At BeScamAware, we are dedicated to empowering individuals and communities to fight scams and fraud. Through education, awareness, and collaboration, we aim to create a safer world where everyone can confidently navigate the challenges of a rapidly changing digital and physical landscape. Together, we can outsmart the fraudsters, protect one another, and build a future free from deception. Let’s take a stand—because knowledge is power, and prevention is the best defence.

What does it mean?

Understanding some of the terminology is important to understanding how to beat the scammers.

Account Takeover

Gaining control of someone else’s online account, often through compromised credentials.

Advance-Fee Fraud

A type of scam where scammers promise large sums of money in exchange for upfront fees (e.g., the Nigerian Prince Letter).

Anonymity Tools

Techniques like VPNs to hide the scammers’ locations.

Authentication

The process of verifying the identity of a user to ensure they are authorized for access.

Authorization

The act of granting permission to access specific resources or perform actions (e.g., logging in to an account).

Bank Account Fraud

Scammers creating fake checks or unauthorized transactions to drain victims’ accounts.

Biometric Authentication

Using physical characteristics like fingerprints, facial recognition, or voiceprints for verification.

Blackmail Extortion

Threatening victims with releasing personal information unless they pay a ransom, which is then used for further fraud.

Bogus Lottery Wins

Scammers offer victims fake prizes or money in exchange for personal details, which are then used fraudulently.

Burner Phones

Prepaid phones discarded after use to prevent tracking

Business Email Compromise (BEC)

Impersonating emails from trusted business partners to trick employees into revealing sensitive company information or making unauthorized transactions.

Carding

Scammers use stolen credit card information for unauthorized purchases or selling data on the black market.

Chatbot

A computer program designed to simulate conversation with human users, especially over the internet.

Cloud Computing

The delivery of computing services over the internet, including storage, databases, networking, software, and more.

Credential Stuffing

Scammers use stolen usernames and passwords from one breach to access other accounts, often exploiting the fact that many users reuse passwords.

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

DNS Spoofing

Altering the domain name system to redirect traffic to a scam site, intercepting transactions or information.

Data Breach

An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.

Data Encryption

The process of converting data into a code to prevent unauthorized access.

Data Privacy

The protection of personal data from unauthorized access, use, or disclosure.

Data Security

The practice of protecting digital data from unauthorized access, corruption, or theft.

Deception

Intentionally misleading someone to gain their trust or exploit them.

Digital Footprint

The trail of data left behind by a person’s online activity.

Digital Identity

The data that uniquely describes a person and can be used to identify them online.

Digital Signature

An electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document.

Domain Name Spoofing

Registering domains similar to legitimate businesses to phish for information or sell fake products.

Email Fraudulency

Sending mass emails with fraudulent content aiming to steal personal or financial information.

Email Spoofing

Sending fake emails to mimic official communications, tricking victims into revealing sensitive information or making unintended purchases.

End-to-End Encryption

A method of secure communication that prevents third-parties from accessing data while it’s transferred from one end system or device to another.

Endpoint Security

The practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors.

Fake Document Scams

Creating fake documents like diplomas or certificates to defraud people out of money or credentials.

Fake Online Shops

Scammers set up fake websites to sell counterfeit goods or steal payment details.

Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Forged Documents

Creating fake official documents for financial fraud.

Fraud

The use of deceitful methods to obtain something of value illegally.

Fraudulent Payment Requests

Scammers asking victims to send money for fake goods, services, or lotteries.

Griefing

Manipulating individuals into providing information quickly by causing emotional distress.

Identity Theft

The unauthorized use of another person’s personal information for fraudulent purposes.

Impersonation Scams

Pretending to be someone the victim knows, like a friend, family member, or government official, to manipulate them into giving up money or details.

Incident Response

The process of responding to and managing a security incident or data breach.

Information Security

The practice of protecting information by mitigating information risks.

Internet of Things (IoT)

The network of physical devices, vehicles, home appliances, and other items embedded with sensors, software, and network connectivity that enables them to connect and exchange data.

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

Man-in-the-Browser (MitB) Attacks

Injecting malicious code into a web browser to view and manipulate victims’ browsing activity, stealing information.

Man-in-the-Middle Attacks (MitM)

Scammers intercept communications between two parties to steal financial information.

Money Mule Scheme

Using victims to transfer stolen funds, often through bogus bank accounts.

Multi-Factor Authentication (MFA)

Similar to 2FA, MFA requires more than one form of verification, such as a password, biometric data, or a one-time code from a hardware token.

Open Source Software

Software with source code that anyone can inspect, modify, and enhance.

Overpayment Scams

Tricking sellers into accepting payment for goods but refusing to pay the remaining amount unless scammed into thinking they’re in trouble with a legitimate company.

Password Policy

Rules governing the use and security of passwords, such as complexity requirements or password age limits.

Password Recovery Scams

Scammers impersonate legitimate companies to ask for account verification under the guise of resetting a password.

Pharming

Manipulating a victim’s browser settings to redirect them to a fake site, tricking them into entering personal information.

Phishing

A fraudulent email designed to trick individuals into revealing personal information.

Phishing for Credentials

Fraudulent emails or websites designed to trick users into revealing their login information.

Phony Domain Registrations

Registering domains similar to legitimate businesses for use in scams, either for phishing or selling fake products.

Phony Tech Support

Scammers call victims pretending to offer tech support, tricking them into revealing personal info or selling unnecessary software.

Private Proxies

Using intermediaries to avoid direct detection.

Ransomware

Malware that blocks access to data until a ransom is paid.

Return Fraud

Scammers tricking e-commerce sites into issuing refunds by creating fake returns and using those funds for their own gain.

Romance Scam

A social engineering tactic where scammers build emotional connections to manipulate victims.

Scam

A fraudulent scheme designed to trick individuals into giving up money, information, or both.

Session Management

Techniques used to track and control user access within a system, ensuring secure and reliable authentication over time.

Single Sign-On (SSO)

A system allowing users to log in once to access multiple services, reducing the need for multiple passwords but increasing vulnerability if credentials are compromised.

Smishing

Similar to phishing but uses SMS messages instead of email to trick victims into revealing personal information.

Social Engineering

Manipulating individuals into divulging personal or financial information through psychological tactics.

Social Media Scams

A broad category including scams where scammers use fake profiles or pages to manipulate individuals into sharing information or buying products.

Spear Phishing

A targeted form of phishing where scammers send personalized emails pretending to be from someone the victim knows, making it harder to detect.

Spoofing

Creating fake emails, messages, or documents to deceive individuals.

Tax Scam

Fraudulent schemes promising tax-related benefits or rebates to steal money or personal information.

Token-Based Authentication

A method where a unique token is generated and used to prove the legitimacy of a user session.

Trickery

The use of deceptive tactics to achieve a fraudulent goal.

Two-Factor Authentication (2FA)

A security measure requiring two forms of verification before granting access, such as a password and a unique code sent to a mobile phone.

Unpatched Vulnerabilities

Scammers exploit known security issues in software that haven’t been patched, allowing them access to systems.

Unverified Payment Requests

Scammers asking victims to send money for fake goods, services, or lotteries.

Vendor Fraud

Scammers pretending to be legitimate businesses to defraud suppliers or customers.

Weak Passwords

Simple, easy-to-guess passwords like ‘password123’ that provide little to no security.

Web Application Security

The practice of securing web applications from security threats.

Wire Transfer Fraud

Frauds involving the unauthorized transfer of money using wire transfer methods.

Zero-Day Exploits

Security vulnerabilities that are exploited before the software vendor is aware of them, leaving systems vulnerable to attack.

Zero-Trust Security

A security model where no entity, whether inside or outside the network, is trusted by default, requiring verification for every access request.

Zombie Scams

Scams where victims are repeatedly targeted with fraudulent messages or requests for personal information.

Zoom-Bombing

Unauthorized individuals disrupting Zoom meetings by sharing inappropriate content or taking over the screen.