How to Avoid Phone/Email Scams!

Be aware and follow this guide to avoid falling victim to Phone/Email Scams

Shanto Roy
6 min readApr 7, 2023
how to avoid phone or email scams, how to avoid scams

Recent news articles have warned about new email scams targeting Facebook and Apple users. The scam emails claim to be from Facebook or Apple and ask the user to update their account information, providing a link that leads to a fake login page where the user’s credentials are stolen.

People have been facing similar scams over phone calls and texts, too. People are spoofing government or official phone numbers and calling regular people while asking the users to update account information or disclose sensitive information.

We see phone/email scams have been too common everywhere. And sometimes, it is quite difficult to understand whether these calls or emails are authentic or not.

In this blog post, we will go through how this scam works and what to do to avoid falling victim to these scams.

Phone Scams

Phone scams typically involve a scammer using various tactics to trick a victim into providing sensitive information or money over the phone. Here are some common ways in which phone scams work:

  1. Impersonating a government agency: Scammers may impersonate a government agency, such as the IRS, and threaten legal action unless the victim provides personal or financial information. For example, the scammer might claim that the victim owes back taxes and ask for payment over the phone. Also, I have heard some international students fall victim to it as scammers impersonate USCIS.
  2. Impersonating a Financial Institution: Scammers can impersonate a bank or investment broker representative, and try to convince people to expose account information or set up their account because there is an update. This tactic is also very common in modern society.
  3. Fake technical support: Scammers may pose as technical support representatives from well-known companies, such as Microsoft or Apple, and claim that the victim’s computer or device is infected with a virus. The scammer will then ask for remote access to the victim’s computer or payment to “fix” the problem.
  4. Lottery or prize scams: This scam is still quite common in developing countries. Scammers may call to inform the victim that they have won a large sum of money or a prize, but that they need to pay a fee or provide personal information to claim the prize. For example, the scammer might claim that the victim has won a lottery but needs to provide a payment to cover taxes or fees.
  5. Charity scams: Scammers may call claiming to represent a well-known charity and ask for a donation over the phone. However, the money does not actually go to the charity and instead ends up in the scammer’s pockets.

These are just some examples. There are many other ways scammers try to scam you. In general, phone scams create a sense of urgency or fear to pressure the victim into providing sensitive information or money.

Email/Phishing Scams

Email scams, also known as phishing scams, typically involve a scammer sending a fraudulent trustworthy email that appears to be from a legitimate source, such as a bank or government agency. Here are some common ways in which email scams work:

  1. Fake login pages: Scammers may include a link in the email that leads to a fake login page, where the victim is prompted to enter their username and password. The most common phishing scams work like this. The scammer then uses the victim’s login credentials to access their accounts and steal their information. For example, the scammer might send an email claiming to be from a bank and ask the victim to click a link to update their account information.
  2. Malicious attachments: Scammers may attach malware to the email, which can infect the victim’s computer or device if the attachment is opened. For example, the scammer might send an email that appears to be from a shipping company with a fake tracking number, and ask the victim to download an attachment to view the status of their shipment. Or, it can be an invoice attachment saying something has been purchased.
  3. Urgent requests for payment: Scammers may send emails that appear to be from a legitimate source, such as a utility company or credit card provider, and ask for urgent payment to avoid service disconnection or late fees. For example, the scammer might send an email claiming to be from the IRS and threaten legal action unless the victim pays a supposed tax bill immediately.
  4. Fake job offers: I have some experience facing this one while looking for an internship. Scammers may send emails that appear to be from a reputable company and offer a job opportunity that requires the victim to pay an upfront fee or provide personal information. For example, the scammer might send an email claiming to be from a recruiting company and ask for payment to complete a background check.
  5. Personal information for Account Verification: Scammers may send emails that appear to be from a legitimate source, such as a social media platform or email provider, and ask the victim to provide personal information to verify their account. For example, the scammer might send an email claiming to be from a popular email provider and ask the victim to enter their password to verify their account.

Email scams generally rely on social engineering tactics to trick the victim into providing sensitive information or money. There are further ways they do it and with more tactics to make an email seem legit.

Solution! How to Avoid!!!

Fraudsters are becoming increasingly sophisticated in their attempts to obtain sensitive information from unsuspecting victims. In order to protect yourself from falling victim to these scams, here are ten things you should know:

  1. Be wary of unsolicited calls or emails. Don't answer or respond if you don’t recognize the number or email address. Scammers often use fake caller IDs or email addresses to appear legitimate.
  2. Don’t provide personal information over the phone or via email. Legitimate organizations will never ask for sensitive information such as your social security number or banking details over the phone or email.
  3. Don’t trust caller ID. Scammers can easily manipulate caller ID to make it appear like they are calling from a legitimate organization.
  4. Watch out for urgency or threats. Scammers often use fear tactics to pressure you into providing information or making a payment. Legitimate organizations will never threaten you in this way.
  5. Don’t make payments over the phone or via email. If you’re unsure about a payment request, contact the organization directly using a verified phone number or email address.
  6. Use strong passwords and two-factor authentication. This will help protect your accounts from being hacked and prevent scammers from accessing your personal information.
  7. Keep your software up-to-date. This includes your operating system, antivirus software, and any other software you use regularly. The updated software will help protect you from known vulnerabilities.
  8. Be cautious when clicking links or downloading attachments. Scammers often use fake links or attachments to trick you into downloading malware or revealing sensitive information.
  9. Use anti-phishing software. This software can help identify and block phishing emails before they reach your inbox.

Concluding Remarks

Phone and email scams are becoming increasingly common, but by following these ten tips, you can help protect yourself from falling victim. Remember to stay vigilant, use common sense, and don’t be afraid to ask for help if you’re unsure about a request for information or payment.

Overall, be cautious of unsolicited emails, verify the authenticity of emails/calls before clicking on any links or downloading attachments, and report suspicious emails to the appropriate authorities.

Be conscious of phone calls or texts and avoid exposing personal or sensitive information. It is noteworthy to remember, no one will ask for sensitive information over the phone. If so, verify first.

Moreover, trust your instincts. If something seems too good to be true, it probably is. If you’re unsure about a phone call or email, don’t be afraid to hang up or delete it.

Hi, there!!! 👋

Thanks for reading the full story! Before you go:

--

--

Shanto Roy

I write about Cyber Security, Python, DevOps/SRE, Research, AI, and travel. 💻 Tech blog👉 shantoroy.com ✈️ Travel Blog👉 digitalnomadgoals.com