Con artists & hackers

SHARE THIS STORY
TWEET IT
Email

We live in a world that is increasingly connected by technology. In this world, the threats posed by con artists and hackers have rapidly evolved. They do not, however, rely solely on mastery of technology to victimize us. They exploit some of the fundamental aspects of human nature, our curiosity, trust, and desire to be polite, to achieve their goals.

At the core of many successful scams is the manipulation of our innate curiosity. Social engineering schemes, such as phishing emails or fraudulent phone calls, use enticing subject lines or urgent messages to prompt us to click a link or share sensitive information.

For instance, a hacker might send an email claiming to be from a trusted friend or known acquaintance, containing an electronic invitation. We’re trusting by nature as well as curious, so we click on the invitation, only to find—nothing. Because the link is designed to allow the hacker access to your computer files and passwords, with which they can cause all manner of damage to your finances, personal records, and other sensitive information.

Sometimes, these emails warn of security breaches or urge immediate action. Our curiosity to learn more, combined with the fear of loss, often causes us to act before thinking.

On a similar note, they frequently exploit our natural inclination to be polite and helpful. In face-to-face encounters, a scammer might pose as a delivery person needing access to a building, counting on us to hold the door open for them without questioning their credentials.

Online, these tactics come in the form of requests for assistance or information from seemingly valid sources. Many people find it hard to refuse a polite request or to challenge someone who appears to be legitimate. This just makes us vulnerable targets.

Social proof and authority are additional psychological triggers that scammers use to their advantage. By presenting themselves as authority figures, or by referencing other ‘victims’ or ‘beneficiaries,’ they create a sense of legitimacy. This occurs in investment frauds, charity scams, and romance scams, where fabricated stories are used to build trust.

The first step in preventing the success of these scams is to recognize them. One effective strategy is to cultivate a healthy skepticism, especially when receiving unsolicited messages or requests. Even if they seem to be from people you know. Pause before responding to any urgent communication, and verify the sender through independent means.

Hackers, for instance, can obtain valid email addresses. However, if you hover your cursor over an email address, it will display the actual sender rather than the one that appears in bold type. If you receive a call that claims to be from your bank, hang up and call the official number. This will get around scammers who know how to spoof phone numbers.

If you get an email from your bank, in addition to hovering over the sender’s email address, you should close your email, open a browser, and go to your bank’s official website, in addition to calling the official number. In each of these cases, find out where you can report the attempt, do it, and then delete it from your computer or phone.

Another key to prevention is education. Familiarize yourself and your family with the common techniques that scammers use, such as phishing, pretexting, and baiting, to help spot red flags. Create an atmosphere in your family where it’s acceptable to question unusual requests.

Don’t forget the technological tools either. Email filters, two-factor authentication, and secure password practices add layers of defense that make it hard for hackers to penetrate your system. But don’t rely solely on these tools, because they can be overcome if your curiosity or desire to be polite opens the door. No amount of software can compensate for a momentary lapse of judgment brought on by curiosity.

Don’t let scammers, con artists, or hackers exploit you. Being skeptical can feel strange at first, but trust me. If your curiosity opens you to a scam and it costs you money when your bank account is drained, being known as a cynic is a smaller price to pay. Skepticism, verification, education, and the use of technology working together can better defend you against both online and offline scams. | NWI