Recent Updates Page 5 Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on April 9, 2025 Permalink | Reply
    Tags: , , , , TurboTax   

    SIM Swap Fraud During Tax Season 

    By Greg Collier

    With millions of Americans filing their taxes between January and mid-April, this period becomes fertile ground for digital deception. One particularly insidious tactic gaining traction is SIM swap fraud, a type of identity theft that can occur without a scammer ever touching your phone.

    A recent case in Wisconsin highlights how easily a seemingly routine moment can spiral into a security breach. A consumer had just begun the tax filing process in early February when she received a message claiming to be from a TurboTax. The message included a security code and instructions not to share it with anyone. Although she had not completed her filing with TurboTax, the timing and branding appeared legitimate, prompting her to interact with the message.

    What followed was a total loss of cellular function. Phone calls, text messages, and all forms of communication stopped working. After reaching out to her wireless provider, she learned that her phone number had been transferred to another device entirely. This is the essence of SIM swap fraud, a scam that allows criminals to reroute your phone number to their device without needing physical access to yours.

    This tactic enables scammers to intercept text messages, including those containing security codes used for two-factor authentication. Once they’re in control of your number, they can attempt to access your financial accounts, email, or even social media, often using brute force or previously stolen credentials.

    In this particular case, the victim’s credit union was contacted by someone impersonating her, attempting to guess account passwords. Fortunately, the breach was detected in time and no funds were lost. However, the emotional toll was significant. The sense of violation left the victim unable to feel secure, questioning whether every online interaction was truly safe.

    While this incident happened soon after she began filing taxes through TurboTax, it is important to note that the platform itself was not compromised. The timing was purely coincidental. Scammers often cast a wide net, sending messages disguised as major companies to thousands of random numbers, hoping that even a few people will take the bait.

    Preventing this type of fraud requires preparation. Consumers should ensure that all software on their devices is up-to-date and avoid reusing passwords across accounts. Writing down passwords and storing them in a secure location is preferable to saving them on digital devices, which can be more easily compromised. Contact information for banks or financial institutions should be sourced independently, rather than trusted from unsolicited messages.

    One of the most effective steps consumers can take to prevent SIM swap fraud is to contact their mobile phone provider and request that a personal identification number be added to their account. This PIN acts as an additional layer of security, making it significantly harder for scammers to transfer your phone number without your permission.

    Without the correct PIN, even a scammer who has obtained some of your personal information will be blocked from making changes to your account. Setting up this PIN typically takes just a few minutes but can offer long-term protection against one of the most dangerous forms of digital identity theft.

    When in doubt, it is always safer to pause before acting. Messages that demand immediate action or contain subtle grammatical errors are red flags. Even if a message appears to come from a trusted source, verifying it through official channels can prevent irreversible damage.

    Scammers are persistent and adaptive, but so are the tools and strategies available to stay ahead of them. Awareness, skepticism, and a methodical approach to digital security remain the strongest defense against schemes like SIM swap fraud, especially during high-risk seasons like tax time.

     
  • Geebo 8:00 am on April 8, 2025 Permalink | Reply
    Tags: , , , ,   

    Tax Season’s Hidden Dangers 

    Tax Season’s Hidden Dangers

    By Greg Collier

    As the tax season reaches its peak, state revenue departments across the country are issuing urgent warnings about a surge in scams targeting taxpayers. These schemes are increasingly sophisticated, often mimicking official communications in order to exploit individuals during a period of heightened financial activity and anxiety.

    In Georgia, residents have been targeted by an email campaign falsely claiming to originate from the “GA Taxation Office,” a non-existent entity. The email references coronavirus-related relief programs and asks recipients to provide high-resolution images of their driver’s license and Medicare card. The sender’s address resembles a government domain at first glance, but closer inspection reveals it originates from a fraudulent and unofficial source. The Georgia Department of Revenue has emphasized that it does not request sensitive personal information through unsolicited emails or messages.

    Meanwhile, in Utah, taxpayers have reported receiving letters that closely resemble official notices from the state. These fraudulent letters claim the recipient owes unpaid taxes and threaten legal action, property liens, or asset seizure unless immediate payment is made. These tactics are designed to provoke fear and elicit an immediate response, bypassing any verification steps. The Utah State Tax Commission has urged residents to confirm the legitimacy of any questionable tax notices by contacting their offices directly and to avoid engaging with any information listed in the fraudulent documents.

    In Michigan, officials are focused on combating tax-related identity theft, particularly schemes involving the unauthorized filing of tax returns to claim refunds. Cybercriminals are employing deceptive emails and messages that pressure recipients into disclosing personal information under the guise of urgency or legal threat. These scams often succeed when individuals let their guard down, especially when messaging appears to come from a trusted source. The Michigan Department of Treasury is reminding taxpayers to connect only through secure internet networks, avoid clicking suspicious links, and never respond to unsolicited messages requesting personal data.

    Each of these examples underscores the importance of vigilance. Scammers rely on confusion, fear, and the appearance of legitimacy to manipulate individuals into compromising their financial security. Taxpayers should be cautious when receiving unexpected communications about taxes, regardless of the format. Verifying the source through official state websites or direct contact with tax agencies is the most effective way to avoid becoming a victim.

    Tax season will always be a busy time for scammers. Staying informed and exercising caution are essential steps toward protecting your personal information and your refund.

     
  • Geebo 8:00 am on April 7, 2025 Permalink | Reply
    Tags: blessing scam, prize money, ,   

    Scammed for Kindness and Cash 

    Scammed for Kindness and Cash

    By Greg Collier

    A woman in Pomona, California, was recently tricked out of her life savings in a scam that’s part of a larger pattern known as the ‘blessing scam.’ It all started when she was walking home from the dentist on a Thursday morning and was approached by two women. One asked for help finding an immigration office. The other claimed she had won a large sum of money but needed someone with legal status to help her claim it. In return, she promised a share of the winnings.

    What seemed like a simple favor quickly spiraled into something much more manipulative. The two women convinced her to get into their car. Once inside, the tone changed. They said they had been robbed in the past when trying to claim prize money and now needed someone who could show they had access to sixty thousand dollars, just to feel ‘safe.’ They weren’t asking her to give them all that money, they said, but just enough to show she could be trusted.

    That was enough to convince her. They drove her home, and she walked inside, visibly shaken and emotional, though still smiling. Her daughter was there and noticed immediately that something felt off. Her mother’s eyes were red from crying. Her face was flushed. But she didn’t say anything about what was happening. She simply went into her bedroom, gathered what amounted to her entire life savings, about $29,000 in cash and jewelry, and left the house again.

    Minutes later, she came back briefly to find a utility bill or something that could verify her identity, then disappeared again. Within five minutes, the phone rang. On the other end, her daughter heard panicked screaming. Her mother could barely breathe. She kept repeating that they had taken everything and driven off.

    Now the family is left trying to recover emotionally from the shock. The loss goes beyond money. It is a deep violation of trust. Her daughter has been replaying the moment over and over, feeling that instinct she ignored, wishing she had spoken up or intervened. There was a feeling in her gut that something was wrong, but she pushed it aside. That feeling turned out to be right.

    The incident has been reported to the Pomona Police Department, who are investigating, but the damage has already been done. What the family hopes now is that their story will serve as a warning. These scams depend on kindness and vulnerability. They work because the people behind them know how to push emotional buttons and how to create just enough urgency, fear, and hope to override reason. They count on silence and hesitation. The safest thing to do in those moments is to walk away.

     
  • Geebo 8:00 am on April 4, 2025 Permalink | Reply
    Tags: , , , ,   

    Victim Loses Millions in Crypto Scam 

    By Greg Collier

    A sophisticated cryptocurrency investment scam is rapidly spreading across the United States, with the FBI’s Baltimore field office sounding the alarm. The fraud, often run by organized criminal networks based in Southeast Asia, targets individuals through online messaging platforms, eventually convincing them to hand over large sums of money. For some, the loss is total. For others, it is life-changing.

    Federal agents say the operation unfolds gradually. The perpetrators first build a relationship, often posing as friendly strangers or potential romantic partners, before introducing the idea of cryptocurrency investments. Once a connection is made, the con begins. Victims are often guided to legitimate websites like Coinbase to build confidence before being steered toward fake platforms controlled by the scammers.

    Investigators warn the scheme is particularly cruel. In many cases, the victim is allowed to withdraw a small amount of their funds at first, reinforcing the illusion of profitability. The platforms display false gains, sometimes showing returns of more than fifty or even eighty percent. Encouraged, victims invest more, believing they are building wealth. Then, one day, everything vanishes.

    A Maryland woman came forward to news station, WJZ, to describe how she lost millions. She emphasized that the betrayal of trust was more painful than the financial loss. Her experience began with an unsolicited message on social media. Over time, the scammer gained her confidence and directed her to invest in what appeared to be a legitimate crypto portfolio. Red flags were present, she admitted, but by the time she questioned things, she had already invested so heavily she felt trapped.

    The FBI has linked this method to what is known in criminal circles as “pig butchering.” The term refers to the psychological manipulation of victims, fattening them up with false profits and promises before a total financial betrayal. Most victims are middle-aged or older, but authorities emphasize that no demographic is immune.

    Those who fall prey to the scam are often contacted again by the same fraudsters, who pose as recovery specialists offering to retrieve the stolen cryptocurrency for a fee. This second wave of deception deepens the damage. Victims, desperate and emotionally vulnerable, are manipulated yet again. Federal agents caution that the fake websites used in these schemes are highly convincing, often indistinguishable from real ones.

    Agents working on the case urge potential victims to be skeptical of unsolicited messages, especially those that steer conversations toward investment opportunities. These scammers frequently avoid phone conversations and instead rely on encrypted apps like WhatsApp to conceal their activities.

    Officials say it is vital to report suspicious activity as soon as possible. While recovery of lost funds is rare, fast action gives law enforcement the best chance to track criminal operations and possibly assist in asset recovery.

    Authorities are also investigating reports that many of the scam operators themselves may be victims of human trafficking. Some work under threat in warehouses across Southeast Asia, forced to target Americans as part of large-scale criminal enterprises.

    The FBI’s message is clear. Do not engage with unknown individuals offering investment opportunities. Do not send money to people you have not met in person. If you suspect fraud, report it immediately to the FBI’s Internet Crime Complaint Center at ic3.gov.

     
  • Geebo 8:00 am on April 3, 2025 Permalink | Reply
    Tags: , , ,   

    Zelle App Shuts Down, Scams Persist 

    Zelle App Shuts Down, Scams Persist

    By Greg Collier

    One of the most widely used names in digital banking has officially ended a major chapter of its service. As of this week, Zelle’s stand-alone app no longer allows users to send or receive payments, pushing millions of customers to rely exclusively on their banks’ apps to access the platform.

    Zelle had warned last year that its app would be decommissioned for payments on October 31, 2024. That plan quietly went into effect on Tuesday, with little disruption to most users. The standalone app, used by only a small fraction of Zelle’s total customer base, now serves a different purpose. It remains accessible, but it has shifted focus to consumer education, offering resources on how to avoid scams and directing users to the more than 2,200 banks and credit unions that support Zelle.

    Although the platform has 150 million users in the United States, only around two percent of its transactions occurred through the app itself. The overwhelming majority of payments are made directly through bank apps. That reality led Zelle’s parent company to shutter the underused platform and reinforce its role as a bank-integrated service.

    Since launching in 2017 with backing from major financial institutions including Bank of America and JPMorgan Chase, Zelle has become the default peer-to-peer payment system for millions of Americans. Last year alone, it processed over $1 trillion in payments, far outpacing rivals like Venmo and Cash App. Unlike those competitors, Zelle does not hold transferred money in a separate wallet. Instead, it moves funds directly between bank accounts without charging users additional fees for instant transfers.

    While Zelle’s standalone app may be gone, that does not mean scams involving the service are going away. Fraudsters have long exploited the convenience and speed of peer-to-peer platforms, and Zelle is no exception. Consumers should remain cautious of unsolicited requests or calls urging them to move money, even if those instructions involve using their legitimate bank app. The closure of Zelle’s own app might shift how the platform is used, but it has not made scammers disappear.

    Bank officials and cybersecurity experts continue to warn that digital payment platforms are a favored tool for criminals posing as trusted sources. Just because Zelle now operates entirely through banking apps does not mean users are immune from manipulation. As Zelle pivots its public-facing platform toward fraud education, its success may depend as much on consumer awareness as on the technology itself.

     
  • Geebo 8:00 am on April 2, 2025 Permalink | Reply
    Tags: , , three card monte   

    Rigged Card Game Targets Shoppers 

    Rigged Card Game Targets Shoppers

    By Greg Collier

    A scam as old as street crime itself has resurfaced in Greensboro, North Carolina — and it’s costing residents thousands of dollars.

    Police are warning the public about individuals setting up illegal card games, particularly Three Card Monte, in parking lots near shopping centers. These operations are not just a nuisance — they are deliberate, well-coordinated scams designed to defraud participants of large sums of money.

    While this con may seem like a relic of the past, many people are unfamiliar with it and unaware of how it works. That unfamiliarity is what scammers rely on.

    Three Card Monte is not a legitimate game of chance. It’s a confidence trick in which a dealer displays three playing cards, usually two black cards and one red, and quickly shuffles them around. The player is then asked to identify the red card.

    At first glance, it may appear winnable. In reality, the game is carefully rigged. The scammer uses sleight of hand to switch or hide the red card during the shuffle. The operation often involves accomplices posing as bystanders or other players, who pretend to win or encourage participation to create a false sense of fairness and excitement.

    Once a victim bets real money, the deception becomes clear, but by then, it’s too late.

    Police in Greensboro have documented multiple cases of people losing significant amounts of money, from $1,500 to as much as $8,000, in just a few moments. What makes matters worse is that participation itself is illegal, regardless of whether a person wins or loses. It is considered unlawful gambling, and law enforcement has made it clear that individuals caught playing may face legal consequences.

    In addition to potential charges, authorities have warned that money seized during these operations is unlikely to be recovered, even by those who were victimized.

    Three Card Monte has a long history, dating back to Europe in the 1400s and flourishing in the U.S. during the 19th and 20th centuries. It was common in crowded city centers, train stations, and sidewalks, and it continues today in areas where foot traffic and distractions make people more vulnerable

    Despite its age, the scam remains effective precisely because it feels spontaneous and low-risk. In reality, it is a carefully planned fraud that depends on a victim’s lack of familiarity and the illusion of a fair game.

    Law enforcement emphasizes that not all scams arrive via phone call, text, or email. Some unfold in broad daylight, in seemingly harmless environments. Residents should remain cautious and report any suspicious activity to local authorities.

    If someone invites you to gamble on a street card game, remember, it is not entertainment, it is a setup. These games are illegal, deceptive, and costly, both financially and legally.

    The best way to protect yourself is to walk away.

     
  • Geebo 8:00 am on April 1, 2025 Permalink | Reply
    Tags: , missing police officer, , ,   

    Fake Cops, Real Scams: Viral Hoaxes 

    By Greg Collier

    In recent months, a disturbing pattern of online deception has emerged, targeting public empathy and exploiting the image of law enforcement officers. These scams, spreading across multiple states and even international social media groups, rely on fabricated missing person posts designed to go viral. The intent behind these emotionally manipulative tactics is not to reunite families or assist in real emergencies, but to bait well-meaning individuals into sharing content that is later edited for profit.

    The scheme typically begins with a post claiming that a police officer has gone missing under mysterious or tragic circumstances. The posts are emotionally charged and often include fabricated details about vehicles being discovered abandoned or children found alone, suggesting urgent danger. These posts appear in local Facebook groups where trust and community concern are easily manipulated. They are deliberately crafted to appear as urgent pleas for help, tapping into the public’s instinct to assist in potential crises.

    What follows after widespread sharing is a bait-and-switch tactic. Once these posts have garnered significant engagement, the original content is quietly edited. Instead of a missing person alert, viewers are redirected to unrelated advertisements, rental scams or fraudulent surveys that promise cash prizes. In some instances, users are encouraged to provide personal or financial information, putting them at further risk.

    Law enforcement agencies across the country have been forced to issue statements clarifying that the individuals portrayed in these posts are not missing and that the narratives are entirely fictitious. In one case, a police department confirmed that the officer in question was on duty at a local school, debunking any claims of disappearance. Another incident involved a slain officer whose identity was repurposed to fuel one of these scams, turning a real tragedy into digital clickbait.

    What makes these schemes particularly insidious is their reliance on recognizable faces and compelling backstories. Scammers have used images of real officers, including those featured in legitimate news coverage, to add credibility to their hoaxes. In some cases, names and photos have been lifted from public articles and repurposed in different locations under false identities.

    This form of exploitation not only victimizes the people whose images are used without consent but also erodes public trust. It diminishes the effectiveness of real emergency alerts by desensitizing audiences who may become skeptical of genuine calls for help. Moreover, it weaponizes grief and community concern, turning them into tools for financial gain.

    Authorities have encouraged the public to remain vigilant, particularly when confronted with vague or unverifiable claims on social media. Posts that lack specific details such as locations, contact information for law enforcement, or timestamps should be approached with caution. While the instinct to help is natural and commendable, it is increasingly important to verify before sharing.

    The growing frequency of these scams points to a troubling trend in online behavior, where emotional manipulation has become a tool for exploitation. As these deceptive campaigns continue to evolve, so too must public awareness and digital literacy. Without intervention and widespread education, these scams will not only persist but continue to prey on the very emotions that make communities strong.

     
  • Geebo 8:00 am on March 31, 2025 Permalink | Reply
    Tags: , , ,   

    Stolen Dreams in a $14K Car Scam 

    By Greg Collier

    What began as a hopeful transaction quickly unraveled into a devastating ordeal for a northern Wisconsin family who unknowingly purchased a stolen vehicle in what authorities describe as a sophisticated online scam.

    The couple from Prentice had found a 2024 Toyota Camry listed for sale on Facebook Marketplace. The seller, claiming a backstory involving family changes and an unused vehicle, seemed trustworthy. After exchanging messages and agreeing on a price, the family drove more than 11 hours round-trip to Calumet, Illinois, to meet him in person. The deal closed with a $14,000 cash payment.

    The excitement surrounding the new purchase was short-lived. When the family attempted to register the car in Wisconsin, they were informed by law enforcement that the vehicle had been reported stolen. The title, which appeared legitimate, was later revealed to be a high-quality fake. State officials determined the forgery only after discovering a single incorrect digit in the vehicle identification documentation. The Wisconsin Department of Transportation and the Secretary of State’s office in Illinois were both involved in the verification process.

    The fallout was immediate and financially devastating. The Price County Sheriff’s Office impounded the Camry, leaving the family without transportation and without recourse to recover the money they had paid. Efforts to locate the seller, who identified himself only by a first name, have been unsuccessful.

    Consumer protection advocates say this type of fraud is becoming more common, particularly with the rise of online marketplaces, where identity verification and buyer protections are limited. Transactions involving unusually low prices should raise immediate concerns. In this case, the vehicle had been listed well below its market value, which ranges between $25,000 and $27,000, according to current Kelley Blue Book estimates.

    Experts also warn against using cash for major purchases involving private parties online. The lack of paper trail makes recovery nearly impossible once a scam has been completed.

     
  • Geebo 8:00 am on March 28, 2025 Permalink | Reply
    Tags: , , , ,   

    Scam Uses Real Arrests to Trick Parents 

    Scam Uses Real Arrests to Trick Parents

    By Greg Collier

    An Oregon couple narrowly avoided becoming the latest victims of a scam that blends old tricks with a disturbing level of real-time sophistication. The incident highlights an almost ingenious evolution of the so-called “family emergency” or “grandparent” scam, long used by fraudsters to extract money from vulnerable individuals.

    The couple received a phone call from a man claiming to be a law enforcement officer with the Clackamas County Sheriff’s Office. He said their adult son had been arrested earlier that day and was in need of financial assistance to secure his release. Specifically, the caller claimed money was needed for a court-approved ankle monitor and treatment costs. The urgency, coupled with precise details, made the call seem credible.

    Moments after hanging up, the couple checked the public jail roster and discovered that their son had indeed been taken into custody for drug possession that same morning. The confirmation appeared to validate the caller’s story, nudging them closer to compliance.

    What followed was a sophisticated con that preyed on a parent’s instinct to protect. The impersonator explained that payments could not be made directly to the sheriff’s office, but instead had to be delivered in cash to a third-party vendor. He gave them a location, which turned out to be a 7-Eleven convenience store.

    Only then did the alarm bells finally ring.

    Instead of following through, the couple contacted law enforcement and reported the encounter. Investigators say this case stands out for its timing and apparent access to fresh booking information. While jail rosters are publicly accessible, they are not easily searchable by arrest date, raising questions about how the scammers identified and targeted the couple so quickly.

    Officials from the Clackamas County Sheriff’s Office have confirmed a handful of similar reports in recent weeks. Though the tactics vary, the consistent element is an opportunistic focus on families reeling from a recent arrest. By exploiting raw emotion and pairing it with believable details, scammers are bypassing many of the usual red flags.

    Law enforcement reiterated that they never call individuals to request money for release programs, ankle monitors, or treatment services. The agency also stressed the importance of verifying any unexpected request for money through official channels.

    This case underscores a disturbing new phase in financial fraud, one that leverages emotional vulnerability and up-to-the-minute public records. It is a stark reminder that even the savviest individuals can be manipulated when real fear intersects with convincing lies.

     
  • Geebo 8:00 am on March 27, 2025 Permalink | Reply
    Tags: , , , ,   

    Scammers Link Victim to Illicit Crime Network 

    By Greg Collier

    A 73-year-old woman from Lancaster County, Nebraska, has become the latest victim in a growing wave of tech support scams, losing $10,000 after being misled by a fraudulent security alert on her computer. Authorities say the woman believed she was speaking with Apple Support when, in fact, she was communicating with a scammer orchestrating a complex and emotionally manipulative con.

    The incident began when a pop-up message appeared on her screen warning of a security breach. The alert directed her to call what appeared to be Apple’s customer service. On the other end of the line, the scammer used fear and urgency to gain her trust, claiming that her device had been compromised by foreign hackers. The situation escalated quickly when the caller falsely alleged that her identity had been linked to a criminal group who dealt in child abuse material. In a state of panic, the woman was told she needed to pay $25,000 to clear her name and avoid severe legal consequences.

    She withdrew $10,000 from her bank and followed the caller’s instructions to a Lincoln business, where she used a Bitcoin ATM to transfer the funds. According to officials, the scammers then urged her to retrieve the remaining balance, but before she could act further, she grew suspicious and contacted law enforcement.

    Unfortunately, this type of scam is rarely resolved in the victim’s favor once funds are transferred through cryptocurrency. Though investigators are pursuing leads, authorities acknowledged that recovering the stolen money is unlikely. A sign posted near the ATM had warned users of such scams, but it was not enough to prevent the loss.

    This case reflects a broader trend in which older adults are often targeted through convincing impersonations of trusted brands. These scams rely on social engineering rather than technical hacking, preying on fear and confusion to manipulate victims into handing over money.

    To protect against these types of scams, it is important to remember that legitimate companies will never demand payment through cryptocurrency or ask for personal information in response to unsolicited alerts. Unexpected pop-ups or emails warning of urgent security threats should be met with skepticism. Rather than calling the number provided, individuals should close the browser and contact the company directly through verified channels.

    Additionally, enabling pop-up blockers, keeping antivirus software updated, and speaking with family members or friends before making financial decisions can help reduce the risk of falling victim to these schemes. Reporting suspicious activity to local law enforcement or the Federal Trade Commission is also critical to documenting and addressing ongoing fraud.

    As scammers become increasingly sophisticated, public awareness remains one of the strongest defenses. The goal is not just to stop a single crime, but to create a culture of caution that can help prevent others from suffering similar losses.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel