Skip to content
May 9, 2025
  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.

The Cyber Hound Tech Security Blog!

My Journey into Hacking and Cybersecurity!

  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.
Watch Online
  • Home
  • Journey into CyberSec
  • Critical Tips to Safeguard Against Online Scams and Extortion
  • Journey into CyberSec

Critical Tips to Safeguard Against Online Scams and Extortion

The blog discusses various online scams such as romance, blackmail, and pig butchering scams, emphasizing that they often start with building a relationship to eventually request money. Key advice includes not panicking, verifying money requests, being cautious with unusual payment methods, and reporting incidents to authorities.
George August 5, 2024

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Facebook (Opens in new window) Facebook

In today’s blog, I want to take a moment to talk about online scams, including romance, blackmail, and pig butchering scams. Most of these scams start similarly: someone builds a relationship with you until they ask for money. The amount requested can vary, depending on the type of scam and the scammer’s location.

Understanding the Blackmail Scam

Recently, I was asked to help with a blackmail scam. In this case, the threat actor pretended to fall in love with the victim, using the victim’s own words and actions against them to blackmail and extort money. Typically, the scammer will start with one amount and then ask for an ever-increasing sum until they feel they have siphoned enough or believe there is no money left. Some victims have drained their life savings because of such scams.

Steps to Protect Yourself

While there are numerous blogs, videos, and research articles about these scams, I want to share some practical tips on what to do if you fall victim to such a scam and how to keep yourself safe.

  1. Do Not Panic: Panic helps no one. Scammers use tactics to cause guilt (feeling like you did something wrong) and shame (feeling like you are wrong) to make the victim panic and send money quickly.
  2. Verify Requests for Money: If someone asks you for money, remember:
    • Most scammers will engage with you via text from an unknown number.
    • If you receive a text message from any number, known or unknown, call the person back to confirm their identity. Modern technology allows numbers to be spoofed and intercepted, so be extra vigilant.
  3. Beware of Unusual Payment Requests: If you receive a call asking for gift cards for an organization like the FBI, local police, or the IRS, it’s a scam. Hang up, block the number, and contact your local law enforcement in person.
  4. Stop, Look, Listen, Relax, and Wait: If someone is asking for money or if you have sent money, take a moment to:
    • Stop: Even if you were cheating on your spouse or breaking the law, stop before sending money.
    • Look: Assess the situation carefully. There is no honor among thieves, and the scammer may not make good on their threat even if you pay.
    • Listen: Pay attention to your instincts and any red flags.
    • Relax: Take deep breaths and try to calm down.
    • Wait: Do not rush to send money.
  5. Block and Report: Your best option is not to send money but to block the scammer. If you have already sent money:
    • Contact your bank to see if the charges can be reversed.
    • Report the incident to your local law enforcement.
    • Contact the FBI through their Internet Crime Complaint Center.

Additional Resources

For more information, you can visit the Scams and Safety page of the FBI. Stay informed and stay safe!

Like this:

Like Loading...

Related

Continue Reading

Previous: The Importance of Multi-Factor Authentication (MFA)

Related Stories

The Importance of Multi-Factor Authentication (MFA) erson using a mobile authentication app on their smartphone with a secure lock icon overlay. In the background, a computer screen shows multiple login attempts being blocked. The setting is a modern home office with a clean, professional look, emphasizing security and protection.
  • Gear Insight and reviews
  • Journey into CyberSec

The Importance of Multi-Factor Authentication (MFA)

July 8, 2024
Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks
  • Journey into CyberSec

Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks

April 15, 2024
I’M Back. Sorry
  • Journey into CyberSec

I’M Back. Sorry

April 10, 2024

Thanks for the visit!

Welcome to My Blog! This is a work in  progress. Each week, I hope to explore the world of CyberSecurity, and All Things IT.

I am a 4X year old IT professional with a few different learning disabilities that I struggle with! I am here to create a safe place for all, with my insight of what worked for me and what hasn’t. My goals are to move more into a security focused role.

Please keep me honest and let me know what you think. I struggle with writing, and spelling. My hope with this blog is to get better with both, I relay heavily on tools like Grammarly (paid) and Yoast SEO (free) for grammar, writing and spelling. No tool is perfect and honestly neither am I!

Please let me know how you page to this page in the comments on Twitter.  I really am learning and trying to write better.

Again welcome to my blog, join me as I start a deep dive in to all things CyberSecurity!

Trust Your Technolust!

You may have missed

Critical Tips to Safeguard Against Online Scams and Extortion
  • Journey into CyberSec

Critical Tips to Safeguard Against Online Scams and Extortion

August 5, 2024
The Importance of Multi-Factor Authentication (MFA) erson using a mobile authentication app on their smartphone with a secure lock icon overlay. In the background, a computer screen shows multiple login attempts being blocked. The setting is a modern home office with a clean, professional look, emphasizing security and protection.
  • Gear Insight and reviews
  • Journey into CyberSec

The Importance of Multi-Factor Authentication (MFA)

July 8, 2024
Understanding the US Government’s Ban on Kaspersky Software: Implications for Cybersecurity
  • My Thoughts

Understanding the US Government’s Ban on Kaspersky Software: Implications for Cybersecurity

June 24, 2024
Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks
  • Journey into CyberSec

Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks

April 15, 2024
  • Blog Ideas & Topics - The List.
  • My Gear
  • Staying Safe OnLine
  • Welcome - Start Here
    • About Me - The Early Years.
  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.
Copyright © All rights reserved. | DarkNews by AF themes.
%d