How to tweak your tech settings to protect your privacy
PennyWise Episode 55: Debt collector’s new tactic to contact you
So much of our sensitive personal data is being tracked and sold that trying to protect our privacy can seem like a pointless exercise.
We can disable the location tracking on phone apps only to find new apps stalking us the next time we check. We can turn off personalized advertising and still get bombarded by marketers that ignore our wishes. We can be fooled by language that’s designed to protect companies’ access to data rather than our privacy.
All this surveillance allows advertisers to manipulate us into spending more. People who are struggling financially can be targeted by predatory lenders and other seedy companies. If there’s a database breach, criminals can buy our information for just a few dollars and use it to impersonate or target us for various scams.
As individuals, we have limited ability to stop the prying. Meaningful action typically must come from regulators and lawmakers. But we can take a few steps to reclaim small but significant chunks of privacy and send a signal to companies that we don’t like what they’re up to.
“It’s a way of making a statement to a company that you’re not going along with what they’re doing,” says independent journalist Bob Sullivan, a consumer privacy advocate and author of “Gotcha Capitalism.”
SET LIMITS ON LOCATION TRACKING
You may think it’s your own business how often you visit a liquor store, go to the gym or attend a religious service. But many companies are in the business of gleaning and using such data for marketing and other purposes. You can throw a wrench into this relentless location tracking by changing a few settings on your devices.
On iPhones and iPads, go to “Settings,” then “Privacy” to find “Location Services.” With Android devices, go to “Settings,” then “Location” to find “App location permissions.” Don’t worry that you’ll “break” an app by reducing or eliminating its ability to track you, says Thomas Germain, a technology and privacy writer at Consumer Reports. If you want to do something with the app that requires your location, the app will make it easy to turn that back on, Germain says.
Regularly check these settings on all your devices, and delete any app you’re not using. The fewer apps you have, the fewer opportunities companies have to suck up and sell your data, Sullivan notes.
SHUT DOWN OTHER DATA COLLECTING
If you use any Google app or service, your location history could be stored and used even after you’ve shut off tracking. Your searches and other activity are being stored as well, so consider shutting off Google’s ability to keep that data, Germain says.
To do that, open Google.com in a browser, log into your account and click on your icon in the upper right corner. Select “Manage your Google account,” then “Privacy & personalization.” Under “Your data & privacy options,” choose “Things you’ve done and places you’ve been.” You’ll see options to review the information Google is storing about you, as well as ways to turn off data storage and delete stored histories.
Some of Google’s apps may not work as well without this data, but you can always turn these functions back on, Germain says.
“I think it’s something that people should experiment with turning off and seeing if the trade-offs are worth it,” he says.
Another setting on this page you can toggle off: ad personalization. Google tries to make tailor-made advertising sound like something you should want or need; it’s probably not.
Your devices have similar options. With iPhones and iPads, switch off “allow apps to request to track” in the “Tracking” portion of privacy settings. With Android devices, click “delete advertising ID” under “Ads”in the “Advanced” portion of privacy settings. Shutting down ad personalization won’t entirely prevent advertisers from stalking you, but it should cut down on the number of companies that have your data, Germain says.
If you have an iPhone or iPad, a feature in the iOS 15 operating software update called the “App Privacy Report ” can show how you’re being profiled and tracked, suggests Emory Roane, policy counsel at Privacy Rights Clearinghouse.
“Turn that on, leave it running for a week or two, and then it’ll tell you a very detailed list of which apps are doing what,” Roane says. “It’s a great, great resource for iOS users.”
MORE STEPS TO TAKE
An easy way to cut down on data mining is to switch to browsers built with privacy in mind, such as Firefox or Brave , Germain suggests.
Also, try to slow down. Many sites and apps ask you to make privacy decisions on the fly, making it easy to click on the wrong spot in your rush to get rid of the pop-up screen.
“All it takes is that one incorrect answer, and suddenly, you’ve given all these permissions,” Sullivan says.
Finally, if you care about privacy, let your lawmakers know. Consumers are “woefully ill equipped” to fight all the ways our data is being mined and used, Roane says.
“The real ‘quick tip’ is that you need to call your representative and tell them to support stronger privacy laws,” he says.
___
-
How to tweak your tech settings to protect your privacyGorodenkoff // Shutterstock
Consumer privacy feels more vital than ever, but very few states have laws on the books that protect consumer privacy in a relatable way. Following the 2018 passage of the California Consumer Privacy Act, other states rushed to draft their own versions of this wide-ranging consumer protection law. The singular goal of almost all these pieces of legislation is to increase consumer awareness and empowerment in the face of data collection and sales.
Referencing data from the International Association of Privacy Professionals (IAPP) and the National Conference for State Legislatures (NSCL), Zapproved compiled laws and bills relating to data privacy across the United States. Bills that failed or were delayed indefinitely are not included in this list. The bills are quite similar but have some small variations and differences, from their scope to whom is exempt—such as organizations that handle medical data subject to HIPAA and those who report credit information for financial institutions.
If your state is among those on this list, take heart that you may soon be protected from the unwitting sale of your data to third parties you’re unaware of. Many of these bills have experienced bipartisan support because of the evergreen popularity of the American ideal of privacy, along with rights like the Bill of Rights' first and fifth amendments.
Keep reading to discover if your state is among those considering this legislation.
Gorodenkoff // ShutterstockConsumer privacy feels more vital than ever, but very few states have laws on the books that protect consumer privacy in a relatable way. Following the 2018 passage of the California Consumer Privacy Act, other states rushed to draft their own versions of this wide-ranging consumer protection law. The singular goal of almost all these pieces of legislation is to increase consumer awareness and empowerment in the face of data collection and sales.
Referencing data from the International Association of Privacy Professionals (IAPP) and the National Conference for State Legislatures (NSCL), Zapproved compiled laws and bills relating to data privacy across the United States. Bills that failed or were delayed indefinitely are not included in this list. The bills are quite similar but have some small variations and differences, from their scope to whom is exempt—such as organizations that handle medical data subject to HIPAA and those who report credit information for financial institutions.
If your state is among those on this list, take heart that you may soon be protected from the unwitting sale of your data to third parties you’re unaware of. Many of these bills have experienced bipartisan support because of the evergreen popularity of the American ideal of privacy, along with rights like the Bill of Rights' first and fifth amendments.
Keep reading to discover if your state is among those considering this legislation.

-
How to tweak your tech settings to protect your privacyfizkes // Shutterstock
- SB 1121: California Consumer Privacy Act of 2018
- Proposition 24: California Privacy Rights Act of 2020
- Status: Signed
The California Consumer Privacy Act of 2018 enacts several important privacy goalposts, including limiting companies in how much data they can gather and save about website visitors. If a company violates children’s privacy, in particular, that business can be fined. The law further created a new agency to oversee privacy.
There is one catch: The law’s language specifies only companies that buy or sell 100,000 households’ worth of data each year must comply.
fizkes // Shutterstock- SB 1121: California Consumer Privacy Act of 2018
- Proposition 24: California Privacy Rights Act of 2020
- Status: Signed
The California Consumer Privacy Act of 2018 enacts several important privacy goalposts, including limiting companies in how much data they can gather and save about website visitors. If a company violates children’s privacy, in particular, that business can be fined. The law further created a new agency to oversee privacy.
There is one catch: The law’s language specifies only companies that buy or sell 100,000 households’ worth of data each year must comply.
-
-
How to tweak your tech settings to protect your privacyf11photo // Shutterstock
- SB 190
- Status: Signed
Colorado’s 2021 law is similar to California’s, including its protections on consumer data as well as the ability to delete your data from company records. But Colorado’s SB 190 law goes a step further, allowing consumers to change the data that companies keep. It also allows consumers to request copies of their saved data.
The law further dictates that companies aren’t able to “profile” consumers. This is, for example, how Twitter forms a marketable “guess” about facts like a person's age, interests, health, income, and more based on their online activity.
f11photo // Shutterstock- SB 190
- Status: Signed
Colorado’s 2021 law is similar to California’s, including its protections on consumer data as well as the ability to delete your data from company records. But Colorado’s SB 190 law goes a step further, allowing consumers to change the data that companies keep. It also allows consumers to request copies of their saved data.
The law further dictates that companies aren’t able to “profile” consumers. This is, for example, how Twitter forms a marketable “guess” about facts like a person's age, interests, health, income, and more based on their online activity.
-
How to tweak your tech settings to protect your privacyDimaBerlin // Shutterstock
- LD 946: An Act To Protect the Privacy of Online Customer Information
- Status: Signed
Like the similar laws of California and Colorado, Maine’s 2019 privacy law focuses on allowing consumers to make informed decisions about how companies use their data. The law, which was approved unanimously by Maine’s Senate, very specifically applies to internet service providers (ISPs) barring them from keeping or selling data related to consumer information. The law also prohibits ISPs from incentivizing customers to offer their data for sale, effectively restricting discounts or other savings in exchange for giving over data rights.
DimaBerlin // Shutterstock- LD 946: An Act To Protect the Privacy of Online Customer Information
- Status: Signed
Like the similar laws of California and Colorado, Maine’s 2019 privacy law focuses on allowing consumers to make informed decisions about how companies use their data. The law, which was approved unanimously by Maine’s Senate, very specifically applies to internet service providers (ISPs) barring them from keeping or selling data related to consumer information. The law also prohibits ISPs from incentivizing customers to offer their data for sale, effectively restricting discounts or other savings in exchange for giving over data rights.
-
-
How to tweak your tech settings to protect your privacyESB Professional // Shutterstock
- SD 1726: Massachusetts Information Privacy Act
- Status: In committee
Massachusetts’ comprehensive privacy law act, filed in March 2021, goes a step further than most of the similar legislation in the works. The law extends privacy into the workplace, preventing employers from recording or monitoring employee data, except when it makes sense to do for reasons like safety. It further bars employers from monitoring employees outside of work.
Some state privacy laws make exemptions for institutions that monitor and report consumer credit, but Massachusetts’ law doesn’t make those exceptions. This could present some thorny situations for those in the credit business.
ESB Professional // Shutterstock- SD 1726: Massachusetts Information Privacy Act
- Status: In committee
Massachusetts’ comprehensive privacy law act, filed in March 2021, goes a step further than most of the similar legislation in the works. The law extends privacy into the workplace, preventing employers from recording or monitoring employee data, except when it makes sense to do for reasons like safety. It further bars employers from monitoring employees outside of work.
Some state privacy laws make exemptions for institutions that monitor and report consumer credit, but Massachusetts’ law doesn’t make those exceptions. This could present some thorny situations for those in the credit business.
-
How to tweak your tech settings to protect your privacyPressmaster // Shutterstock
- HF 1492: Minnesota Consumer Data Privacy Act
- Status: In committee
Minnesota’s consumer privacy omnibus law, introduced in February 2021, includes many of the same provisions seen in those of other states. The law applies to specific companies, though, which could create a loophole-like situation for many other businesses. For the law to apply, companies must handle the data of at least 100,000 consumers each year. They also must earn at least 25% of their overall revenue from the sale or use of data. As in Maine, consumers will be able to request and correct their information in addition to deleting it.
Pressmaster // Shutterstock- HF 1492: Minnesota Consumer Data Privacy Act
- Status: In committee
Minnesota’s consumer privacy omnibus law, introduced in February 2021, includes many of the same provisions seen in those of other states. The law applies to specific companies, though, which could create a loophole-like situation for many other businesses. For the law to apply, companies must handle the data of at least 100,000 consumers each year. They also must earn at least 25% of their overall revenue from the sale or use of data. As in Maine, consumers will be able to request and correct their information in addition to deleting it.
-
-
How to tweak your tech settings to protect your privacyGorodenkoff // Shutterstock
- SB 220
- Status: Signed
Where some states are reaching further into people’s lives in order to extend privacy rights, Nevada’s consumer privacy law, signed into law in 2019, is a bit more reserved. Consumers may request the removal of their information from company data, and companies must comply within 60 days. There’s a wrinkle, though: The companies must have actual plans to sell that data in order to be subject to the law. This could lead to workarounds or loopholes where companies do things like “trade” rather than sell data.
Gorodenkoff // Shutterstock- SB 220
- Status: Signed
Where some states are reaching further into people’s lives in order to extend privacy rights, Nevada’s consumer privacy law, signed into law in 2019, is a bit more reserved. Consumers may request the removal of their information from company data, and companies must comply within 60 days. There’s a wrinkle, though: The companies must have actual plans to sell that data in order to be subject to the law. This could lead to workarounds or loopholes where companies do things like “trade” rather than sell data.
-
How to tweak your tech settings to protect your privacyturtix // Shutterstock
- A 680: New York Privacy Act
- S 6701: New York Privacy Act
- A 6042: Digital Fairness Act
- SB 567
- Status: In committee
New York’s consumer privacy laws, still in committee, would allow consumers to see what data companies have saved about them. Companies would be required to inform consumers of these rights so they can opt out if they wish, and would be barred from retaliating against customers who choose to opt out of data collection. A 680 would additionally require express written permission from customers before data can be sold. That’s true even for those who don’t opt out of the collection of data in the first place.
turtix // Shutterstock- A 680: New York Privacy Act
- S 6701: New York Privacy Act
- A 6042: Digital Fairness Act
- SB 567
- Status: In committee
New York’s consumer privacy laws, still in committee, would allow consumers to see what data companies have saved about them. Companies would be required to inform consumers of these rights so they can opt out if they wish, and would be barred from retaliating against customers who choose to opt out of data collection. A 680 would additionally require express written permission from customers before data can be sold. That’s true even for those who don’t opt out of the collection of data in the first place.
-
-
How to tweak your tech settings to protect your privacyinsta_photos // Shutterstock
- SB 569: Consumer Privacy Act
- Status: In committee
North Carolina’s consumer privacy law seeks to expand on the state’s existing body of law protecting consumers from data and identity theft. With the new legislation, consumers will be able to know who is holding their data—and it will be possible to correct or delete data companies keep. Consumers will additionally be able to totally opt out of data gathering for applicable companies and have the right to bring civil lawsuits against companies that don’t comply with the law.
insta_photos // Shutterstock- SB 569: Consumer Privacy Act
- Status: In committee
North Carolina’s consumer privacy law seeks to expand on the state’s existing body of law protecting consumers from data and identity theft. With the new legislation, consumers will be able to know who is holding their data—and it will be possible to correct or delete data companies keep. Consumers will additionally be able to totally opt out of data gathering for applicable companies and have the right to bring civil lawsuits against companies that don’t comply with the law.
-
How to tweak your tech settings to protect your privacyRudy Balasko // Shutterstock
- SB 376: Ohio Personal Privacy Act
- Status: Introduced
Ohio’s consumer protection law, introduced in July 2021, affords consumers the opportunity to access and even request deletion of their personal data from applicable companies. They may also opt out of the sale of their data altogether. However, there are many exemptions and exceptions in this law. For example, business-to-business (B2B) transactions are not subject to the law—ironic since this is where many data sales take place.
Rudy Balasko // Shutterstock- SB 376: Ohio Personal Privacy Act
- Status: Introduced
Ohio’s consumer protection law, introduced in July 2021, affords consumers the opportunity to access and even request deletion of their personal data from applicable companies. They may also opt out of the sale of their data altogether. However, there are many exemptions and exceptions in this law. For example, business-to-business (B2B) transactions are not subject to the law—ironic since this is where many data sales take place.
-
-
How to tweak your tech settings to protect your privacyMihai_Andritoiu // Shutterstock
- HB 1126
- Status: In committee
Under Pennsylvania’s proposed consumer privacy law, consumers would be given certain rights as far as disclosure and approval of what happens to their data. The law also makes the state attorney general responsible for enforcing the law, meaning consumers would be able to sue in civil court and potentially cause companies to be fined for violating the law. The passage of this kind of law typically leads to a huge increase in lawsuits that could start immediately upon the bill’s adoption.
Mihai_Andritoiu // Shutterstock- HB 1126
- Status: In committee
Under Pennsylvania’s proposed consumer privacy law, consumers would be given certain rights as far as disclosure and approval of what happens to their data. The law also makes the state attorney general responsible for enforcing the law, meaning consumers would be able to sue in civil court and potentially cause companies to be fined for violating the law. The passage of this kind of law typically leads to a huge increase in lawsuits that could start immediately upon the bill’s adoption.
-
How to tweak your tech settings to protect your privacyGaudiLab // Shutterstock
- SB 1392: Consumer Data Protection Act
- Status: Signed
Virginia’s consumer data law, passed unanimously by the state senate in February 2021, follows the passage of California’s similar law and hopes to enact many of the same ideas for Virginia. The legislation allows consumers to confirm their data is being held and potentially sold. They will also be able to correct that data, which must be available to them in a portable format that can be carried and passed on to another provider readily. Think of this like closing your bank account: You leave the bank with your money, ready to carry to a different bank.
This story originally appeared on Zapproved and was produced and distributed in partnership with Stacker Studio.
GaudiLab // Shutterstock- SB 1392: Consumer Data Protection Act
- Status: Signed
Virginia’s consumer data law, passed unanimously by the state senate in February 2021, follows the passage of California’s similar law and hopes to enact many of the same ideas for Virginia. The legislation allows consumers to confirm their data is being held and potentially sold. They will also be able to correct that data, which must be available to them in a portable format that can be carried and passed on to another provider readily. Think of this like closing your bank account: You leave the bank with your money, ready to carry to a different bank.
This story originally appeared on Zapproved and was produced and distributed in partnership with Stacker Studio.
-
-
How to tell you’re being phished, and 9 other common online scams to watch out forEugeneEdge // Shutterstock
The internet can feel packed with scams sometimes, especially for anyone who’s had their credit card or other information stolen. But most scams fall into a small variety of types that are easy to identify and avoid once you know about them.
There are only so many ways to reinvent the wheel—scammers will usually fall into a set number of categories. Twingate assembled a list of common online scams that internet users should be wary of, drawing on research from government organizations, payment processors, and tech companies.
One of the major categories of scamming is called social engineering. An old-fashioned method that still works surprisingly well, social engineering is any fraud where a human being communicates with you to obtain information in person, online, or over the phone. Scammers will use manipulative, deceptive, or psychological tactics to get someone to reveal confidential information.
As our lives increasingly have shifted online, scammers have followed, posing as everything from fake online boyfriends to made-up charities. So the next time you get a voicemail claiming to be from Microsoft, an email that says your antivirus service is out of date, or a pop-up ad from “newy0rktimes.com,” take a few seconds and think about whether it's a genuine message before doing anything. Continue reading to learn about the most common online scams today.
EugeneEdge // ShutterstockThe internet can feel packed with scams sometimes, especially for anyone who’s had their credit card or other information stolen. But most scams fall into a small variety of types that are easy to identify and avoid once you know about them.
There are only so many ways to reinvent the wheel—scammers will usually fall into a set number of categories. Twingate assembled a list of common online scams that internet users should be wary of, drawing on research from government organizations, payment processors, and tech companies.
One of the major categories of scamming is called social engineering. An old-fashioned method that still works surprisingly well, social engineering is any fraud where a human being communicates with you to obtain information in person, online, or over the phone. Scammers will use manipulative, deceptive, or psychological tactics to get someone to reveal confidential information.
As our lives increasingly have shifted online, scammers have followed, posing as everything from fake online boyfriends to made-up charities. So the next time you get a voicemail claiming to be from Microsoft, an email that says your antivirus service is out of date, or a pop-up ad from “newy0rktimes.com,” take a few seconds and think about whether it's a genuine message before doing anything. Continue reading to learn about the most common online scams today.

-
How to tell you’re being phished, and 9 other common online scams to watch out forTero Vesalainen // Shutterstock
Phishing is one of the most common online scams. It’s a form of social engineering, meaning a scam in which the “human touch” is used to trick people. One offline form of phishing is when you receive a scam phone call where someone claims to be calling from the fraud department at your bank and requests your account number as verification.
With online phishing, scammers do the same kind of thing but use emails and links to fraudulent websites to fool users. In your spam folder, you’ll often see messages claiming to be from Bank of America and others. These links lead to imitation bank sites designed to capture your personal banking information.
Tero Vesalainen // ShutterstockPhishing is one of the most common online scams. It’s a form of social engineering, meaning a scam in which the “human touch” is used to trick people. One offline form of phishing is when you receive a scam phone call where someone claims to be calling from the fraud department at your bank and requests your account number as verification.
With online phishing, scammers do the same kind of thing but use emails and links to fraudulent websites to fool users. In your spam folder, you’ll often see messages claiming to be from Bank of America and others. These links lead to imitation bank sites designed to capture your personal banking information.
-
-
How to tell you’re being phished, and 9 other common online scams to watch out forrichardjohnson // Shutterstock
These email messages are notorious—and the stuff of internet legend: “Hello sir, I have a huge sum to send you!” In this scam, a forlorn prince, bank manager, church reverend, or otherwise reputable-sounding stranger has a large amount of money that they need you to hold for them. All you have to do is send them several hundred or thousand dollars to cover some kind of transactional cost upfront.
Never believe any stranger who wants to send you money, and listen to your gut. If something sounds too good to be true, it is highly likely that it is a scam.
richardjohnson // ShutterstockThese email messages are notorious—and the stuff of internet legend: “Hello sir, I have a huge sum to send you!” In this scam, a forlorn prince, bank manager, church reverend, or otherwise reputable-sounding stranger has a large amount of money that they need you to hold for them. All you have to do is send them several hundred or thousand dollars to cover some kind of transactional cost upfront.
Never believe any stranger who wants to send you money, and listen to your gut. If something sounds too good to be true, it is highly likely that it is a scam.
-
How to tell you’re being phished, and 9 other common online scams to watch out forTero Vesalainen // Shutterstock
Romance scams are one of the darkest and most sinister scams because of the time investment and emotions involved. Romance scammers pretend to be regular people, often older people, who are looking for love and want to meet eligible singles in other countries. They'll build an emotional connection with their target by exchanging romantic messages and pretending to be in love.
The scam comes in when, eventually, a series of misfortunes befall the romantic partner. They might plan a visit to finally meet—but suddenly won't have money to pay for the plane ticket. Then they’re hospitalized with a mystery illness and need money to pay the bill. This continues until the victim grows suspicious of the mounting costs.
Tero Vesalainen // ShutterstockRomance scams are one of the darkest and most sinister scams because of the time investment and emotions involved. Romance scammers pretend to be regular people, often older people, who are looking for love and want to meet eligible singles in other countries. They'll build an emotional connection with their target by exchanging romantic messages and pretending to be in love.
The scam comes in when, eventually, a series of misfortunes befall the romantic partner. They might plan a visit to finally meet—but suddenly won't have money to pay for the plane ticket. Then they’re hospitalized with a mystery illness and need money to pay the bill. This continues until the victim grows suspicious of the mounting costs.
-
-
How to tell you’re being phished, and 9 other common online scams to watch out forJacob Lund // Shutterstock
Formjacking is a web scam that works the same way as a credit card skimmer does in real life. You go to a website to place an order and enter your information as usual. The transaction even goes through and seems to be fine, except that some code hacked into the website has copied your financial data to someone else.
The owners of the website may not even realize something is happening because they don’t pay close attention to their infrastructure. Make sure the websites you deal with are secure.
Jacob Lund // ShutterstockFormjacking is a web scam that works the same way as a credit card skimmer does in real life. You go to a website to place an order and enter your information as usual. The transaction even goes through and seems to be fine, except that some code hacked into the website has copied your financial data to someone else.
The owners of the website may not even realize something is happening because they don’t pay close attention to their infrastructure. Make sure the websites you deal with are secure.
-
How to tell you’re being phished, and 9 other common online scams to watch out forJMiks // Shutterstock
Phony tech support is a form of social engineering. This scam may come as an email or a phone call, claiming that your computer has been compromised in some way and that you must call a number or visit a website to fix it.
From there, the scammer may install malware like keyboard capture software (or worse). On the phone, they may request remote access to your computer to help you. These scammers often claim to be from Microsoft or Apple as a way to establish legitimacy.
JMiks // ShutterstockPhony tech support is a form of social engineering. This scam may come as an email or a phone call, claiming that your computer has been compromised in some way and that you must call a number or visit a website to fix it.
From there, the scammer may install malware like keyboard capture software (or worse). On the phone, they may request remote access to your computer to help you. These scammers often claim to be from Microsoft or Apple as a way to establish legitimacy.
-
-
How to tell you’re being phished, and 9 other common online scams to watch out foraslysun // Shutterstock
Ransomware is a kind of malicious software that is installed without your knowledge. This is usually from an email or fraudulent site, meaning it also uses phishing to imitate your bank or another institutional website. Someone calls or emails with a link that installs the ransomware on your machine. What makes ransomware different is what comes next.
The software locks certain kinds of information on your machines, like your saved documents, photos, and other files. You have to pay to unlock the data and get your files, although the FBI cautions against actually paying.
aslysun // ShutterstockRansomware is a kind of malicious software that is installed without your knowledge. This is usually from an email or fraudulent site, meaning it also uses phishing to imitate your bank or another institutional website. Someone calls or emails with a link that installs the ransomware on your machine. What makes ransomware different is what comes next.
The software locks certain kinds of information on your machines, like your saved documents, photos, and other files. You have to pay to unlock the data and get your files, although the FBI cautions against actually paying.
-
How to tell you’re being phished, and 9 other common online scams to watch out forRawpixel.com // Shutterstock
Scareware is a form of manipulative scamming that threatens users by making them believe they need new software on their machines. One of the common forms is to tell users they need new antivirus software and to offer that software from a fraudulent source.
It’s often easy to tell these websites or emails apart from real ones: Look closely at the URLs or email addresses, which usually have strange spellings or other clues that signal you’re not dealing with legitimate companies.
Rawpixel.com // ShutterstockScareware is a form of manipulative scamming that threatens users by making them believe they need new software on their machines. One of the common forms is to tell users they need new antivirus software and to offer that software from a fraudulent source.
It’s often easy to tell these websites or emails apart from real ones: Look closely at the URLs or email addresses, which usually have strange spellings or other clues that signal you’re not dealing with legitimate companies.
-
-
How to tell you’re being phished, and 9 other common online scams to watch out forLopolo // Shutterstock
Sextortion is an especially grim crime that targets minors, although it can also affect adults. Now that so many people meet romantic partners online, it’s common to exchange explicit photos. That’s also true of teenagers or even of younger children, who can find themselves in online relationships with people who ask for personal information and photos.
Once someone has this material, they can use it as a way to demand more and will threaten to share info or post photos publicly if their target refuses. Unlike the other crimes on this list, sextortion doesn’t always have financial goals.
Lopolo // ShutterstockSextortion is an especially grim crime that targets minors, although it can also affect adults. Now that so many people meet romantic partners online, it’s common to exchange explicit photos. That’s also true of teenagers or even of younger children, who can find themselves in online relationships with people who ask for personal information and photos.
Once someone has this material, they can use it as a way to demand more and will threaten to share info or post photos publicly if their target refuses. Unlike the other crimes on this list, sextortion doesn’t always have financial goals.
-
How to tell you’re being phished, and 9 other common online scams to watch out forpanuwat phimpha // Shutterstock
Crowdfunding and mutual aid are becoming more common as a way for people to share resources and help others pay for medical bills and other costs, or to donate following natural disasters. Unfortunately, this well-meaning way to help others in the community has also been targeted by scammers through charity and disaster fraud.
Scammers can make fake Twitter accounts to imitate people in need. They’ll even set up bots to make new accounts that look like your friend’s account to reply with Paypal links that redirect to the scammer. If you aren’t sure about the credibility of a group or crowdfunding page, it is always best to seek more information.
panuwat phimpha // ShutterstockCrowdfunding and mutual aid are becoming more common as a way for people to share resources and help others pay for medical bills and other costs, or to donate following natural disasters. Unfortunately, this well-meaning way to help others in the community has also been targeted by scammers through charity and disaster fraud.
Scammers can make fake Twitter accounts to imitate people in need. They’ll even set up bots to make new accounts that look like your friend’s account to reply with Paypal links that redirect to the scammer. If you aren’t sure about the credibility of a group or crowdfunding page, it is always best to seek more information.
-
-
How to tell you’re being phished, and 9 other common online scams to watch out forSB Arts Media // Shutterstock
This scam is simple and it’s a variation of an age-old, real-life scam. Think of those signs you see on street corners that say, “I make $16,000 a month working from home!” When you call, these people want you to buy training materials to become a real estate agent or something similar.
The same is true of many online ads that say you can work from home and make $500 a day or some other attractive amount. The best advice is also the oldest: If it sounds too good to be true, it probably is.
This story originally appeared on Twingate and was produced and distributed in partnership with Stacker Studio.
SB Arts Media // ShutterstockThis scam is simple and it’s a variation of an age-old, real-life scam. Think of those signs you see on street corners that say, “I make $16,000 a month working from home!” When you call, these people want you to buy training materials to become a real estate agent or something similar.
The same is true of many online ads that say you can work from home and make $500 a day or some other attractive amount. The best advice is also the oldest: If it sounds too good to be true, it probably is.
This story originally appeared on Twingate and was produced and distributed in partnership with Stacker Studio.