” or surprise promotions
    • Requests to click unfamiliar links or call unknown numbers
    • Instructions to send money in order to collect winnings
    • Messages with poor grammar or spelling
    • Phone calls or texts from unfamiliar or unexpected area codes

    Quick Tip: Legitimate lotteries never require winners to pay to receive a prize.

    How to Protect Yourself

    To reduce the risk of falling victim to lottery scams, Mega Millions recommends:

    • Verifying promotions only through official lottery websites
    • Avoiding links, phone numbers, or messages from unsolicited contacts
    • Never sharing sensitive personal or financial information
    • Hanging up on and blocking suspected scammers

    Consumers who believe they have encountered a scam may contact the Federal Trade Commission at (877) 382-4357 or report the incident to local law enforcement.

    Final Thoughts

    If you did not purchase a ticket or enter a drawing, there is no legitimate prize to claim. Authentic lotteries do not operate through unsolicited messages, social media direct outreach, or upfront payment requests.

    Scams that misuse trusted brands rely on familiarity to lower skepticism. Staying cautious, verifying information through official sources, and refusing unsolicited requests are the most effective ways to protect yourself and others from lottery fraud.

    Further Reading

     
  • Geebo 9:00 am on December 16, 2025 Permalink | Reply
    Tags: , contactless payment, , ghost tapping,   

    “Ghost Tapping” Scams: How Tap-to-Pay Can Turn Into Tap-to-Steal 

    By Greg Collier

    Tap-to-pay cards and mobile wallets are everywhere now. They’re fast, convenient, and generally secure.

    But scammers are finding ways to abuse that convenience, and the Better Business Bureau is now warning about a growing scam they call “ghost tapping.”

    This isn’t a hack. It’s a confidence trick that relies on distraction, social pressure, and people assuming tap-to-pay is always safe.

    What’s Going On

    According to the BBB, scammers are targeting people who use tap-to-pay cards or mobile wallets in crowded or distracting environments.

    The idea is simple. Scammers get you to tap quickly without clearly seeing the amount and walk away with far more money than you expected to pay.

    Several victims have already reported losing hundreds or even thousands of dollars.

    How the “Ghost Tapping” Scam Works

    Scammers typically rely on social engineering, not technology.

    Common tactics include:

    • Getting physically close in public places
    • Pretending to be a legitimate vendor
    • Running fake charity or fundraising pitches
    • Rushing the transaction so you don’t stop to think

    One reported case involved a man going door-to-door selling chocolate, claiming the money supported special-needs students. He told residents he could only accept tap-to-pay.

    Once the victim tapped their card or phone, the scammer allegedly charged large amounts without clearly showing the total.

    Reported losses included:

    • One woman’s mother losing $537.
    • Another victim lost $1,100.

    By the time the charge was noticed, the scammer was long gone.

    Why This Works

    Tap-to-pay trains people to move fast.

    Scammers exploit that by:

    • Creating urgency
    • Avoiding receipts
    • Keeping screens angled away
    • Using emotional hooks like charity appeals
    • Operating where people are distracted (festivals, markets, busy sidewalks)

    The technology isn’t broken, but human attention is.

    Red Flags

    The BBB says you should be suspicious if:

    • You’re asked to tap without seeing the total
    • No receipt is offered
    • The seller insists on tap-to-pay only
    • You receive small “test” charges on your account
    • You notice strange charges after being in crowded areas

    If someone won’t slow down or show you the amount clearly, that’s your cue to stop.

    How to Protect Yourself

    The BBB recommends several practical steps:

    • Use an RFID-blocking wallet or sleeve
    • Always confirm the payment amount before tapping
    • Set up transaction alerts with your bank
    • Regularly review your statements
    • Limit tap-to-pay use in high-risk or crowded areas

    Convenience should never override verification.

    What to Do If You’re a Victim

    If you think you’ve been hit by a ghost-tapping scam:

    1. Contact your bank or card issuer immediately
    2. Freeze or cancel the affected card
    3. Dispute the charges
    4. Report the scam to the BBB’s Scam Tracker

    The faster you act, the better your chances of limiting the damage.

    Final Thoughts

    Tap-to-pay is generally safe, but it’s not magic.

    Scammers don’t need to break encryption if they can rush you, distract you, or manipulate your trust.

    If you didn’t clearly see the amount, didn’t get a receipt, or felt pressured to tap quickly, assume the worst and check your account immediately.

    When it comes to tap-to-pay, slow beats stolen.

    Further Reading

     
  • Geebo 9:00 am on December 15, 2025 Permalink | Reply
    Tags: , , , ,   

    When “Hollywood” Texts You Out of Nowhere 

    By Greg Collier

    You’re minding your business, and your phone buzzes.

    “Hey! I’m a talent scout. Are you available tomorrow for a virtual open call for Ted Lasso?”

    And for half a second, your brain does the whole wait… is this my moment?

    That’s the hook.

    According to an FTC consumer alert, this “virtual casting call” text is showing up as a new-ish phishing/sales-scam hybrid: unsolicited message → fake audition → pressure tactics → you paying money or handing over bank info.

    What’s going on

    The script is pretty consistent:

    1. You get an unexpected text from a supposed “talent scout” or casting person, often name-dropping big, recognizable titles (the FTC uses examples like “The Devil Wears Prada 2” and “Ted Lasso”).
    2. They ask if you’re available immediately (“tomorrow” is a favorite) for a “virtual open call” you never signed up for.
    3. If you respond, you wind up in a video “audition” that’s actually a sales pitch for junk: overpriced/bogus headshots, fake acting classes, “portfolio packages,” etc.
    4. The “plot twist” is always the same: you must pay something first or provide bank/payment information “to secure your spot.”

    Red flags

    If you see any of these, treat it like you just spotted the boom mic in frame:

    • Unsolicited contact (especially a text) offering a “casting call” you didn’t pursue.
    • Artificial urgency: “tomorrow,” “last chance,” “limited slots,” “secure your spot.”
    • Money before anything else: fees for headshots, “test shoots,” registration, background checks, “membership,” or “booking deposits.”
    • Bank info talk early: anything nudging you toward routing/account numbers, debit card details, or payment links before there’s a legitimate agreement.
    • A “virtual audition” that turns into sales pressure, not casting.

    How to protect yourself

    • Don’t respond. Not “stop,” not “who is this,” not anything. Engagement tells them your number is live.
    • Research the names. Search the “casting call” or the “casting director” name plus words like scam / review / complaint.
    • Never pay to get paid. Legitimate agencies get paid from the work—after the client pays—rather than charging you to “unlock” a job.
    • Report the text. Forward suspicious texts to 7726 (SPAM) or use your phone’s “report junk” feature, then delete it.
    • Report it to the FTC at ReportFraud.ftc.gov

    Quick Tip: If a legitimate opportunity shows up, it can survive verification. A real casting process won’t collapse because you asked for a real company email, a verifiable listing, or time to confirm details. A scam can’t survive daylight. That’s why it lives in surprise texts, urgency, and payment demands.

    Final Thoughts

    If “Hollywood” finds you via a random text and wants money or bank info before you can even “audition,” you’re not being discovered.

    You’re being harvested.

    Further Reading

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel